Professional Documents
Culture Documents
2020 Book DevelopmentsAndAdvancesInDefen PDF
2020 Book DevelopmentsAndAdvancesInDefen PDF
Álvaro Rocha
Robson Pacheco Pereira Editors
Developments
and Advances
in Defense and Security
Proceedings of MICRADS 2019
Smart Innovation, Systems and Technologies
Volume 152
Series Editors
Robert J. Howlett, Bournemouth University and KES International,
Shoreham-by-sea, UK
Lakhmi C. Jain, Faculty of Engineering and Information Technology,
Centre for Artificial Intelligence, University of Technology Sydney,
Broadway, NSW, Australia
The Smart Innovation, Systems and Technologies book series encompasses the
topics of knowledge, intelligence, innovation and sustainability. The aim of the
series is to make available a platform for the publication of books on all aspects of
single and multi-disciplinary research on these themes in order to make the latest
results available in a readily-accessible form. Volumes on interdisciplinary research
combining two or more of these areas is particularly sought.
The series covers systems and paradigms that employ knowledge and intelligence
in a broad sense. Its scope is systems having embedded knowledge and intelligence,
which may be applied to the solution of world problems in industry, the environment
and the community. It also focusses on the knowledge-transfer methodologies and
innovation strategies employed to make this happen effectively. The combination of
intelligent systems tools and a broad range of applications introduces a need for a
synergy of disciplines from science, technology, business and the humanities. The
series will include conference proceedings, edited collections, monographs, hand-
books, reference books, and other relevant types of book in areas of science and
technology where smart systems and technologies can offer innovative solutions.
High quality content is an essential feature for all book proposals accepted for the
series. It is expected that editors of all accepted volumes will ensure that
contributions are subjected to an appropriate level of reviewing process and adhere
to KES quality principles.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, SCOPUS, Google Scholar and Springerlink **
Editors
123
Editors
Álvaro Rocha Robson Pacheco Pereira
Departamento de Engenharia Informática Military Engineering Institute
Universidade de Coimbra Rio de Janeiro, Brazil
Coimbra, Portugal
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Organization
Honorary Chair
Honorary Co-chair
General Chairs
v
vi Organization
Scientific Committee
This book contains a selection of papers accepted for presentation and discussion at
The 2019 Multidisciplinary International Conference of Research Applied to
Defense and Security (MICRADS’19). This Conference had the support of IME
(Military Institute of Engineering) of Brazil, ESPE (University of Armed Forces) of
Ecuador, and AISTI (Iberian Association for Information Systems and
Technologies). It took place at Rio de Janeiro, Brazil, during May 8–10, 2019.
The 2019 Multidisciplinary International Conference of Research Applied to
Defense and Security (MICRADS’19) is an international forum for researchers and
practitioners to present and discuss the most recent innovations, trends, results,
experiences, and concerns in the several perspectives of defense and security.
The Program Committee of MICRADS’19 was composed of a multidisciplinary
group of more than 100 experts from 35 countries around the world and those who
are intimately concerned with Research Applied to Defense and Security. They
have had the responsibility for evaluating, in a ‘double-blind review’ process, the
papers received for each of the main themes proposed for the Conference:
(A) systems, communication and defense; (B) strategy and political–administrative
vision in defense; and (C) engineering and technologies applied to defense.
MICRADS’19 received about 100 contributions from 11 countries around the
world. The papers accepted for presentation and discussion at the Conference are
published by Springer (this book) and by AISTI and will be submitted for indexing
by ISI, Ei Compendex, Scopus, and/or Google Scholar, among others.
We acknowledge all of those that contributed to the staging of MICRADS’19
(authors, committees, workshop organizers, and sponsors). We deeply appreciate
their involvement and support that was crucial for the success of MICRADS’19.
xi
Contents
xiii
xiv Contents
xix
Part I
Cybersecurity and Cyberdefense
Reducing the Attack Surface of Dynamic
Binary Instrumentation Frameworks
Abstract Malicious applications pose as one of the most relevant issues in today’s
technology scenario, being considered the root of many Internet security threats. In
part, this owes the ability of malware developers to promptly respond to the emer-
gence of new security solutions by developing artifacts to detect and avoid them. In
this work, we present three countermeasures to mitigate recent mechanisms used by
malware to detect analysis environments. Among these techniques, this work focuses
on those that enable a malware to detect dynamic binary instrumentation frameworks,
thus increasing their attack surface. To ensure the effectiveness of the proposed coun-
termeasures, proofs of concept were developed and tested in a controlled environment
with a set of anti-instrumentation techniques. Finally, we evaluated the performance
impact of using such countermeasures.
1 Introduction
can be circumvented, the use of current frameworks of dynamic binary analysis has
a great overhead, as already claimed by other authors [20].
This paper is organized as follows. Section 2 reviews the literature. Section 3
is devoted to previous concepts needed to follow the rest of this work, as the DBI
framework developed by Intel or the architecture of the PinVMShield tool. Sec-
tion 4 introduces the new techniques for detecting those analysis environments, as
well as the proper countermeasures. Finally, Sect. 5 concludes the work and states
future work.
2 Related Work
This section presents in chronological order the works related to techniques for
detecting a DBI framework, detailing also the countermeasures proposed in each
work. We first review the related works in the industry and then in the academy.
Most of the existing studies come from industry-related security conferences.
Falcón and Riva introduced in [7] the first techniques to detect the presence of
the Intel Pin DBI framework in a Windows OS. In particular, thirteen techniques
with the corresponding proofs of concepts (PoCs) were presented. Those PoCs were
distributed as a sort of a benchmark-like tool called eXait. This tool is useful to verify
if a DBI framework is recognizable.
Two years later, Li and Li [14] showed that the DynamoRIO DBI framework can
be detected in both Windows and Linux environments through ten new evasion tech-
niques. Furthermore, they remarked the transparency problem of DBI frameworks in
some cases. Similarly, Hron and Jermář proposed in [10] six new evasive techniques
against the Pin and DynamoRIO, providing also PoCs of those techniques. Sun et
al. also presented in [22] other six new evasive techniques aimed at the DBI Pin and
DynamoRIO frameworks. In addition, they introduced the idea of escaping of the
sandbox-like environment provided by a DBI framework, thus compromising the
analysis environment.
Regarding the academic literature, Rodríguez et al. [21] reviewed and provided a
taxonomy of the existing anti-DBI and countermeasures techniques up to that time.
Moreover, they released an extensible Pin-based tool called PinVMShield that
enabled to analyze applications with those evasive techniques by means of circum-
venting them. Later, Polino et al. [19] introduced a review and classification of some
anti-DBI techniques mainly focused on the Pin DBI framework. Furthermore, they
developed a set of approaches to mitigate evasion techniques and used the eXait
tool [7] to validate their effectiveness. They also introduced a Pin-based tool named
Arancino, which incorporates the proposed countermeasures and allows to retrieve
the original binary form of malware programs protected by software packers.
Recently, Zhechev published a Master’s thesis [24] raising the question whether
DBI frameworks are appropriate tools for analyzing malware and other potentially
evasive artifacts. Moreover, he introduced thirteen new techniques to detect the pres-
ence of Intel Pin DBI framework in a Linux OS and also demonstrated that escaping
6 A. S. Filho et al.
of such a DBI framework is feasible due to the shared memory model used by DBI
frameworks. In this regard, Zhechev stated that the isolation and the stealthiness of the
analysis code under DBI frameworks are not guaranteed, and thus, DBI frameworks
are unsuitable for building any security-related application.
As shown, DBI frameworks are gaining popularity among security researchers
as a way to insert arbitrary code during program execution. Following this trend, in
this paper, we provide PoCs of three evasion techniques already documented in the
literature (but without PoCs) and we give the proper countermeasures.
3 Previous Concepts
The Pin DBI framework (or Pin for short) enables to build easy-to-use, portable,
transparent, and efficient dynamic instrumentation tools. Pin was designed by Intel in
2005 and gives support for the three major desktop operating systems (i.e., Windows,
Linux, MacOS X).
Pin is composed of the three typical DBI components (depicted in Fig. 1): (1)
the application to be instrumented; (2) a dynamic binary analysis tool developed
with Pin, normally termed as Pintool; and (3) the DBI engine. The DBI engine
consists of a virtual machine (VM), a code cache, and an instrumentation application
programming interface (API) invoked by the Pintool. The VM takes as input the native
executable code of the application to be instrumented and uses a just-in-time (JIT)
compiler to insert the instrumentation code, prior to execution. Then, the resulting
instrumented code is saved in the code cache and the execution is transferred to it.
After execution, the JIT compiler fetches the next sequence of instructions to be
executed and generates more code. The emulator unit is in charge of instructions that
cannot be directly executed, such as system calls that require special handling from
the VM [16]. As shown in Fig. 1, the instrumented application, the Pintool, and the
DBI engine are executed in the same memory address space.
Pin has been widely used in the scientific community. As a result, a lot of interest-
ing Pintools have been released. In this regard, it is worth mentioning Pintools that
enable debugging for instrumented applications, such as PinADX [15] or the tool
introduced in [18].
3.2 PinVMShield
architecture (adapted
from [16]) Application Pintool
Virtual Machine
Code cache
(VM)
JIT Compiler
Instrumentation
APIs
Dispatcher
Emulation
Unit
It was released under GNU GPL version 3 license and its source code is publicly
available at https://bitbucket.org/rjrodriguez/pinvmshield/.
PinVMShield is mainly focused on Windows OS and uses two granularity in-
strumentation levels, at the routine level and at the instruction level. This allows the
tool to detect evasive behavior based on Windows APIs, such as checking the pres-
ence of a software debugger though IsDebuggerPresent or CheckRemote
Debugger, or based on specific assembly code instructions (e.g., sidt, sgdt, or
sldt [8]).
PinVMShield currently addresses the evasive behavior performed by software
binaries to detect virtual environments (in particular, VirtualPC, VMWare, and Vir-
tualbox), debuggers (WinDBG, OllyDBG, and ImmunityDebugger), and sandboxes
(WinJail, Cuckoo Sandbox, Norman, Sandboxie, CWSandbox, JoeSandbox, and
Anubis).
In this section, we address some of the evasion techniques that a malware can in-
corporate into its code to detect when it is being executed inside a DBI framework.
Furthermore, to the best of our knowledge, we are the first to provide countermeasures
for those evasion techniques, which are introduced next.
specially designed for the Intel Pin DBI framework and Linux OS running on top of
Intel x86-64 architectures.
Among those evasive techniques for which no countermeasures are provided,
there are few of them particularly relevant, since they may be used as an attack
vector by malware against the analysis environment. In particular, those techniques
are the neglecting of the No-eXecute bit, TLS detection, and code cache signatures
detection. In the rest of this section, we describe each of those evasion techniques
in detail. Furthermore, we also provide PoCs and countermeasures. Unlike [24], we
focus on the Windows OS, as it is the most prevalent system attacked by evasive
malware [21].
To demonstrate the effectiveness of these evasion techniques against Pin, our PoCs
have been integrated as plugins for eXait [7]. Those plugins are publicly released
under GNU GPLv3 and freely available online1 Moreover, our proposed counter-
measures have been integrated in PinVMShield [21].
Neglecting No-eXecute Bit. The No-eXecute (NX) bit is a defense mechanism added
at hardware level to prevent the execution of data memory pages by the processor.
Roughly speaking, the main idea is that no memory zone is simultaneously writable
and executable. This feature is incorporated by almost all the processor’s manufac-
turers, although referred to under different nomenclature (e.g., execute disable bit
in Intel, enhanced virus protection in AMD, or execute never bit in ARM). Recall
that a DBI framework uses a JIT compiler that “recompiles” the application code
in conjunction with the instrumented code (see Sect. 3.1). That is, it needs to write-
then-execute certain memory zones. Therefore, as suggested by Zhechev [24], any
program instrumented by a DBI framework in JIT mode has this protection disabled.
Therefore, an application can detect a DBI framework by allocating a new heap
space, placing the valid code on it, and then executing it. When the application is not
being instrumented, then the execution crashes since the heap memory page has no
permission to execute. However, the execution under a DBI framework will continue
normally.
TLS Detection. Thread Local Storage (TLS) is a feature that allows a developer to
provide unique data for each thread, in vector format, accessed by the process using
a global index. Roughly speaking, TLS variables can be seen as global variables only
visible to a particular thread and not the whole program. In the case of Windows,
those per-thread global variables are maintained in the TLS directory, which is a part
of the Portable Executable (PE) header of an executable image. The PE header is the
header of any Windows executable file. The minimum number of positions in the
directory is guaranteed to be at least 64 for any system, while the maximum number
is 1088 [17]. According to [22], DBI frameworks as Pin allocate and use positions
of that data structure for internal purposes.
Since allocated indexes are shared by any thread in the process, an application
can inspect the number of positions allocated in the TLS directory, revealing the
presence of a DBI framework.
Code Cache Signatures Detection. As reported in [19], there are several artifacts
that a DBI tool unavoidably leaves in memory. In this regard, the authors in [22]
shown that those memory artifacts can be easily detected by any application under
analysis. In the case of Pin, one of those memory artifacts is the hexadecimal pattern
0xFEEDBEAF. This byte sequence is repeated through the memory zones used as
code cache by Pin, as an identification fingerprint.
Therefore, an application can detect those memory patterns by means of memory
scans. The presence of those byte patterns in the memory allocated by a process can
be used as a criterion to indicate the presence of Pin in this particular case.
4.2 Countermeasures
2 See https://github.com/ailton07/PinVMShield.
10 A. S. Filho et al.
In this paper, we have studied three evasion techniques of DBI frameworks. Those
techniques are used as attack vectors by malware to detect an analysis environment.
We have provided small pieces of code as proof of concepts of those techniques, as
well as their countermeasures to reduce the attack surface of DBI frameworks. Those
countermeasures were developed on top of the PinVMShield tool. Both proof of
concepts and countermeasures have been evaluated in a virtualized environment to
prove their effectiveness. Our experiments showed a performance overhead close to
60% by the use of developed countermeasures.
Unlike the work in [24], we have shown that DBI frameworks are suitable for se-
curity purposes: when equipped with the appropriate tools, the requirements needed
in a security analysis context (i.e., stealthiness and isolation) are achieved. How-
ever, the performance overhead introduced by the use of DBI frameworks is still
an issue. Nonetheless, we argue that it is necessary to keep observing the growth
of evasion techniques focused on DBI tools. Despite efforts done to develop DBI
evasion techniques countermeasures, there are still evasion techniques that threaten
the stealthiness of DBI frameworks and pose a challenge to system security pro-
fessionals. For instance, the intrinsic problem of overhead detection that basically
affects to any dynamic analysis tool.
Acknowledgements The research of A. Santos Filho and E. L. Feitosa supported in part by the
FAPEAM Proc. No. 009/2017 and by the Federal University of Amazonas (UFAM). The research
of R. J. Rodríguez was supported in part by the University, Industry and Innovation Department of
the Aragonese Government under Programa de Proyectos Estratégicos de Grupos de Investigación
(project references T21-17R).
12 A. S. Filho et al.
References
1. Arafa, P.: Time-aware dynamic binary instrumentation. Ph.D. thesis, University of Waterloo
(2017)
2. AV-TEST GmbH: The AV-TEST Security Report 2017/2018 (2018)
3. Balzarotti, D., Cova, M., Karlberger, C., Kirda, E., Kruegel, C., Vigna, G.: Efficient detection of
split personalities in malware. In: Proceedings of the Network and Distributed System Security
Symposium (NDSS) (2010)
4. Bruening, D., Zhao, Q., Amarasinghe, S.: Transparent dynamic instrumentation. ACM SIG-
PLAN Not. 47(7), 133–144 (2012)
5. Carpenter, M., Liston, T., Skoudis, E.: Hiding virtualization from attackers and malware. IEEE
Secur. Priv. 5(3), 62–65 (2007)
6. CPU2006, S.: Standard performance evaluation corporation. https://www.spec.org/cpu2006/
(2006) (Online)
7. Falcón, F., Riva, N.: Dynamic binary instrumentation frameworks: I know you’re there spying
on me (2012)
8. Ferrie, P.: Attacks on virtual machine emulators. Symantec Adv. Res. Threat. Res. 1–13 (2007)
9. Greamo, C., Ghosh, A.: Sandboxing and virtualization: modern tools for combating malware.
IEEE Secur. Priv. 9(2), 79–82 (2011)
10. Hron, M., Jermář, J.: SafeMachine malware needs love, too. https://www.virusbulletin.com/
uploads/pdf/conference_slides/2014/sponsorAVAST-VB2014.pdf (2014) (Online)
11. Kaspersky lab: Kaspersky lab detects 360,000 new malicious files daily—up 11.5% from
2016. https://www.kaspersky.com/about/press-releases/2017_kaspersky-lab-detects-360000-
new-malicious-files-daily (2017) (Online)
12. Kirat, D., Vigna, G., Kruegel, C.: Barecloud: Bare-metal analysis-based evasive malware de-
tection. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 287–301. USENIX
Association, San Diego, CA (2014)
13. Kumar, A.V., Vishnani, K., Kumar, K.V.: Split personality malware detection and defeating in
popular virtual machines. In: Proceedings of the 5th International Conference on Security of
Information and Networks (SIN), pp. 20–26. ACM (2012)
14. Li, X., Li, K.: Defeating the transparency features of dynamic binary instrumentation. BlackHat
US (2014)
15. Lueck, G., Patil, H., Pereira, C.: PinADX: An interface for customizable debugging with
dynamic instrumentation. In: Proceedings of the 10th International Symposium on Code Gen-
eration and Optimization (CGO), pp. 114–123. ACM, New York, NY, USA (2012)
16. Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J.,
Hazelwood, K.: Pin: Building customized program analysis tools with dynamic instrumen-
tation. In: Proceedings of the 2005 ACM SIGPLAN conference on Programming Language
Design and Implementation, PLDI ’05, pp. 190–200. ACM, New York, NY, USA (2005)
17. Microsoft: Thread Local Storage. https://msdn.microsoft.com/en-us/library/windows/
desktop/ms686749(v=vs.85).aspx (2018) (Online)
18. Pan, H., Asanović, K., Cohn, R., Luk, C.K.: Controlling program execution through binary
instrumentation. SIGARCH Comput. Archit. News 33(5), 45–50 (2005)
19. Polino, M., Continella, A., Mariani, S., D’Alessio, S., Fontata, L., Gritti, F., Zanero, S.: Mea-
suring and Defeating Anti-Instrumentation-Equipped Malware. Detection of Intrusions and
Malware and Vulnerability Assessment, pp. 73–96. Springer International Publishing, Cham
(2017)
20. Rodríguez, R.J., Artal, J.A., Merseguer, J.: Performance evaluation of dynamic binary instru-
mentation frameworks. IEEE Lat. Am. Trans. (Rev. IEEE Am. Lat.) 12(8), 1572–1580 (2014)
21. Rodríguez, R.J., Gaston, I.R., Alonso, J.: Towards the detection of isolation-aware malware.
IEEE Lat. Am. Trans. 14(2), 1024–1036 (2016)
22. Sun, K., Li, X., Ou, Y.: Break Out of The Truman Show: Active Detection and Escape of
Dynamic Binary Instrumentation. Black Hat Asia (2016)
Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks 13
23. Vishnani, K., Pais, A.R., Mohandas, R.: Detecting & defeating split personality malware. In:
Proocedings of the 5th International Conference on Emerging Security Information, Systems
and Technologies (SECURWARE), pp. 7–13 (2011)
24. Zhechev, Z.: Security evaluation of dynamic binary instrumentation engines. Master’s thesis,
Department of Informatics Technical University of Munich (2018)
Single Sign-on Implementation:
Leveraging Browser Storage for
Handling Tabbed Browsing Sign-outs
1 Introduction
Today, every entity (university, organizations, and businesses, etc.) provides multiple
web-based services. The user population of an entity changes dynamically, that is,
existing users leave and new users are added. For user conveninces, the Information
Technology (IT) team of the organization provides Single Sign-on (SSO) service to its
users. A user of an entity that provides SSO service needs only one set of credential
(say, username and password) to access all available services.1
In a SSO service system, a (physical or logical) Identity Provider (IDP) verifies
credentials of all users who want to receive any web-based service provided by the
entity. While a user is verified for one of the many web-based services, the user can
access all other services authorized to the user because the IDP maintains an active
IDP session of the user in the user’s browser.
Currently, SSO service has expanded to individual Web sites, where popular social
networking sites (such as Facebook, Google, or LinkedIn) work as IDP. This concept
is referred to as social login. All the security issues common to SSO are also present
in social login system.
In this paper, we investigate how single sign-on implementation on tabbed brows-
ing scenarios may risk the information security. The rest of the paper is organized
as follows, key components of SSO, how tabbed browsing works, common browser
storage mechanisms, how multiple tabs handle information during SSO process,
security pitfalls, possible solutions to avoid information security incidents during
SSO.
Many commercial implementations of SSO follow OAuth 2.0 standard [1], a Secu-
rity Assertion Markup Language (SAML)-based reference architecture. SAML is a
XML-based framework [2] for communicating user authentication, entitlement, and
attribute information between Identity Provider (IDP) and Service Provider (SP) via
web browser.
Three main components in a SAML-based SSO implementation are:
(i) Web browser of the user,
(ii) Identity provider—(often) authentication server of the user’s organization, and
(iii) Service provider—the application that the user gets service.
Figure 1 illustrates the interaction model of the components in the SSO imple-
mentation. Details about SSO components and related information security issues
have been presented in earlier work (see [3] and references therein).
2 Tabbed Browsing
browser window users can open multiple web pages simultaneously, one for each
web page. With the help of tabbed browsing, users can stay organized and it provide
them with an organized and a convenient browsing experience.
When a user signs in to a Web site on one tab and opens another page from the
same Web site on a different tab, both the tabs share the same session information
and the user is not required to sign in again. The user adaptation for tabbed browsing
is also very positive, because he/she can keep all their browsing activities organized
in a single window [4].
Figure 2 shows how a tabbed browser appears to users. Whenever the user clicks
on browser icon, such as Mozilla Firefox, Internet Explorer, or Google Chrome, the
browser application opens with the default tab. The default tab is highlighted in the
Fig. 2 as ‘Browser Tab 1.’ If the user would like to open additional web pages, it
can be accomplished by opening more tabs. Each tab displays a web page. If the
user decides to have any of the tabs separated in a new window, he/she can do so
by dragging it as out of the main window; this transforms the selected tab to a new
browser window.
18 L. Ramamoorthi and D. Sarkar
3 Client-Side Storage
forthcoming sections, we will discuss how current SSO implementations rely more
on cookies and the problems associated with it. We will also discuss few possible
solutions leveraging other client-side storage methods such as IndexedDB API.
In this section, we discuss the process flow during a single sign-on, sign-out activity
as seen from a web browser’s perspective. For the discussion here, we assume that
the SPs and the IDP belong to different platforms (either physically or logically).
Whenever a user attempts to sign-on to any of the SPs, the user is redirected to the
IDP.
For ease of description, complete discussion is divided into cases:
(i) the user has no active session with any of the SPs and
(ii) the user has one or more active session with some SPs.
.
Here, the user has no active session with any SP and the browser has no record of
active SSO. Once a user requests for a service via the browser, the SP checks for
possible active service session with it; because it is an initial request, the SP requires
that the user be authenticated. For this, the SP finds the source of request (Where are
you from?—WAYF) and redirects the browser to the user’s IDP.
As soon as the browser is redirected from the SP to the IDP for authentication, the
IDP checks the browser for existing active IDP session. Since no IDP session exists,
the IDP challenges the user for valid credentials and displays the sign-on page; then,
the user provides sign-in credentials for possible sign-on. Once the user provides
valid credentials (which could be a simple user ID and password or a complicated
multi-factor authentication), IDP creates a new active session and asserts it on the
browser. IDP stores the information in the browser cookies.
In addition, the IDP creates a SAML record response that contains assertion
information of the authenticated user for the browser. The assertion information in the
SAML record contains information about users organization as well as authorization
level. The browser forwards the IDPs SAML record to the service provider. After
receiving the SAML assertion info, the SP creates a session for the user; at this point,
a service session is initiated. The service provider stores the information either in
local storage or in the browser cookies. Figure 3 shows a logical view of the browser
storage after the service session is initialized. The tab shown in the figure is the
default tab, where the SP session is accessed by the user.
20 L. Ramamoorthi and D. Sarkar
As presented, in the SSO approach for an initial sign-in, the browser coordi-
nates communication between the SP and IDP. Moreover, browser maintains session
information for both the SP and IDP. As we discussed in Sect. 2, the user can access
multiple pages of the same SP via. different browser tabs.
Let us consider two scenarios where a user accesses services in a tabbed browsing
fashion,
(1) Scenario 1: the user access to a new web page of the SP where she is currently
signed-in and
(2) Scenario 2: the user tries to access a new web page of a SP where she is not
currently signed-in, but IDP of the new SP is same as the IDP of the SP where
she is currently signed-in.
Scenario 1: Once a user signs in to a service provider’s Web site, she can access
another page of the same Web site opening a new browser tab. Figure 4 shows storage
structure when two browser tabs of one SP is accessed. Both the tabs Tab1 and Tab2
access the SP1 session information.
Scenario 2: In this tabbed browsing scenario, the user signs in for a service and opens
a new tab for another service. Let us consider services SP1 and SP2 , both leverage
authentication of the same IDP. Initially, user has signed on to service SP1 , and a
while later, user wishes to open another browser tab and access another service say
SP2 . The service SP2 also leverages the authentication provided by the same IDP of
the organization.
Figure 5 shows the logical view of the browser storage and how the session infor-
mation is accessed by multiple tabs.
Even though the browser allows access to SP2 without requiring user to provide
credentials, there is a risk in this situation, where the user might sign out of one service
provider and assume that she will be signed out from all other service providers.
The critical consideration here is the status of IDP session may remain active even
after user signs out from SP. First, we consider possible situations that arise, because
of sign-out by the user.
In this section, we will discuss the sign-out activity by the user in a tabbed browsing
scenario. The key reason we discuss the sign-out activity for parallel tabbed sessions
is that, the user does not explicitly sign in when she opens a request in new tab. It is
possible that the user can assume sign-out activity and also does not require explicitly
signing-out from all the related tabs. Here, there are two cases of sign-out, the user
might encounter in the tabbed browsing session.
Case 1: When a user signs out from a service from a browser tab, the SP session is
invalidated. However, when the user accesses the same service via another tab, the
browser does not require user to sign in again, because the IDP session is still active.
So during the second time request of a service via a different tab, the service retrieves
22 L. Ramamoorthi and D. Sarkar
SAML from the IDP session and does not explicitly challenges the user for sign-in
credentials.
Hence, the scenario is bit confusing for the user because the user may assume that
the sign-out from one tab of a service signs out all the active sessions, whereas in the
actual scenario of SSO implementation as long as IDP session is active, the service
is still accessible without requiring user credentials.
Case 2: Assuming two services SP1 and SP2 leverages the service of the same IDP,
when the user requests for SP2 after signing-out from SP1 , the browser does not
prompt for user sign-in credentials. This is because SP2 could get the information
from the IDP session and will not prompt the user for sign-in credentials.
As shown in Fig. 5, irrespective of how many different services being accessed,
the IDP session is shared by all the services.
There are many advantages of SSO. But still there are concerns about the implemen-
tation that revolves around the security and privacy of user information [7]. In this
section, we discuss how application developers and SSO service developers prevent
hidden active sessions.
This would forewarn the user that there might be other active and open SP sessions
which the user has to manually sign out.
This notification would be very helpful in a tabbed browsing scenario where when
the user signs out from one tab the service provider can notify that there might be
other tabs that are active. The sign-out confirmation link can also include a trigger
or link that invalidates the IDP session. This will reduce the risk to a greater extent
when the user opened multiple tabs for multiple service sessions.
Another solution is, whenever the user signs out of a service, the SP application
sends a notification to the IDP that triggers a sign-out process of the IDP session. So
Single Sign-on Implementation: Leveraging Browser Storage … 23
in this case, the IDP session becomes inactive. Any other users trying to access the
service has to sign in with their own set of credentials.
With modern browsers and advanced browser scripting technologies, the applica-
tions can be implemented where in case if the user closes the browser window,
the SP session variables are invalidated. Not many users are aware of the fact that
closing a browser window is not the same as a sign-out activity. Implementing auto-
invalidation of a session during a window closing event helps where the users do
not perform explicit sign-out. This scenario is very appropriate implementation in
situations where multiple users accessing a common computer, such as in public
library.
The auto-trigger IDP sign-out during a service provider sign-out is very effective
during tabbed browsing scenario as well, where the browser can give a quick noti-
fication to the user and triggers a IDP sign-out. This way the user can feel secure
about the sign-out activity that no one can access any services without a user sign-in
credentials.
So, when new users open the browser, they are prompted for their credentials.
The following proposal emphasizes on browser to handle the security gaps discussed
above. In this specification, we create a new module called SSO Manager Module.
This module can be implemented as a browser extension. This module does not
manipulate or add any additional features to IDP or SP applications. This module
provides a browser-based mechanism that ensures a safe sign-out process.
SSO Manager module uses a data object named Active SSO SessionsInfo that
contains essential information about SP and IDP sessions. Whenever a sign-out
event happens, the module will effectively handle the event either by automatically
signing-out the user from the session, or displaying a notification for input from the
user.
The SSO Manager module is a web browser extension. It saves the information
about the active IDP Sessions and the SP sessions that leverage the IDP. To store the
information, SSO manager leverages IndexedDB storage of the web browser.
24 L. Ramamoorthi and D. Sarkar
The main advantage of IndexedDB is that it helps in organizing the IDP-SP hier-
archy. Following is the proposed schema for the SSO Manager application.
The SSO Manager stores the IDP Session metadata in the IndexedDB.
Figure 6 shows us the schema of data stored by the SSO Manager module. Every
record holds metadata about the IDP, name of the IDP, IDP’s sign-out URL, and IDP’s
timeout threshold. Each IDP Info record contains an array of service provider’s
meta data. Every SP metadata contains the information about the service provider
such as name or id, SP’s timeout threshold, and SP’s sign-out URL. As we discussed
in Sect. 2, users may access the services via multiple browser tabs. Hence, the SP
Info data contains the list of tabs that the SP is currently accessed. The structure
Tabs contains tab id, parent window id, and the URL accessed by the user.
Whenever a user tries to sign in via. SSO, the SSO Manager gathers information
from the browser and stores it in its schema. The functionality of the SSO Manager
module is described in the following sections.
In continuation of above scenario, user X would like to access assignments and course
information simultaneously on two browser tabs. So she opens the LMS via another
tab. The SSO Manager recognizes the event of open tab and modifies the existing
entry to add the information about newly opened tab.
Listing 1.3 shows the additional information that has been added about the newly
opened browser tab.
Listing 1.3 Database Entry with additional tabs
1 {
2 " IDP Name " : " U n i v e r s i t y A - ID and Auth " ,
3 " IDP T i m e o u t T h r e s h o l d " : " 4 5 m " ,
4 " IDP Sign - out URL " : " https : // univA . com / auth / s i g n o u t " ,
5 " SP Info " : [
6 {
7 " SP Name " : " S m a r t S t u d y LMS " ,
8 " SP T i m e o u t T h r e s h o l d " : " 3 5 m " ,
9 " SP Sign - out URL " : " https : // lms . s s t u d y . com / s i g n o u t " ,
10 " Tabs " : [
11 {
26 L. Ramamoorthi and D. Sarkar
Similar to the additional tabs, additional services are handled by the SSO Manager.
In the scenario, where the user would like to access another service leveraging the
same IDP, the information is updated.
Single Sign-on Implementation: Leveraging Browser Storage … 27
If the user X opens the another service (SP2 ) on a new tab, the service application
does not requires the user to sign-in again. It leverages the information available
from existing active IDP session.
Here, in this scenario, the SSO Manager module adds the information of SP2 to
the SSO Sessions Info entry. The sample entry is listed in Listing 1.4.
The key purpose of the SSO Manager is to efficiently manage the sign-out scenarios.
If the user signs out of a service from a tab, SSO Manager interprets the event and
displays a prompt to the user about other active tabs of the same service provider.
In the student user example, if the student chooses to sign out from the assignments
tab, SSO Manager prompts a message for input from the user regarding all the active
tabs and services for the IDP. Once the user confirms about signing-out of all the
services, SSO Manager removes the SSO Sessions Info entry, once the user signs
out from the IDP and SPs.
SSO Manager can also handle situations that arise from accidental closing of
browser or tab windows. If there are no browser windows in open state, the SSO
Manager can be configured to invoke the sign-out routine of the IDP and all the
respective services.
7 Conclusion
With growing cybersecurity attacks in the digitized world, everyday hackers and
malicious actors are looking for exploiting access credentials of naive users. Getting
an access to one user’s account opens a multitude of possibilities for hackers, such
as phishing attacks, ransomware attacks, data corruption, and so on. In this paper,
we analyzed single sign-on (or federated identity management) process is handled
in tabbed browsing environment, identified potential security compromise scenarios,
and proposed a solution to avoid such scenarios. Therefore, it is essential to com-
pletely understand the process of single sign-on and eliminate the gaps for a safer
access control.
References
1. Hardt, D.: The OAuth 2.0 authorization framework, RFC 6749. Internet Engineering Task Force
(2012). https://tools.ietf.org/html/rfc6749
2. Kemp, J., Cantor, S., Mishra, P., Philpott, R., Maler, E.: Assertions and protocols for the OASIS
security assertion markup language (SAML) v2.0. OASIS (2015). http://saml.xml.org/saml-
specifications
28 L. Ramamoorthi and D. Sarkar
3. Ramamoorthi, L., Sarkar, D.: Single sign-on demystified: security considerations for developers
and users. In: Rocha, Á., Adeli, H., Reis, L.P., Costanzo, S. (eds.) Trends and Advances in
Information Systems and Technologies, pp. 185–196. Springer International Publishing, Cham
(2018)
4. Dubroy, P., Balakrishnan, R.: A study of tabbed browsing among Mozilla Firefox users. In:
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI ’10, pp.
673–682. ACM, New York, NY, USA (2010)
5. Mozilla developer network - web storage API. https://developer.mozilla.org/en-US/docs/Web/
API/Web_Storage_API
6. W3c docs - web cryptography API (2017). https://www.w3.org/TR/WebCryptoAPI/
7. Sun, S.T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., Beznosov, K.: What makes users
refuse web single sign-on?: An empirical investigation of openid. In: Proceedings of the Seventh
Symposium on Usable Privacy and Security, SOUPS ’11, pp. 4:1–4:20. ACM, New York, NY,
USA (2011)
Cybernetic Dependency Capacity
Jorge Barbosa
J. Barbosa (B)
Coimbra Polytechnic – ISEC, Coimbra, Portugal
e-mail: jorge.barbosa@isec.pt
Portuguese National Defense Institute, Lisbon, Portugal
1 Introduction
The benefits to civil societies resulting from the massive use of information tech-
nology in all aspects of that society, namely service provision, government, central
and local administration, banking and finance, transport management, logistics, food
and fuel distribution, etc. are now an undisputed reality in all minimally developed
countries. It can even be said that it is no longer possible at the present for those
countries to survive without such means and facilities provided by the information
society.
The maintenance of the information society and the means necessary for its oper-
ation are therefore of paramount importance. Their allocation or destruction is there-
fore unthinkable in the current development context.
Cyber-criminal activities are usually associated with common cybercrime, i.e.,
activities related to the cybersecurity of individuals or companies. However, similar
actions, with a larger scale and scope, can be used in cyber-actions against state
sovereignty, known as cyberwarfare actions.
Actions, even relatively small and isolated in their range and effects, such as acts
by hackers, which either individually or in small groups, that trigger cyber-actions
against individuals or companies, can have relatively serious consequences.
The issues of great concern to many security and defense agencies and services are
that they do not come from these actors, but are orchestrated and unleashed by other
actors, notably countries, which have specialized units. If concerted and large-scale
action is taken against a country with the exclusive use of computers means, it can
profoundly affect the IT systems of that other country, in particular, those linked to
its critical infrastructures. The situation could become quite serious for the country
under attack and may even lead to its paralysis, subjugation and loss of national
sovereignty.
Cyberwarfare [1, 2] designates this type of action. Given its intimate connection
with the information society, we will then analyze the implications that a lesser or
greater dependence and development of the IT may have in the countries, in case to
be targeted of a cyberwar.
Those cyberwarfare actions can affect not only to military targets and to instal-
lations but also to civilian targets, such as critical infrastructures linked to the func-
tioning of modern civil societies, seriously affecting the lives of such societies. Even
if there is no great physical destruction, both civilian and military, and therefore the
losses do not seem to be significant because they are not visible, for the common
citizen this “modern” war can be as harmful as the classic wars that occurred in past
centuries. Their daily and habitual experiences may be deeply affected, in particular,
by taking away the benefits and comforts they currently enjoy.
Cybernetic Dependency Capacity 31
In what concerns to security and defense of states, and in one conventional perspec-
tive, the most relevant actions are those that are carried out with the aim of triggering
actions that undermine the designated sovereignty of the states. In this perspective,
two main groups of actions are considered: Those that can be considered actions of
common criminality, although they can be quite disturbing of the daily experience,
like actions of domestic terrorism; or the actions that disturb the order and the civil
life of the society of that country to the point of endangering the sovereignty of the
states. The border between these two types of actions may be tenuous and so it is
often difficult to establish.
In most democratic states, according to this separation, the first set of these actions
are dealt with by police or internal security agencies (and in the case of actions with
external origin in collaboration with other external security organs). For the second
set of actions, as they are detrimental to the national sovereignty of the states, are
treated by the organs that defend this sovereignty, that is, by the armed forces of the
states.
This model is also usually followed with regard to actions triggered by the use
of cybernetic means, i.e., actions triggered in cyberspace. For the particular char-
acteristics of this environment, there are also very particular and specific consider-
ations that have to be addressed. First, the difficulty of separating and classifying
the actions initiated soon in the establishment of the classification frontier of such
actions. Physical borders, as in the case of conventional external aggressions, do
not limit actions in cyberspace. In addition to the possible use of entities directly
linked to foreign governments, organizations or individuals acting on their own may
also trigger cyber-actions that threaten national sovereignty. They will not be sim-
ple cybersecurity actions, but cyberwarfare actions. The means used in common
cybersecurity actions and in cyberwarfare actions may be similar, but the scope and
latitude of cyberwarfare put the sovereignty of the states into question, hence being
classified in this particular way. Thus, many states have developed within their con-
ventional armed forces cyber corps to deal with such cyber-actions. At the same time,
the internal intelligence and security forces have developed specialized units to deal
with common cybersecurity actions.
In the case of national sovereignty, it may be understood by the states affected
by such actions, not to divulge much the occurrence of cyber-actions of which they
were targeted. In this way, there is not much information about such acts and what
there is may not be reliable. In the literature, by its impact and apparent, there are
references to some of these actions, indicated as having been perpetuated by groups
or individuals against other states or perpetuated states against other states or even
regions of the same state, in situations of, for example, attempts of political separation
by these regions. Many other cyber-attacks are may be due to the rise of “no state”
hackers groups.
The most referred attack methods used in the actions identified with “no state”
groups as Traffic Redirection and Web sites defacement. The most attack methods
32 J. Barbosa
identified with the actions of states are distributed denial of service (DDoS), viruses
and trojans and a specific cyberweapon, such as those used in the famous action
against Iran known as Stuxnet, [3]. The DDoS attacks are also used by “no state”
groups.
In the literature, [1, 4, 5] are reported many cyber-attacks actions: (1) USA and
South Korea: On the July 4, 2009; (2) Iran: During the disputed Iranian presidential
elections of June 14, 2009 and the most cyber-action know by Stuxnet; (3) Tatarstan:
In June 2009, the president of Tatarstan’s Web site was knocked offline and Internet
access was lost; (4) USA: On April 21, 2009, the Wall Street Journal reported that
security around the Pentagon’s multi-billion-dollar Joint Strike Fighter project was
compromised; (5) Kyrgyzstan: On January 18, 2009, a DDoS attack shuttered two
to three of the nation’s four ISPs for several days; (6) Israel and the Palestinian
National Authority: In December 2008 along with Israel’s military action designated
Operation Cast Lead against Hamas; (7) Zimbabwe: In December 2008, a action
reported by Concerned Africa Scholars; (8) Myanmar: On September 23, 2008, the
government launched DDoS attacks against three Web sites that support the monks
and many others.
The above actions can be considered at the border between common cybersecurity
actions and cyberwarfare actions. Better separation will be achieved if it is precisely
determined those as put in danger the national sovereignty of the affected states.
Many other cyberwarfare actions are allegedly attributed to Russia against Estonia,
Georgia and Ukraine. These cyberwarfare actions were triggered using DDoS, SQL
Injection, SQLi, and cross-site scripting (XSS) attacks.
In the strict sense of cyberwarfare, are used specific cyberweapons. These cyber-
weapons are developed based on the exploration of computer systems vulnerabilities,
namely not yet known vulnerabilities. These vulnerabilities are known as zero-day
vulnerabilities, ZDV, and based on these vulnerabilities are developed specific appli-
cations named zero-day exploits, ZDE, which can affect and even paralyze the com-
puter system affected by this ZDV. The most known cyberwarfare action, known
as Stuxnet, used cyberweapons, which exploit ZDV’s in the computer systems of
nuclear centrifuges of Iran, [3].
As far as conventional wars are concerned, on a primary level, the military and
political strategists and leaders of a country equate the potential, in the face of a
possible and determined enemy, through two factors: the “Attack Capacity” and the
“Defense Capacity” of both your country and that of the eventual enemy country.
From the consideration of these capacities, they infer who, in the case of a con-
ventional war between these two countries, theoretically, can become the winner or
the loser of the same.
In the case of a cyberwar, these considerations have to be different, given the
much more complex scenarios. The key factors to be taken into account should be
Cybernetic Dependency Capacity 33
not only the two above-mentioned, adapted to the cyberwar, but three factors, namely:
“Cybernetic Attack Capacity,” “Cybernetic Defense Capacity” and a third and new
factor regarding conventional warfare, the “Cybernetic Dependency Capacity” of the
countries involved [6].
Then, the Cybernetic Dependency Capacity of a country, as the dependency that
this country and its society have on the IT organization and the complexity and
density of connections and interoperability between their IT systems. The larger this
organization and the complexity and density of connections of its computer systems,
the greater the country’s dependence on IT and the greater vulnerability to eventual
computer crashes. A serious computer fault in an important critical computer system
can be very severe for any modern country and, in extreme cases, can even paralyze
the country or sectors thereof.
Modern and developed Western societies, as well as those of some Asian countries,
have a very high Cybernetic Dependency Capacity and as such are extremely sensitive
to problems in their computer systems, in particular, those resulting from cyberwar.
Less-developed societies are normally often underdeveloped in terms of the mas-
sive use of information technology in the various organizational aspects of that soci-
ety. This causes them to have a very low dependency cybernetic capacity. Because
they do not rely heavily on computing for their day-to-day operations, they are not
so sensitive to computer glitches, nor do they have computer “targets” to attack.
It can even be said that it is no longer possible, at present, for the countries to survive
without such means and facilities provided by the information society.
Then, the maintenance of the information society and the means necessary for its
operation are, therefore, of paramount importance. Their allocation or destruction is
therefore unthinkable in the current development context. Actions, even relatively
small and isolated in their range and effects, such as acts by hackers, which either
individually or in small groups, trigger cyber-actions against individuals or compa-
nies, can have relatively serious consequences, [1, 7].
The issue of great concern to many security and defense agencies and services is
that they do not come from these actors, but are orchestrated and unleashed by other
actors, notably countries, which have specialized units. If concerted and large-scale
action is taken against a country by means of the exclusive use of computerized
means, it can profoundly affect the IT systems of that other country, in particular,
those linked to its critical infrastructures, [5, 8].
Given its close dependence, the level of development of the information society
in a given country may make it very likely to be heavily affected by cyberwarfare.
This aspect is amplified by the fact that even in technologically advanced countries
and, as such, very dependent on computer systems for the most diverse and banal
activities, a large part of its population still has a very big illiteracy in computer
34 J. Barbosa
operation. This makes many of the computer systems unprotected or poorly protected
by seemingly harmless actions of their users and as such permeable to cyberwarfare.
The vulgar actions of hacking are often minimized and typical considered as
actions in the scope of cybersecurity, related to attacks against personal or corporate’s
computers. However, they may be hiding real cyberwarfare actions. In particular,
they may be masking pre-preparation actions for future cyberwarfare actions, such
as DDoS attacks on government, military or critical infrastructure installations. The
computer systems thus affected stay then in standby. If they necessary to use them
for a cyberwar will already be prepared.
Due to these minimizations of the importance of the attacks or their misclassifica-
tion, this preparation is made without the knowledge of the legitimate owners of these
systems. This failure to correctly consider or classify such acts, further increases the
criticality and permeability of systems greatly affecting the Cybernetic Dependency
Capability.
Thus, a country’s less or greater dependence on the information society and the
computer skills of its population, namely your education and sensitivity for the
computer security, has a direct implication on the degree of cyberwarfare permeability
of the cyber-attacked countries.
The situation could become quite serious for the country under attack and may
even lead to its paralysis, subjugation and loss of national sovereignty, [4].
Considering only the cyberwarfare, i.e., not considering conventional wars at all, due
this great dependence of the information society, an underdeveloped country can be
a cyberwar winner and a highly developed country can be a loser in the same war,
[6]. This is a very interesting paradox.
This may occur if the less-developed country has minimal cyber-attack and cyber-
defense capabilities in such a way that it can inflict significant damage on the com-
puter systems, especially the critical ones, in the opposing country. This may also
have good cyber-attack capabilities, but as the other country does not have a min-
imum of IT structures, they do not have what to attack in the other less-developed
country in order to paralyze it from a computer point of view. However, the developed
country, attacked in the cyberwar, can get their systems deeply affected and since it
is very dependent on these systems, it can even paralyze.
Of course, the consideration of the conventional war component in this equation
can greatly alter this end result, especially if, as usual, the most developed country
has minimum conventional warfare capabilities and so can retaliate conventionally
and inflict significant damage on its opponent. However, this question about the
use of conventional means of warfare can be critical if the two countries are not
geographically close. The displacement and positioning of conventional media can
Cybernetic Dependency Capacity 35
be difficult, time-consuming and late in the theater. Military logistics may have even
been affected by cyber-attacks, which would further affect conventional operations.
From a mere speculative point of view and considering some recent developments
in relations between these two countries, such a situation could hypothetically occur
in a strictly cybernetic confrontation between the USA and North Korea.
American society is a lot, if not totally, dependent on information technology for
its functioning. For its part, and to the best of our knowledge, North Korean society
is not.
In the country, the informatics is considered incipient and even the small use of
computing means is practically done by the governmental members, which are very
controlled.
In addition, the computer connected to the outside of this country is practically
non-existent, which means that there are practically no “doors” to the entry of cyber-
attacks. According to intelligence, North Korea has relatively developed cyberwar-
fare capabilities and there are several specialized and highly trained military units
for cyberwarfare, i.e., cyber-acts. The hypothetical considerations made in respect
of these two countries could be made on a few others.
An obvious example of the influence of Cybernetic Dependency on cyberwar-
fare is the case of Estonia. Shortly after Estonia became independent of the Soviet
Union, it promoted a policy of development and modernization of the country. One
of the biggest stakes was the massive introduction of information and knowledge
technologies. With this policy, it has become one of the countries with most modern
computerized public services. Numerous public administration services, banks and
services have emerged, based on computer systems with which Estonian citizens
can interact directly. Considering Cybernetic Dependency, Estonia became a coun-
try with a high cybernetic capacity for dependency, i.e., a country potentially very
vulnerable to cyber-attacks. On 27 April 2007, cyber-actions was launched in the
form of violent DDoS attacks targeting a number of IT systems in Estonia, including
important government Web sites, parliament, banks and the communications sys-
tem. These actions became known as the “Estonian Cyberwar.” It is assumed that for
these DDoS attacks, a net bot was created consisting of 85,000 servers having the
attacks lasted three weeks and having been attacked sixty Web sites and the almost
stoppage of the country, [3]. These cyber-actions have never been officially assigned
to any country. However, the Estonian Foreign Minister attributed the attacks to Rus-
sia, which always denied their official participation in them and considered them as
actions of individuals who acted as “Patriotic Hackers.” Eventually, if the country
had not promoted this development policy of its IT, it would not have become a
desirable and possible target for these actions, which were facilitated by the fact that
the country had a high Cybernetic Dependency Capacity.
The use of computerized means in cyberwars could also be considered by non-
states or by terrorist organizations. Theoretically, these states or organizations do not
have the capabilities they can use to trigger conventional attacks to countries that are
minimally capacitated from a conventional point of view. This lack of conventional
capabilities, on the part of such countries and organizations, could result from the
36 J. Barbosa
However, the main problem concern with cyberwarfare, and what the usual mea-
sures of protection are difficult to prevent, is the use of specific weapons against
the computer systems that control these critical structures, in particular the cyber-
weapons developed to exploit the vulnerabilities not known in those systems, i.e.,
the zero-day exploit. It may even be impossible to take preventive and protective
measures for these cyberweapons.
The use of ZDE is a major challenge to the cybernetic resilience of any country.
6 Conclusion
The advantages to civil societies of countries, resulting from the massive use of
information technology, are now an indisputable reality in all minimally developed
countries. One can even say that it is no longer possible for modern civil societies to
survive without the means and facilities provided by the information society.
Then, the maintenance of the information society and of the means necessary
for its operation is therefore of paramount importance, since the countries could be
paralyzed by their affectation or even their destruction.
This dependency has created what we call as Cybernetic Dependency Capacity.
This factor, in our approach, allows us to consider the influence in the daily experience
of a civil society due to the affectation, by cyberwarfare actions, of country’s computer
systems, namely those related to the control of its critical infrastructures. The greater
this Cybernetic Dependency Capacity, the more exposed that country is to the effects
of actions affecting those systems. Generally, and only from the point of view of
cyberwarfare, a country very dependent on the information society is, maybe, much
more vulnerable to these actions than others less dependent.
This conclusion leads us to another, which translates into a very interesting para-
dox: strictly considering cyberwar, that is, not considering conventional war at all,
an underdeveloped country can be a winner in a cyberwar and a developed country
may be losing in this same war.
The possible use of cyberweapons by non-states or by terrorist organizations was
analyzed. From this analysis, we concluded that its use, by such organizations is quite
possible and may be desirable. The use of these means to attack certain countries
would be more viable to them, than the use of means of conventional warfare. As
the Cybernetic Dependency Capacity of such non-states and organizations is very
low if not null, cyber-retaliation against these countries and organizations in order
to cause them harm would be practically impossible. Then, the very low Cybernetic
Dependency Capacity becomes an advantage for such groups. However, such coun-
tries would have to overcome many constraints in order to trigger cyber-actions on a
large scale, which is virtually impossible for them. In this way, their cyber-actions, to
occur, should be limited to isolated attacks on well-selected targets, namely critical
infrastructures, which would nevertheless create difficulties for modern societies,
especially Western ones, strongly based on information society and as such with a
great Cybernetic Capacity of Dependency. Then, the cybernetic activities of these “no
38 J. Barbosa
Acknowledgements I thank the Portuguese National Defense Institute as well as the ISEC/IPC
for the support and facilities granted.
This paper is based on the work Final Report of National Defense Course, done by the author in
the Portuguese National Defense Institute.
References
1. Carr, J.: Inside Cyber Warfare, 2nd edn. O’Reilly Media Inc., Sebastopol, CA, USA (2012)
2. Ranger, S.: What is cyberwar? Everything you need to know about the frightening future
of digital conflict. https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-
of-online-conflict/ (2018). Acedido em 25 Setembro 2018
3. Zetter, K.: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon.
Crown Publishers, NY (2014)
4. Clark, R.A., Knake, R.K.: Cyber War: The Next Threat to National Security and What to do
About. HarperCollins Publishers Inc, New York (2010)
5. Kostopoulos, G.K.: Cyberspace and Cybersecurity. CRC Press, Taylor & Francis Group, New
York (2013)
6. Barbosa, J.:Pequenas potências militares convencionais, Grandes potências militares cibernéti-
cas - Abordagem da utilização de meios informáticos na defesa/ataque militar moderno. IDN,
Lisboa (2018)
7. Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar—What Everyone Needs to Know.
Oxford University Press, NY (2014)
8. Wittkop, J.: Building a Comprehensive IT Security Program. Apress, Bolton, USA (2016)
9. Ayala, L.: Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and
Response Guide. Apress, New York (2016)
Portuguese Concerns and Experience
of Specific Cybercrimes:
A Benchmarking with European Citizens
João Vidal Carvalho, Álvaro Rocha, António Abreu and Avelino Victor
Abstract The increasing use of a variety of devices that can access the Internet has
contributed to the overall growth of Internet use. The growth of Internet use also leads
to a general increase in cybercrime concerns as well as the number of users’ victims
of this permanent threat. This reality is also very present in Portugal where there is a
sense of lack of control and combat of this kind of cyber-threats. In this context, it is
important to know some indicators associated with cybercrime, in order to take the
best measures/actions in a reasoned way, to combat this phenomenon. This article
presents the results of a study carried out in 2017 by the European Commission,
whose analysis helps to understand the Portuguese positioning in the concerns and
experiences about cybercrime, in relation to the average of the European Commu-
nity citizens. Analysing this study, it was possible to perceive that the Portuguese’s
concerns about cybercrime are in line with the average of the European citizens,
although the percentage of Portuguese experienced these attacks is, for now, below
average. Based on these results, it is possible to identify some public policies that
aim to mitigate this phenomenon.
1 Introduction
of cybercrimes that EU citizens and the Portuguese in particular have and the level
of concern they feel about this type of crime.
In this article, we will initially present the description of a study carried out in
Europe in 2017 about cyber security. In the next section, the values of concerns
and experiences of ten cybercrimes will be compared between Portuguese and the
European citizen’s average. Finally, we will present the discussion about the results
of the study, with a view to identify measures that have mitigated this phenomenon.
The Special Eurobarometer series on cyber security is the most important resource for
learning about cybercrime in Europe [1]. The importance of this resource stems from
the treatment and analysis of representative data of different types of cybercrimes
collected in the last five years of the 28 member states of the European Commu-
nity. The most recent report covers a wide range of threats and aims to understand
European citizens’ experiences and perceptions of cyber security issues. That is,
the survey adopted in this report analyses the nature and frequency of Internet use
by citizens; their awareness and experience of cybercrime; and the level of concern
they feel about this type of crime. In this paper, we analyse only the perceptions of
Internet users to cyber security, whether they have experienced or been a victim of
cybercrime and the level of concern they feel about it.
This survey adopted in this report was carried out between the 13th and the 26th
June 2017, by TNS opinion & social,1 carried out the wave 87.4 of the Eurobarometer
survey, on request of the European Commission. The wave 87.4 covers the population
of the respective nationalities of the European Union member states, resident in each
of the 28 member states and aged 15 years and over. In total, 28,093 respondents
(1075 from Portugal) from different social and demographic groups were interviewed
face-to-face at home in their mother tongue on behalf of the Directorate-General for
Home Affairs. The methodology used is that of Eurobarometer surveys as carried out
by the Directorate-General for Communication (“Strategic Communication” Unit).2
The findings from this survey update a previous survey which was carried out in
2013 [5] and 2015 [2]. The 2017 survey repeats most of the questions asked in 2015
in order to provide insight into the evolution of knowledge, behaviour and attitudes
towards cyber security in the European Union.
1 TNS opinion & social is a consortium created between TNS political & social, TNS UK and TNS
opinion.
2 http://ec.europa.eu/public_opinion/index_en.htm.
42 J. V. Carvalho et al.
In order to identify the cyber security indicators applied in the survey, we have
relied on the most important types of cybercrime. Table 1 presents these different
types of cybercrime and a summary description of each. It should be noted that these
descriptions were presented to the respondents in the same terms. To assess the levels
of concern of respondents, they were asked how concerned they were about falling
victim to cybercrimes. Thus, the following question was asked:
“Cybercrimes can include many different types of criminal activity. How concerned
are you personally about experiencing or being a victim of the following situations?”
Having been asked about their concerned of cybercrimes, respondents were then
asked whether they had been the victim of any such crimes. Thus, the following
question was asked:
“How often have you experienced or been a victim of the following situations?”
In any of the questions, the “following situations” refer to the ten different types
of cybercrime that were applied in this survey and are presented in the following
table.
Europeans’ concerns about cyber security have been growing over the last few years.
In fact, almost nine in ten (87%) respondents see cybercrime as an important chal-
lenge, a significant increase in the 80% recorded in March 2015. The rise is even more
significant when looking at the proportion of respondents who see cybercrime as a
very important challenge: 56% compared with 42% in 2015. Less than half (49%)
of the respondents agree or mostly agree that law enforcement is doing enough to
combat cybercrime, with the proportion of respondents who totally agree being gen-
erally low across member states. Moreover, a significant proportion (14%) does not
know if enough is being done to combat cybercrime.
In this last study of 2017, we can see that the percentage of respondents wor-
ried about any type of threat is always higher than those that do not have concerns
(see Table 2). Respondents have become more concerned about “Identity theft”,
“Malicious software” and “Online banking fraud” that present percentages close to
70%. On the other hand, “Material promoting racial hatred or religious extremism”
presents only a little more than 50% concern by the average European respondents.
Comparing the levels of concern of the Portuguese, we can see that they are
in line with the average of the Europeans (Fig. 1). However, there are threats that
concern more the Portuguese, namely “Offensive material and child pornography”
and “Material promoting racial hatred or religious extremism”.
Europeans’ experience about cyber security has been growing over the last few years.
In this last study of 2017, we can see that the percentage of respondents with concrete
experiences with these types of threats associated with cyber security has increased
(see Table 3). However, there is a significant variation among member states on the
proportion in this type of experience. For instance, in general the Portuguese present
a percentage of cases in which they were victims, inferior to the majority of the
member states. The average European respondents report more cases in which they
were victims associated with “Malicious software” and “Scam emails or phone calls”
that present percentages close to 50%. On the other hand, “Identity theft”, “Offensive
material and child pornography” and “Cyber extortion” present percentages below
10%.
44 J. V. Carvalho et al.
Comparing the experience of the Portuguese with the average of the European
respondents (Fig. 2), we can see that in some cases the percentage of cases in which
respondents are victims are very similar, namely “Identity theft”, “Offensive mate-
rial and child pornography”, “Access to online services” and “Cyber extortion”.
However, there are cyber security threats whose percentages of cases are more diver-
gent between the Portuguese and the European average. Indeed, “Material promoting
racial hatred or religious extremism” presents a 10% difference and especially “Scam
emails or phone calls” which present a 22% difference.
Portuguese Concerns and Experience of Specific Cybercrimes … 45
Fig. 1 Comparison between Portuguese and Europeans average concerns in cybercrimes indicators
Fig. 2 Comparison between Portuguese and Europeans average concerns in cybercrimes indicators
conclude that the Portuguese resort to this entity in a percentage higher than the
average of the other Europeans.
The following figure (Fig. 3) presents the spider chart showing the percentage of
the Portuguese and European citizens that have been victims of one of cyber threats
and go to the police. It is observed in Fig. 3 that in most of the types of threats the
Portuguese resort to police in a greater percentage, except “Offensive material and
child pornography” and “Material promoting racial hatred or religious extremism”.
3 Discussion
The increasing use of a growing variety of devices that can access the Internet has
contributed to the overall growth of Internet use. This reality also leading to a general
increase in cybercrime concerns as well as the number of cases associated with this
phenomenon where more and more users are involved. In this context, there is an
increase in citizens’ concerns in most of the different types of threats, with particular
focus on the “Identity theft”, “Malicious software” and “Online banking fraud” that
48 J. V. Carvalho et al.
Fig. 3 Comparison between Portuguese and Europeans average about institutions perceived as
responsible to provide assistance to citizens
present percentages close to 70%. Comparing the experience of the Portuguese with
the average of the European respondents, we can see that the European citizens have
experienced these threats more often than the Portuguese in most of the different
types of cybercrimes. However, only a minority of respondents have experienced
any of these crimes. Anyway, “Malicious software” stands out as the threat that both
the Portuguese and the Europeans more mentioned. In the case where European
citizens have been victims of one of these threats, the majority of them have resort to
the police. The Portuguese have the same approach, although with slight differences
in the various types of threats.
Based on the data analysed by this study, there is a growing need to combat this
phenomenon. In fact, knowing that there is a growing concern about cybercrimes and
an increase in cases where people are victims justifies intervention through public
policies to take action to combat these threats. In this sense, new and more restric-
tive legislation has been implemented, which in the medium term may contribute
to the improvement of these results. In 2013, the European Commission presented
a proposal for a Directive concerning measures to ensure a high common level of
network and information security across the Union. The Directive (EU) 2016/1148
of the European Parliament and of the Council was approved on the 6 July 2016
and is currently undergoing the transposition phase to the internal legal systems of
the EU countries [6]. In addition to new legislation, the European Commission has
established in 2013 a European Cybercrime Centre (EC3)3 to help protect European
citizens and businesses against these growing cyber-threats. This centre leads Euro-
pean entity to combat cybercrime and focus on illegal online activities by organized
3 https://www.europol.europa.eu/about-europol/european-cybercrime-centre-ec3.
Portuguese Concerns and Experience of Specific Cybercrimes … 49
crime groups, particularly those that generate large criminal profits, such as online
fraud involving credit cards and bank credentials [3]. However, the most important
institutions in the European Union in the field of network and information security
are European Agency for Network and Information Security (ENISA), established
in 2004, and European Computer Reaction Initiative (CERT-EU), formed in 2012.
Also, Portugal creates a Centre (CNCS),4 that is the operational coordinator and the
Portuguese national authority specialized in cyber security working in this field with
state entities, operators of critical infrastructures, operators of essential services and
digital service providers [6]. Another way of improving the results of this study is
related to the level of knowledge and information of the citizens themselves. Some of
the threats most experienced by citizens may be reduced by an additional caution that
they must have. Actually, users can do more to protect themselves, because the two
most frequently experienced forms of cybercrime, infection with malicious software
and fraudulent obtaining of personal information, are actions that a well-informed
public can do much to prevent themselves [1].
4 Conclusion
References
1. European Commission: Europeans attitudes towards cyber security. Special Eurobarometer 464a
(2017)
2. European Commission: Cyber security. Special Eurobarometer 423 (2015)
3. European Commission: Cyber security. Special Eurobarometer 390 (2012)
4. Barros, G.: A Cibersegurança em Portugal. Gabinete de Estratégia e Estudos - Estudos Económi-
cos, p. 56 (2018)
5. European Commission: Cyber security. Special Eurobarometer 404 (2013)
6. CNCS: Centro Nacional de Cibersegurança, 13 Dec 2018. Available from https://www.cncs.
gov.pt/en/about-us/ (2018)
7. Vilic, V.: International and Serbian legal framework of the right to privacy in cyberspace. MEST
J. 6(1), 119–131 (2018)
Classification of Phishing Attack
Solutions by Employing Deep Learning
Techniques: A Systematic Literature
Review
Abstract Phishing is the technique by which the attacker tries to obtain confidential
information from the user, with the purpose of using it fraudulently. These days, three
ways to mitigate such attacks stand out: Focus based on awareness, based on black-
lists, and based on machine learning (ML). However, in the last days, Deep Learning
(DL) has emerged as one of the most efficient techniques of machine learning. Thus,
this systematic literature review has been aimed to offer to other researchers, read-
ers and users, an analysis of a variety of proposals of other researchers how to face
these attacks, applying Deep Learning algorithms. Some of the contributions of the
current study include a synthesis of each selected work and the classification of anti-
phishing solutions through its approach, obtaining that the uniform resource locator
(URL)-oriented approach is the most used. Furthermore, we have been able to clas-
sify the Deep Learning algorithms selected in each solution, which yielded that the
most commonly used are the deep neural network (DNN) and convolutional neural
network (CNN), among other fundamental data.
1 Introduction
Phishing is the most commonly used attack on social engineering. Through such
attacks, the phisher tries to obtain confidential information from the user, with the
purpose of using it fraudulently against himself or its organization [1]. The most
common way to become a victim to these attackers is by entering a Web site with a
fraudulent URL [2]. Currently, three ways to mitigate social engineering attacks stand
out: The first way is through user awareness and training to deal with these attacks
[1]. The second and most commonly used way is to have a blacklist of phishing sites
[3]. However, the disadvantage of this approach is that it must first know the sites that
have already been detected as phishing. The third way to prevent these attacks, being
more effective than the previous one, is to detect them in their early appearance,
using machine learning algorithms, which are able to predict if a page is phishing,
based on the previously analyzed characteristics of many other pages that already
have been adulterated. The problem with the ML approach is that, its need to involve
the knowledge of an expert, and a considerable period of time, in order to select the
characteristics that dictate that a page is phishing or not. A particular technique of
machine learning is Deep Learning [4]. With this approach, based on Deep Learning
algorithms, it is not necessary that the user or an expert indicates the characteristics
of a contaminated page, because the algorithm is able to detect them automatically
and independently [5].
Currently, ML anti-phishing approaches can be classified into two groups: Phish-
ing email-based approaches and those based on phishing Web sites. Among the solu-
tions approaches to phishing Web sites, the one based on URLs stands out. Thus, our
work is oriented to give a complete vision to the techniques of mitigation of phishing
URLs by means of Deep Learning algorithms.
Based on the aforementioned, our study aims to analyze the state of the art related
to the detection of social engineering attacks associated with phishing URLs, using
Deep Learning techniques. In order to fulfill such attempt, a systematic literature
review (SLR) has been conducted [6], with the purpose of analyzing the studies
related to the subject and evaluating the proposals of other researchers, in order to
determine their impact and find potential solutions.
Some of the contributions of the current study include a SLR, whose preliminary
result provides a general approach on the application of Deep Learning techniques
in the process of detection and mitigation of social engineering attacks, in order to
reduce the given risk.
The rest of this article has been organized as follows: Sect. 2 sets the background
of this research. Next, in Sect. 3, the phases of the SLR are explained, and a synthesis
of the most relevant articles is presented. In Sect. 4, the obtained results are discussed.
Finally, the conclusions and future work are described in the last section.
2 Background
2.1 Phishing
numbers, passwords and credit card details, and with the usual purpose created in
order to obtain a monetary gain by the attacker. Most phishing attacks are realized
by fake emails, containing a uniform resource locator (URL). In case of its activation
by a click, such URL leads to a fake malicious Web site. Despite the important atten-
tion, it has received over the years, there is still no definitive solution to solve this
problem [2]. In [3], authors define “a Phishing page, like any web page, that without
permission, claims to act on behalf of a third party; with the intention of confusing
the spectators in the performance of an action.”
Anti-phishing studies may be classified; these may be classified, according to their
objective, in two large groups being those aimed at mitigating phishing emails, and
those aimed at mitigating attacks on Web sites. Those oriented toward Web sites may
be classified mainly into four different classes: (1) focused on the URL of the Web
site; (2) focused on the HTML content; (3) focused on behavior; and (4) focused on
a hybrid approach.
3 Methodology
Our study followed the SLR methodology proposed by Barbara Kitchenham [6].
Five consecutive steps have been conducted: (1) define the research questions; (2)
search the relevant documents; (3) select the primary studies; (4) analyze the abstracts
and extract keywords and data; and (5) map the selected primary studies. First, the
search of the related articles has been accomplished and as a consequence, the relevant
results have been listed. Then, the data extraction has been achieved and the reports
of the encountered information have been finally produced. A brief description of
each phase is described below:
54 E. Benavides et al.
Deep Learning
Deep Belief
Denoising AE
Network
(DAE)
(DBN)
What are the techniques of Deep Learning that are currently used in primary studies
and how do researchers use these Deep Learning techniques, in order to mitigate
phishing attacks?
Our strategy consisted of first defining the search chain, which consisted of two parts,
being URL phishing and Deep Learning. Next, the search chain has been modified
by synonyms of each of the two parts. With this chain, we proceeded to search in all
articles related to the given subject.
Once the search keywords have been defined, only the following documents have
been included being those: (1) whose main topic is phishing and Deep Learning; (2)
which have been written exclusively in English; (3) its publication has been only of
at most the last five years; (4) its solution method is about URL-oriented.
Classification of Phishing Attack Solutions by Employing … 55
(1) articles whose subject has been only phishing or only Deep Learning, without
combing both topics; (2) being in a language other than English; (3) articles published
prior to 2010; (4) lacking of methods applied to URL-oriented.
In order to comply with the quality criteria of the search, it has been decided to
conduct the scrutiny only on pages recognized at the scientific level, which are also
from the area of information technology. The indexed databases chosen have been:
IEEE Explore, Taylor and Francis, Springer Linker, ACM Portal and Science Direct.
After searching for the needed information, 59 candidate articles have been encoun-
tered, and a group of 19 primary studies has been established. Based on the synthesis
performed in the previous step, we proceeded to conduct the report, and to demon-
strate the information gathered by the analysis.
4 Primary Studies
(continued)
Id Used Used Applied Phishing Applied Main features
technique algorithm methodology objective technique
[8] b HMDL Deep Comparative Malign Multi-stage Normal or abnormal
Learning Analysis and Phishing Malware- behavior of the programs
Algorithms A new proposal Software detection executed in the operating
and ML → DL system has been
Machine monitored. If for some
learning reason and based on the
algorithms rules of machine learning,
this software has been
suspicious, then it passed
through an evaluation
phase using Deep Learning
[9] c DL CNN A new proposal Homoglyph CNN is This solution uses a
at URL. i.e., trained with technique applied in the
svchost.exe the rendering of images. In
replaced Euclidean this way, a CNN learns
with distance features that are used to
svch0st.exe between detect visual similarities of
their the rendered strings.
respective Methodologically, first the
features domain name text strings
are transformed into
images and then these are
passed through the SCNN
[10] DL CNN A new proposal URL eXpose With this technique, we
obfuscation neural emphasize that the data
network entered are short strings of
raw data (data without
format or without
classification). Then, it
learns to extract
characteristics and classify
them, using incrustations at
the character level with a
convolutional neural
network
[11] DL CNN A new proposal URL Bag of The researchers had
obfuscation Bytes previously assigned a
hexadecimal value to each
character in the URL
string. Then, those values
have been matched with
each value on the right.
Later, these datasets in
hexadecimal
configurations are passed
through the algorithm of
the neural network model
for a subsequent
classification. eXpose is
improved
(continued)
Classification of Phishing Attack Solutions by Employing … 57
(continued)
Id Used Used Applied Phishing Applied Main features
technique algorithm methodology objective technique
[12] ML a TML Comparative URL N/A First, traditional methods
DL algorithms Analysis obfuscation of machine learning are
logistic evaluated, and then it
regression compares them with the
with methods of Deep Learning.
bigrams In conclusion, it is deduced
CNN that the Deep Learning
CNN- LSTM method is the most
LSTM accurate, with an accuracy
of 98%
[13] N/A N/A User Awareness N/A N/A The researchers propose to
mitigate the attacks by
teaching how to prevent
these. This proposal is
rather practical, applying
the concept of big data
analytics, in order to
mitigate the attacks of
social engineering
[14] ML AdaBoost, A new proposal URL (1) A syn- The premise is used that a
bagging. obfuscation tactic set of characters on a
random analysis phishing page is similar to
forest, of the a legitimate page. It also
sequential text; and performs an evaluation of
minimal (2) A statis- the statistics of the
optimization tical characteristics of the
(SMO) analysis phishing pages. That
of the occurs if it is a new page
Web or, for example, if it has a
site. bad reputation, etc.
Semantic
features
[15] ML Support Comparative URLs in This system While these algorithms
DL vector Analysis and a new general recom- used a public dataset of
machines proposal mended the around 2.4 million URLs,
(SVM), use of this system recommended
random numerical the use of numerical
forest, characteris- characteristics
Naive tics for
Bayes, training, in
decision order to
trees, obtain a
K-nearest better rate in
neighbors prediction
and accuracy.
multilayer
perceptron
(continued)
58 E. Benavides et al.
(continued)
Id Used Used Applied Phishing Applied Main features
technique algorithm methodology objective technique
[16] DL Long A new proposal URL Feature Phishing pages are
Short-Term obfuscation extraction collected, and then the
Memory LSTM recurrent neural
Recurrent network algorithm is
Neural trained with 12
Network characteristics. This finally
LSTM- produces a 99.14%
RNN effectiveness in the
detection of new false sites
[17] DL Deep A new proposal Unbalanced Borderline- First, three groups of
Boltzmann data SMOTE characteristics of the pages
Machine (Synthetic of phishing are extracted
(DBM) Minority being these the
Oversam- characteristics of URL, of
pling Web pages and features of
Technique) the images. With this data,
algorithm the algorithm is trained and
afterward an effectiveness
over 99% in the detection
of new affected sites is
obtained
[18] DL Deep belief Framework to detect Internet It focuses mainly on the
network phishing pages Protocol application of a framework
(DBN) Flow to detect phishing pages.
Firstly, two types of
characteristics of the false
sites are classified, being
the original ones and the
interaction ones. Hereby, a
model based on Deep
Belief Network is proposed
[19] DL Neural Comparative URL Before This is a comparative study
networks, Analysis obfuscation being among traditional ML
support analyzed, approaches and DL
vector the URLs approaches at phishing
machine, are detection. As a result, the
decision tree translated DL technique achieved the
DNN. into the best detection rate with an
Stacked ASCII code. accuracy of 80%,
Autoen- In addition, regardless of the amount of
coder it creates a data entered for training
technique determina-
(SAE) tion of the
incidence
percentage
of each
characteris-
tic in a
phishing
page
(continued)
Classification of Phishing Attack Solutions by Employing … 59
(continued)
Id Used Used Applied Phishing Applied Main features
technique algorithm methodology objective technique
[20] DL RNN A new proposal URLs in Gated An advantage of such
General recurrent study is that it has been
neural able to also identify which
networks type of attack on URLs is
(GRUs) being attempted. Hereby it
classifies that URL in
Legitim, SQL Injection,
XSS Attack, Sensitive File
Attack, Directory
Traversal, or another type
of attack
[21] DL CNN – Comparative Malicious – Feature This approach uses a CNN
study and URLs Selection scheme based on character
– A new proposal Malicious Scheme level. After using this
DNSs and scheme, a comparison is
– CNN at performed with other
the word schemes, obtaining by
and using a feature selection
character scheme, finding some 282
level failures. Later, using CNN
at the word level, 158
failures have been
encountered, while, using
CNN at the character level,
some 40 failures were
detected
[22] DL CNN A new proposal DNS flow D-FENDS D-FENS identifies
LSTM (DNS malicious domain names in
Filtering real time. This system runs
& inside a DNS server.
Extraction D-FENS opt for a Deep
Network Learning approach that
System) learns the characteristics
automatically from the
input data. An unusual
method is where detection
is applied directly to traffic
in a DNS
[23] ML Random A new proposal Domain WordGraph The authors propose to use
DL forest CNN generation a tool called WordGraph,
algorithms which generates
(DGAs) and dictionaries similar to
fraudulent those used by DGAs
URLs
(continued)
60 E. Benavides et al.
(continued)
Id Used Used Applied Phishing Applied Main features
technique algorithm methodology objective technique
[24] ML Random Comparative Study • URL To identify This study has been
forest J48, obfusca- the phishing included, because it
logistic tion sites based explains in detail the
regression, features • on the different characteristics
Bayes Third- Features that may be extracted from
network, party- extracted a deceptive site
multilayer based from URL,
perceptron, features • Web site
sequential Hyperlink- content and
minimal based third-party
optimiza- features services
tion,
AdaBoostM1,
SVM
[25] DL DNN Behavior People People DeepSeq First, you get the
Study characteristic profile of
people who are commonly
pro-thought to be phishers.
For this, based on the
obtained logs, the intrinsic
data of the people is
compared (age, sex,
occupation, etc.), versus
the data of the visited sites
(business, art, social
media, etc.). Finally, after
performing an analysis by
means of DNN, a profile is
obtained
[26] DL DNN Address Bat The researchers propose
bar-based, Algorithm the TDLBA method
abnormal- feed- (Tuning Deep Learning
based forward using Bat Algorithm). This
features, neural method combines swarm
HTML- and networks intelligence approaches by
JavaScript- configuring the parameters
based, of Deep Learning networks
domain-
based
features
a TML = traditional machine learning. b HMDL = hybrid of machine and Deep Learning. c DL = Deep Learning
After performing the analysis on the initially found 59 studies, only 19 relevant works
related to phishing attacks have been selected through the use of Deep Learning
algorithms. Table 1 documents that most of them have been published in Springer
(See Fig. 2). We also encountered that most research about deep learning applied to
combat phishing attacks has been conducted in China (See Fig. 3).
Classification of Phishing Attack Solutions by Employing … 61
Table 2 Articles per deep Category Deep learning algorithm Articles found
learning algorithm
Unsupervised SAE—stacked AE
SDAE—stacked DAE
SPN—sum product
network
RNN—recurrent neural [12, 16, 20]
network
DBM—deep BM [5, 17]
DBN—deep belief network [18]
Hybrid DNN—deep neural [19, 23, 25, 26]
network
Supervised CNN—convolutional [9, 10, 11, 21]
neural network
The current study is a systematic literature review on current Deep Learning solu-
tions in order to combat phishing attacks, even latest threats, such as spear phishing
attacks. To achieve such attempt, the different Deep Learning solutions have been
characterized, classified and analyzed. As a result, it has been evident that there is
still a great gap in the application of Deep Learning algorithms in the detection of
cyber threats in general that has not been exploited yet.
As future work, a comparative study is expected to determine which Deep Learn-
ing algorithm is the most effective in determining malicious sites. In addition, it has
been planned to design models or algorithms to combat phishing attacks, analyzing
the similar characteristics in the pages generated by recurring bots. A new algorithm
will also be proposed to accelerate performance in the execution of Deep Learning
algorithms, in phishing detection.
Classification of Phishing Attack Solutions by Employing … 63
References
1. Hajgude, J., Ragha, L.: Phish mail guard: Phishing mail detection technique by using textual
and URL analysis. In: 2012 World Congress on Information and Communication Technologies,
pp. 297–302 (2012)
2. Marchal, S., Armano, G., Grondahl, T., Saari, K., Singh, N., Asokan, N.: Off-the-Hook: An Effi-
cient and Usable Client-Side Phishing Prevention Application. IEEE Trans. Comput. 66(10),
1717–1733 (2017)
3. Whittaker, C., Ryner, B., Nazif, M.: Large-Scale Automatic Classification of Phishing Pages
4. Deng, L.: A Tutorial Survey of Architectures, Algorithms, and Applications for Deep Learning.
APSIPA Trans. Signal Inf. Process. (2014)
5. Selvaganapathy, S., Nivaashini, M., Natarajan, H.: Deep belief network based detection and
categorization of malicious URLs. Inf. Secur. J. A Glob. Perspect. 27(3), 145–161 (2018)
6. Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic
literature reviews in software engineering – A systematic literature review. Inf. Softw. Technol.
51(1), 7–15 (2009)
7. Basnet, R., Mukkamala, S., Sung, A.H.: Detection of Phishing Attacks: A Machine Learn-
ing Approach. In Soft Computing Applications in Industry, pp. 373–383. Berlin, Heidelberg,
Springer Berlin Heidelberg (2008)
8. Yuan, X.: PhD Forum: Deep Learning-Based Real-Time Malware Detection with Multi-Stage
Analysis. In 2017 IEEE International Conference on Smart Computing (SMARTCOMP),
pp. 1–2 (2017)
9. Woodbridge, J., Anderson, H.S., Ahuja, A., Endgame, D.G.: Detecting Homoglyph Attacks
with a Siamese Neural Network
10. Saxe, J., Berlin, K.: eXpose: A Character-Level Convolutional Neural Network with Embed-
dings For Detecting Malicious URLs, File Paths and Registry Keys (2017)
11. Shima, K., et al.: Classification of URL bitstreams using Bag of Bytes (2018)
12. Vazhayil, A., Vinayakumar, R., Soman, K.: Comparative Study of the Detection of Malicious
URLs Using Shallow and Deep Networks. In 2018 9th International Conference on Computing,
Communication and Networking Technologies (ICCCNT), pp. 1–6 (2018)
13. Epishkina, A., Zapechnikov, S.: A syllabus on data mining and machine learning with appli-
cations to cybersecurity. In 2016 Third International Conference on Digital Information Pro-
cessing, Data Mining, and Wireless Communications (DIPDMWC), pp. 194–199 (2016)
14. Zhang, X., Zeng, Y., Jin, X.-B., Yan, Z.-W., Geng, G.-G.: Boosting the phishing detection
performance by semantic analysis. In 2017 IEEE International Conference on Big Data (Big
Data), pp. 1063–1070 (2017)
15. Vanhoenshoven, F., Napoles, G., Falcon, R., Vanhoof, K., Koppen, M.: Detecting malicious
URLs using machine learning techniques. In 2016 IEEE Symposium Series on Computational
Intelligence (SSCI), pp. 1–8 (2016)
16. Chen, W., Zhang, W., Su, Y.: Phishing Detection Research Based on LSTM Recurrent Neural
Network, pp. 638–645. Springer, Singapore (2018)
17. Zhang, J., Li, X.: Phishing Detection Method Based on Borderline-Smote Deep Belief Network,
pp. 45–53. Springer, Cham (2017)
18. Yi, P., Guan, Y., Zou, F., Yao, Y., Wang, W., Zhu, T.: Web Phishing Detection Using a Deep
Learning Framework. Wirel. Commun. Mob. Comput. 2018, 1–9 (2018)
19. Aksu, D., Turgut, Z., Üstebay, S., Aydin, M.A.: Phishing Analysis of Websites Using Classifi-
cation Techniques, pp. 251–258. Springer, Singapore (2019)
20. Zhao, J., Wang, N., Ma, Q., Cheng, Z.: Classifying Malicious URLs Using Gated Recurrent
Neural Networks, pp. 385–394. Springer, Cham (2019)
21. Jiang, J., et al.: A Deep Learning Based Online Malicious URL and DNS Detection Scheme,
pp. 438–448. Springer, Cham (2018)
22. Spaulding, J., Mohaisen, A.: Defending Internet of Things Against Malicious Domain Names
using D-FENS. In 2018 IEEE/ACM Symposium on Edge Computing (SEC), pp. 387–392
(2018)
64 E. Benavides et al.
23. Pereira, M., Coleman, S., Yu, B., DeCock, M., Nascimento, A.: Dictionary Extraction and
Detection of Algorithmically Generated Domain Names in Passive DNS Traffic, pp. 295–314.
Springer, Cham (2018)
24. Rao, R.S., Pais, A.R.: Detection of phishing websites using an efficient feature-based machine
learning framework. Neural Comput. Appl., 1–23 (2018)
25. Sur, C.: DeepSeq: learning browsing log data based personalized security vulnerabilities and
counter intelligent measures. J. Ambient Intell. Humaniz. Comput., 1–30 (2018)
26. Vrbančič, G., Fister, I., Podgorelec, V.: Swarm Intelligence Approaches for Parameter Setting
of Deep Learning Neural Network. In Proceedings of the 8th International Conference on Web
Intelligence, Mining and Semantics—WIMS ’18, pp. 1–8 (2018)
Is Cyber Warfare an Alternative?
Jorge Barbosa
1 Introduction
The use of cyber weapons, which enable cyber warfare to be triggered, is due to
the weaknesses created by the existence of hardware and/or software vulnerabili-
ties, which, in general, all computer systems have. When these vulnerabilities are
J. Barbosa (B)
Coimbra Polytechnic – ISEC, Coimbra, Portugal
e-mail: jorge.barbosa@isec.pt
Portuguese National Defense Institute, Lisbon, Portugal
© Springer Nature Singapore Pte Ltd. 2020 65
Á. Rocha and R. P. Pereira (eds.), Developments and Advances in Defense
and Security, Smart Innovation, Systems and Technologies 152,
https://doi.org/10.1007/978-981-13-9155-2_6
66 J. Barbosa
not known, in the sense that they are not publicly known but only known within
a strict group, they are called zero-day vulnerabilities, ZDV. These vulnerabilities,
because they are not publicly known, can be used to great advantage in the construc-
tion of applications called exploits, which if based on ZDV will be called zero-day
exploit, ZDE, which can be used with great success as cyber weapons. These ZDEs
by exploiting the vulnerabilities of computer systems can take control or even par-
alyze the systems affected by those vulnerabilities. If such systems are linked to
the control of so-called critical infrastructures, i.e., systems such as power dams,
banking systems and others, their allocation and even stoppage can have very great
detrimental effects and hence their usefulness as cyber weapons. The interest of this
type of cyber weapon is not, or not only, to be used in the vulgar cybercrime but
essentially because they can be used in actions of cyber war by sovereign states,
against other states.
As this type of action may jeopardize state sovereignty, these actions are referred
to as cyber warfare rather than cybersecurity actions, which will then only be related
to vulgar cybercrime actions.
The use of computerized means to trigger offensive actions against antagonistic
countries made possible by the constant evolution of computing means, both from
the point of view of the means itself and from the increase in the capacity of the
computer networks and their increasing interconnection, is an indisputable reality.
Due to this increased use and diversification of these IT resources, it can be considered
that in modern societies, there are no sectors where they are not used. From critical
infrastructure control systems, dams and other power plants, water treatment and
supply systems, to the management and control of banking and financial operations
and institutions, transport logistics, fuel logistics, etc. Today, practically everything is
based on computer controllers, essentially of the industrial controllers like SCADA or
PLC’s in enterprise installations or sophisticate databases and customer relationships
informatics systems in financial institutions or public services.
The reverse side of this beneficial use is that if such systems are unsafe and if, on the
contrary, they are likely to be penetrated, it could result on catastrophic effects as the
effects of the above systems, their destruction or even their alteration, would paralyze
or would seriously affect modern societies. This dependence is therefore criticized
from this point of view, and thus, these systems are tangible and passable targets
of military action against them. These military actions can be triggered using con-
ventional means, but also the computer itself, through the so-called cyber weapons.
These cyber weapons would act directly on the computer systems destroying, par-
alyzing or altering them in order to stop or interfere with their normal functioning,
and thus, the systems downstream that they control or manage.
The theoretical possibilities offered by this military option may lead to the con-
sideration of its use by a large number of countries and not just by the current con-
ventional powers. Theoretically, the amount of resources required, whether human
or material, in this case technological, are much lower than those required for the
initiation of conventional military operations. Likewise, the economic resources nec-
essary to acquire these technological means and to train the human resources adapted
to this type of activity are substantial, but when compared to the economic resources
Is Cyber Warfare an Alternative? 67
required for conventional actions, they are much smaller. The combination of all
these factors, therefore, makes this option very desirable, and this, theoretically, can
lead to the spread and proliferation of cyber powers ready for cyber warfare as an
alternative to kinetic war.
However, its operationalization may not be easy and may even be impossible for
certain states. These difficulties are essentially related to the aforementioned needs
for human and technological resources. However, in quantitative terms, the needs
are smaller. Compared to those required for a conventional war, the qualitative needs
are much greater and much more demanding. These qualitative constraints are the
most restrictive of any country being able to obtain the capabilities needed to launch
cyber actions.
Considering all these apparent advantages of using military actions based on
computer systems together with the difficulties that may exist in the constitution of
cyber military units, will this option be a true alternative for any country?
There are factors critical and essential in constitution of cyber units so that the actions
they bring can be successful. This applies to all countries seeking the acquisition of
cyber warfare capabilities.
It has already been mentioned that the financial requirements for the constitution
of these units are relatively lower than those required for the constitution of modern
conventional units. Then, perhaps for any country, those financial aspects are not
impeditive to the formation of cyber armies.
It can be considered that there are some critical and essential factors to obtain
cyber capabilities for use in a cyber war. These factors are: (i) highly qualified human
resources to integrate the cyber units; (ii) sophisticated technological resources; (iii)
the existence of computer vulnerabilities in the systems of opposing countries and
(iv) the cyber units having knowledge of these failures and have the capacity to
exploit them.
It is essential that the computer systems of opposing countries have vulnerabil-
ities in the hardware and/or software, which allow the use of software specifically
developed, informatics exploits, to control such systems using these failures. If those
systems do not have vulnerabilities cannot be attacked using cyber means because
cyber weapons consist in exploits which use the vulnerabilities to affect the systems.
Time is another important factor in this scenario. Not only the time required for
the preparation of the cyber troops, but also the time necessary for the preparation
and development of the cyber actions, which has to be done with great anticipation.
These specific developed informatics exploits have to be secretly placed into
enemy computer systems, which require a lot of preparation and time. On the other
hand, if there is a long time between the secret placement of these exploits and their
possible use, the other country may have realized those vulnerabilities or may have
changed the physical equipment or the software. This way, purposely or not, it can
68 J. Barbosa
frustrate and prevent the use of those exploits, which, because they are specific to
the previous setup, would thus no longer be useful after these changes. On that case,
the whole process would have to be restarted if that would be possible.
Then, in the scenario of a cyber warfare, the time factor is very important in the
preparation and development of cyber war actions.
Cyber units cannot be formed with any “recruit” as it is the case of some conventional
armies. There are armies in which the structure and preparation are very different
when compared to the conventional armies of the more developed nations. Often
these armies are no more than tribal or regional groupings that seized power and
after became the army of these countries and did not necessarily evolve into a modern
conventional army. In these conditions, it will be very difficult for these armies to
evolve into the creation of modern cyber units, given the great capacity of organization
and the technical knowledge that would be necessary for this.
The requirements for cyber troops have nothing to do with those needed by most
troops of conventional armies. Excluding, perhaps, the senior officers and some
specific military units, the requirements for military capability of conventional units
are primarily their physical and athletic abilities, which should enable a very good
capacity for the execution of military operations, especially on the ground. The
requirements for the elements of military cyber units are very different. Although
the physical and athletic ability is also important, it is the intellectual capacity that
is paramount.
Maybe the most very important factor that may hinder, or at least make it difficult,
the constitution of cyber units, is the need for highly trained members from the
point of view of computer skills. These cyber troops must have the capacity to
develop computer applications, the designated informatics exploits, capable of taking
advantage of possible hardware or software failures, vulnerabilities, in the computer
systems of the opposing countries. To be used in cyber warfare, these exploits have
the ability to interfere with the normal activities of these systems or even paralyze
them. Then, the knowledge and mastery of information technology in its various
subareas, software, hardware, data networks, databases, programming, etc. of the
cyber troops, should be excellent, and it is fundamental and indispensable.
The above preparation requires a lot of time and maybe not is possible to give to
anyone. The computer aptitude of those involved is fundamental, since the computer
skills and abilities are very innate. On the contrary, the preparation of a substantial
part of the troops for a conventional war is relatively quick, and it is even possible
that, at the height of a conventional attack, a country will be able to form a large part
of these conventional troops on an accelerated basis. In other words, it is relatively
more easy to obtain the skills and abilities necessary for a conventional military unit
than for a cyber unit. For the reasons given, replacing, in case of loss, the elements
of a cyber unit may not be easy or fast and may even be impossible. This can make it
Is Cyber Warfare an Alternative? 69
impossible to launch cyber war operations, even hinder, or difficult the continuation
of those already started. The loss of a single element, if it is a fundamental element
due to its capacities and knowledge, can be disastrous for cyber unity, given its great
value of knowledge.
The number of these troops is not of the same order of values of those normally
existing in a conventional army, being smaller. However, given the quantity, diversity
and complexity of the tasks to be performed, have to be a reasonable size.
In the field of technical needs, and in addition to the needs of highly qualified human
resources, technological means are necessary to enable such cyber troops to operate
and to contribute to and enable the success of their missions.
Fundamentally, there are two types of important technological means: (i) hard-
ware, physical equipment and computer network necessary to set up a support struc-
ture for the missions; (ii) software, exploits, that allow the control or manipulation
of the systems.
The constitution of the support structure, computer hardware and computer net-
work, is relatively easy to obtain, and it is almost just a financial question whether any
country obtains them or not. These financial needs will not be very large, especially
if compared to those required for the purchase of a modern conventional military
medium, military aircraft, submarine or even a battle tank.
Exploits, in particular ZDE, are much more difficult to obtain because they are
specific to the systems and vulnerabilities in them. In the so-called Deep Web, there
is, however, a vast offer of exploits. However, these exploits that are in the Deep
Web have, in general, little interest for the cyber warfare exactly because already
being publicly known, that is, to say not being ZDE. As such, at least theoretically,
computer systems, especially those linked to critical infrastructures, may already be
protected from attacks based on this failure. They are not, therefore, properly exploits
of “cyber military quality”. Rather, they are only of interest to cybercriminals who
want to launch attacks aimed at individuals and small businesses. We do not want to
say that such attacks are unimportant because they can inflict great damage and are a
great concern. Without these vital resources, the activity, usefulness and necessity of
cyber military units become quite unimportant, and small nations or technologically
less advanced ones are unlikely to succeed in building these units.
The difficulty in obtaining and using exploits, such as the “quality” cyber military
ZDE, could be too one greatest obstacle to the proliferation of cyber military units.
70 J. Barbosa
We can question the interest and/or necessity of any country to constitute cyber
armies. “Why?” and “For what?” any country would want to create a cyber army.
It is too required to analyze if this option is a valid alternative to the conventional
means.
Building cyber capacities is not easy for most country, and the conditions to
maintain this capacity are not simple too. If the initial conditions that made possible
obtain cyber capacities are lost, namely if during the cyber warfare get lost of human
or technologically resources, the action can be turned against the aggressor country.
Then, the decision on the constitution of a cyber army must consider not only the
initial conditions and time to develop cyber-attack capacities but also cyber-defense
capacity and the possibility of the countries to maintain those actions.
Many countries may initially depend on other countries for the constitution of its
cyber capacity. To form the necessary frameworks for the constitution of its cyber
army, namely their human resources, they may be obliged to use foreign educational
and research institutions. To get the technological means, for example, ZDEs, initially
they can also have obtained them in foreign countries.
In many less developed countries, the conflicts that arise are generally regional con-
flicts to dominate the exploitation of natural resources or tribal or ethnic conflicts with
the same objective of exploiting natural resources in other parts of the same country
or to obtain the supremacy of one ethnic group over another or others existing in that
country.
In this way, triggering a cyber war instead of a kinetic war does not make much
sense in these types of scenarios and countries.
Despite the advantages that a cyber warfare can have in general, capacity building
takes a long time and requires resources, such as human resources, that will not be
readily available for this type of conflict. Many of these conflicts are often triggered
by reaction to close and recent actions, and as such, it is not possible to establish
planning and obtain the necessary human and material resources for a cyber war-
fare. In the same way, the already mentioned conflicts triggered to obtain profits in
the exploitation of natural resources as the primary objective takes the control of
the respective mining complexes and this presupposes the physical and territorial
domination of these places, which does not fit very well with the concept of cyber
warfare.
Not taking as an absolutely correct premise, we consider that in a large number
of conflicts triggered with some frequency, the applicability of a cyber warfare is of
little interest although isolated cyber actions may occur.
Is Cyber Warfare an Alternative? 71
Even regional powers, in general, have the concern that they are regional powers to
protect themselves and not necessarily to militarily dominate their neighbors. Even
if they develop cyber resources capable of endowing them with a cyber warfare,
they would not trigger it in the same logic that even though they may have some
conventional ability, they only use it for defense. The Federative Republic of Brazil
and the Republic of South Africa will be examples of this.
In the case of the great global military powers, the USA, Russia and China, cyber
warfare has been strongly considered and even implemented for some time, being
considered as another operational domain. In the case of the USA, one of its first
units linked to cyber warfare, yours first “Cybercorp”, the “Air Force—1st Cyber
Division”, was formed in the nineties of last century.
However, with regard to their use in military attack, these global powers have
considered this alternative as another military option of their vast arsenals, along
with the other conventional means already existing. The philosophy will then be to
employ or not, according to the military theaters and operative situations. It has been
particularly considered as an initial use option, to be used to weaken the enemy and
to prepare the entry of conventional means, for example, to blind air-control radars
or to shuffle the enemy’s military logistics.
In addition to these possible uses of computer means to military attack, these
global powers have given great importance to yours cyber-defense. Much of the US
initiative in cyber warfare area is in the way to increase and consolidate its cyber-
defense capabilities.
This perspective of cyber-defense rather than cyber-attacks is also more in keeping
with the principles set out in the Charter of the United Nations.
One other type of actors, may be capable of considering the employment of cyber
means, is non-states and some terrorist organizations. However, we believe that in
these cases too, the above-mentioned needs, essentially the preparation time and
the necessary resources, would be great obstacles to its realization. This possibility
is more difficult to employ, so that in these situations, such non-states or terrorist
organizations would probably have opted instead for the use of conventional means
of warfare, not excluding of course isolated cyber-attacks.
An important aspect related to the issue of the use of cyber weapons is the fact that
cyber warfare may not be of general use. Then, is not suitable for certain scenarios
where conventional warfare may be more advantageous.
For example, if we consider that the initiation of a war against a country may have
as its objective the territorial domination of that other country or part of it, cyber
warfare alone is not adequate, having to be complemented by the use of conventional
means, namely with ground troops who proceed to this territorial occupation.
Obviously, even in these scenarios, cyber warfare is useful and can be used, but
only as a complement to action, either in the preparation of conventional actions
72 J. Barbosa
As already mentioned, for various reasons, maybe the use of cyber means is not to a
general application.
Soon, the countries to “attack” will have cyber structures that can be targets for
the cyber weapons of the attacking country. On the other hand, these cyber structures
must be permeable to the use of cyber weapons, that is, they must have vulnerabilities,
hardware and/or software vulnerabilities, which allow the development of computer
applications, the exploits, that using these vulnerabilities may affect those computer
systems and thereby directly or indirectly affect the infrastructures that the systems
control or manage.
These conditions eliminate the use of cyber media in confrontations with many
countries, if they do not have these cyber targets. Since many of the conventional
wars are also small scale and between relatively undeveloped countries, cyber wars
will not be an alternative to them.
If the target is countries in these conditions of weak dependence on information
technology in their society, even countries that are capable of having a high cyber-
attack capacity will be impeded or very limited in the use of their cyber means against
them.
One of the great difficulties for any country is the ability to gauge the cyber
capabilities of another country.
Unlike conventional benchmarking capacities, which can be minimally percepti-
ble through espionage and the use of technical means of espionage, such as satellites
or others, cybernetic capability is not easily measurable. This difficulty exists not
only because cyber media are difficult to observe, namely software-based ones that
are immaterial and therefore invisible, but even if one can perceive their existence
one may not know or be able to determine the effectiveness of the same.
If the determination of the number of human resources linked to existing cyber
armies its possible, that determination alone may not be enough given that in this
particular case, it is not only the number that is important, but also, mainly, its
technical capacity. A large cyber army might not be a good cyber army if the human
resources were not highly trained and cannot therefore know how to take advantage
of the weaknesses of enemy systems.
Another difficulty and possibility are if the country to attack initially does not
have or have little capacity for cyber-defense capabilities, but after the attack can
Is Cyber Warfare an Alternative? 73
establish an alliance with some cyber-enabled country that can retaliate against the
attack in favor of the country’s cyber ally. This possibility may totally change the
initial considerations, which the attacking country may have taken into account. It
should be noted that due to the possibilities of cyber media, the allied country does
not have to be geographically close.
The most referred attack methods used as traffic redirection, website deface-
ment, distributed denial-of-service (DDoS), viruses and trojans and a specific cyber
weapons using ZDE, such as those used in the famous action against Iran known as
Stuxnet (Zetter, 2014).
In the strict sense of cyber warfare, are used specific cyber weapons, the ZDE.
The most known cyber warfare action, known as Stuxnet, used cyber weapons, which
exploit ZDVs in the computer systems of nuclear centrifuges of Iran (Zetter, 2014).
The very big difficulty in identifying the aggressor country is very restrictive and
prevents any retaliatory action, whether using conventional means or using cyber
media. Many cyber actions can be triggered by using computers in third countries
that have nothing to do with cyber warfare. The including DDoS attacks it’s a very
good example of this. Maybe can very hard to identify the authors whereas launched
the DDoS attack. A bad identification and retaliation against other country them can
escalate the war and increase exponentially cyber warfare because the country from
which the attack was apparently launched may not be the primary perpetrator of the
attack not having it launched and having nothing to do with it. It could only have been
used as a launching platform for the attack, using computers located in its territory,
whose legitimate owners were unaware of this use. A cyber-attack against this third
country can also cause the same to retaliate, thus escalating the cyber war. A classic
example of this is the so-called Estonian Warfare in 2007, in which apparently many
of the computers used in these attacks would be located in the USA, an allied country
of Estonia.
In the literature, [1, 2] are reported many cyber-attacks actions against more coun-
tries, such USA, South Korea, Iran, Tatarstan, Kyrgyzstan, Israel and the Palestinian
National Authority, Zimbabwe and Myanmar. More of these actions can be consid-
ered at the border between common cybersecurity actions and cyber warfare actions.
Better separation will be achieved if it is precisely determined those as put in danger
the national sovereignty of the affected states.
Many others cyber warfare actions are allegedly attributed to Russia against Esto-
nia, Georgia and Ukraine. These cyber warfare actions were triggered using not only
the mentioned DDoS method but too SQL Injection, SQLi, and Cross-Site Scripting
(XSS) attacks.
On the other hand, cyber actions not being dependent or limited by physical
distances or frontiers. This way the aggressor countries not need be geographically
close to the country to attack. This characteristic can allow too, a type of military
acts for small-scale actions only with intentions of disruption, may be liable to be
launched against particular countries, notably against the large western countries.
74 J. Barbosa
4 Conclusion
The possibility of using cyber weapons, which allows the launching of a cyber war-
fare, is due to the vulnerabilities existing in computer hardware and/or software,
which, in general, all informatics systems have.
When these failures exist in systems, not only in the system directly linked to the
processing of vital activities of coordination or management of entities more directly
related to civil society, but also in those related to the control of facilities, i.e., critical
infrastructures, the negative consequences of cyber-attacks can be devastating for the
country under attack.
The possibility of the occurrence of cyber war is at present very real and that the
total impossibility of its occurrence does not seem very likely very soon, but may
instead increase, since this impossibility would have to stem from the existence of
faultless computer systems, bugs, which seems to us to be utopian in the near future.
Taking into account only the technological aspects referred to above, we can
assume that any nation can acquire cyber military capacities because the creation of
a computer infrastructure supporting cyber war activities, although not easy, is not
financially significant enough to make it impossible for any country.
However, the other necessary resources, namely the need for highly trained human
resources, both for the development of cyber warfare and for the conduct of cyber
warfare, are already much more difficult to obtain. The formation of these human
resources is time consuming, the existence of people with skills for this area and for
this type of activity is rare, and therefore, it is not possible to transform anyone into
a qualified resource, by much training that can be given.
In addition, the volatility and alteration of the systems require that this training
be constant in order to be able to maintain the minimum level of knowledge that
eventually could have been reached when the cyber unit was formed.
Another significant obstacle, although it is theoretically possible to be overcome,
is the need to know the vulnerabilities of the systems, both hardware and software
systems, if you explore them. These vulnerabilities, which must necessarily exist in
the systems in order to be possible to attack them, are referred to as vulnerability, and if
they are not yet known and publicly disclosed, they are called zero-day vulnerability,
ZDV. These vulnerabilities are not very common nor are they widely available. In
order to be able to exploit these faults in the computers of the opposing countries,
it is necessary to develop or obtain specific software for this, called exploits, and if
they were developed for ZDV, they are called ZDE. In addition, if any country that
claims to acquire cyber military capacities might not be able to obtain and use ZDE,
this claim is impossible to achieve.
Cyber warfare is a very interesting alternative, but given these constraints and
limitations, it may not be a very viable alternative in certain situations and for certain
countries. A cyber warfare, by itself, may not be enough to defeat an “enemy” or
to subjugate it even if it is only economically. In addition, not all conditions and
required resources to establish a cyber army are easy to obtain and maintain.
Is Cyber Warfare an Alternative? 75
Acknowledgements I thank the Portuguese National Defense Institute as well as the ISEC/IPC
for the support and facilities granted.
This paper is based on the work Final Report of National Defense Course, done by the author in
the Portuguese National Defense Institute.
References
1. Carr, J.: Inside Cyber Warfare, 2nd edn. O’Reilly Media Inc., Sebastopol, CA, USA (2012)
2. Kostopoulos, G.K.: Cyberspace and Cybersecurity. Boca Raton, FL, CRC Press—Taylor &
Francis Group (2013)
3. Barbosa, J.: Pequenas potências militares convencionais, Grandes potências militares cibernéti-
cas—Abordagem da utilização de meios informáticos na defesa/ataque militar moderno. Final
Report of National Defense Course, Portuguese National Defense Institute, Lisbon, Portugal
(2018)
4. Clark, R.A., Knake, R.K.: Cyber War: The Next Threat to National Security and What to do
About. HarperCollins Publishers Inc, New York (2010)
5. Halpin, E., Trevorrow, P., Webb, D., Wright, S. (eds.): Cyberwar, Netwar and the Revolution in
Military. Palgrave Macmillan, NY, USA (2006)
6. Ranger, S.: What is Cyberwar? Everything you Need to Know About the Frightening Future of
Digital Conflict. https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-
online-conflict/ (2018), Last accessed in November 2018
7. Singer, P.W., Friedman, A.: Cybersecurity and Cyberwar—What Everyone Needs to Know. NY,
Oxford University Press (2014)
Memory Auditing for Detection of
Compromised Switches in
Software-Defined Networks Using
Trusted Execution Environment
1 Introduction
The remainder of this paper is organized as follows: Sect. 2 presents some assump-
tions for the software-defined network architecture described in this paper, Sect. 3
presents our proposal, Sect. 4 discusses the major points of the proposed architecture,
and Sect. 5 presents the conclusions.
The SDN architecture targeted in this paper relies under two assumptions regarding
its switches: the size of the switch-audited memory is relatively small and its memory
content has little variance varying accordingly to the OpenFlow Protocol rules [9].
The concept behind this is that the auditing process needs to have the lowest impact
possible on the system, so it does not deprive the controller and the switches from
the system resources.
The memory size of the switches refers to the space needed to store the flow table
that is set by the network controller. The table size varies with the number of flow
entries, and each flow table entry content is defined under the OpenFlow Switch
Specification [9] as having seven different fields, as shown in Table 1. That is a linear
correlation between the memory size and the number of flow table entries.
80 F. Augusto da Luz Lemos et al.
Table 1 Seven different fields in a flow table entry according to the OpenFlow Switch Specification
1.5.1 [9]
Match fields Priority Counters Instructions Timeouts Cookie Flags
As mentioned previously, the seven different fields of a flow table entry vary accord-
ingly with the OpenFlow Protocol and are well documented under the Switch Spec-
ification [9], thus limiting the possible outcomes of the memory. Although this may
look like a lot at a first glance, an entry always follows the same rules even on
SDN controllers deployed by different developers, therefore limiting the number of
combinations of values for the entries.
3 Proposed Architecture
As stated in the previous section, the auditing process is concerned about the limi-
tation of the system resources during its execution. Therefore, an online (real-time
execution) verification of each entry in the flow table of a targeted switch would
require processing and network resources that may be not available at the switch.
Figure 3 presents a simplified flowchart of the envisioned auditing process. The figure
shows that the auditing entity collects information from the network controller (NC)
and makes a dump of the switch memory, so it can later calculate the hash values
and compare them. Figure 4 exemplifies how the proposed architecture leverages the
usual monitoring approach against sleeper agents: the auditing process can audit the
memory, identify if there is an invalid entry, and generate a warning to the network
controller, so it can take the necessary measures.
A malicious attacker could intercept the memory dump data and change its con-
tents to comply with valid entries as expected by the NC. An approach to overcome
this attack is to exchange only encrypted data between the NC and the switch. How-
ever, if the encryption process itself were not protected, the auditing cannot be trusted.
By using trusted execution environments (TEEs), additional protection can be pro-
vided aiming at improving data security, as discussed in the next section.
The introduction of the trusted execution environments (TEEs), like the Intel SGX
[8], aims to prevent the auditing to become a new security threat. TEEs are pro-
tected areas of the processor that allow code to be executed inside of it from being
Memory Auditing for Detection of Compromised Switches … 81
The two main metrics for software-defined networks [12] are the throughput, how
much information is sent per second, and latency, the time between a request and
its response. Those two metrics combined with the analysis of the system resource
usage (memory, processor, etc.) will be used to evaluate the process performance
and impact on the system. Specifically to the Intel SGX TEE, it will be important to
evaluate the time spent on e/ocalls and the processing time spent inside the enclaves.
Previous research [13] has shown the high impact that e/ocalls causes to the system.
4 Discussion
The proposed architecture aimed to enforce the auditing of running switches should
consider security by design, that is, from its conception, a separation of trusted
and untrusted software must be identified in order to decide which/what should run
Memory Auditing for Detection of Compromised Switches … 83
Fig. 6 Representation of a scenario where: 1 shows the network working properly; 2 shows the
hijacking of the switch; 3 the auditing process warning the network controller; 4 the network
controller isolating the malicious switch and diverts the host traffic to a new and trusted switch
5 Conclusion
At this stage, the proposed architecture is theoretically adequate to cater the prob-
lem of identifying compromised switches in software-defined networks while not
demanding much of the system resources, but, as a work in progress, the results of
this work are still under development and analysis. The process is able to identify
the conformity of the flow tables using a simple hash value method. The proof of
concept under development utilizes a simplified SDN architecture running on the
Intel SGX. As future study, we propose the implementation of an architecture able
to audit the switch execution environment and to evaluate the impact of securing the
controller-switch communication with Intel SGX to further ensure software-defined
network security.
Acknowledgements This research work explores possible applications for TEE and secure and
scalable cloud applications as part of the EU-BR SecureCloud project. The project has been receiving
funds granted from the 3rd EU-BR Coordinated Call (Brazilian Ministry of Science, Technology and
Innovation, MCTIC/RNP, BR grant agreements 2550, 2549, 2553, 2552 and 2568) and European
Union Horizon 2020 programme—EU Grant Agreement 690111). The project is also supported
by the Swiss State Secretariat for Education, Research and Innovation (SERI). This research work
also explores possible security solutions for forensics applications under the CAPES Pró-Forenses
Project 025/2014.
References
1. Nunes, B.A.A., Mendonca, M., Nguyen, X., Obraczka, K., Turletti, T.: A survey of software-
defined networking: past, present, and future of programmable networks. IEEE Commun. Surv.
Tutor. 16(3), 1617–1634, (2014). (Third Quarter).https://doi.org/10.1109/SURV.2014.012214.
00180
2. Nadeau, T.D., Gray, W.K., SDN - Software Defined Networks: O’Reilly (2013). ISBN:
1449342426
3. Van Trung, P., Huong, T.T., Van Tuyen, D., Duc, D.M., Thanh, N.H., Marshall, A.: A multi-
criteria-based DDoS-attack prevention solution using software defined networking. In: 2015
International Conference on Advanced Technologies for Communications (ATC), pp. 308-313.
Ho Chi Minh City (2015). https://doi.org/10.1109/ATC.2015.7388340
4. Zhou, H., et al.: SDN-RDCD: a real-time and reliable method for detecting compromised SDN
devices. IEEE/ACM Trans. Netw. 26(5), 2048–2061 (2018). https://doi.org/10.1109/TNET.
2018.2859483
5. Dabbagh, M., Hamdaoui, B., Guizani, M., Rayes, A.: Software-defined networking security:
pros and cons. IEEE Commun. Mag. 53(6), 73–79 (2015). https://doi.org/10.1109/MCOM.
2015.7120048
6. Price, D.: A guide to cyber intelligence. J. US Intell. Stud. 21(1) (2014–2015)
7. Robterson, J., Riley, M.: The big hack: how China used a tiny chip to infiltrate U.S. companies.
Bloomberg Businessweek, 4 Oct 2018
8. Intel Corporation, Intel Software Guard Extensions (Intel SGX), Website, Accessed December
14 2018
9. Open Networking Foundation, OpenFlow Switch Specification, Version 1.5.1 (Protocol version
0x06), 26 March 2015
Memory Auditing for Detection of Compromised Switches … 85
10. Newman, L.H.: Spectre-Like Flaw Undermines Intel Processors’ Most Secure Element. Wired,
14 Aug 2018
11. Pereira, L., et al.: Using Intel SGX to enforce auditing of running software in insecure envi-
ronments. In: The 10th IEEE International Conference on Cloud Computing Technology and
Science (2018)
12. Gelberger, A., Yemini, N., Giladi, R.: Performance analysis of software-defined networking
(SDN). In: IEEE 21st International Symposium on Modelling, Analysis and Simulation of
Computer and Telecommunication Systems, San Francisco, CA 2013, pp. 389–393 (2013).
https://doi.org/10.1109/MASCOTS.2013.58
13. Costa, R.S., Pigatto, D.F., Fonseca, K.V.O., Rosa, M.O.: Securing Video on Demand Content
with SGX: A Decryption Performance Evaluation in Client-Side, Simposio Brasileiro em
Segurança da Informação e de Sistemas Computacionais (SBSeg), [S.l.], pp. 127–140 (2018)
Mobile Communication Systems:
Evolution and Security
Teresa Guarda, Maria Fernanda Augusto, Isabel Lopes, José Avelino Victor,
Álvaro Rocha and Lilian Molina
1 Introduction
Networks that provide mobility services have evolved rapidly, going far beyond
their original purpose of providing mobile voice services. With 4G/LTE (Long-Term
Evolution), which are fully IP-based, it is possible to support data transmission at
high speeds, in the order of Mbps, in addition to traditional voice services. This
structure is critical to building new business models based on mobile services such
as the Internet of things, cloud computing, video content distribution, application
providers, and more [1].
With 4G technology, new security issues have emerged, gaining great relevance
over LTE/4G networks because they are based on the IP protocol. As a result, new
threats to a mobile service provider can be identified as a breach of confidentiality,
breach of integrity, availability reduction, and fraud [1, 2].
Threats are becoming more important as mobile subscribers are having a more
and more powerful smartphone because the 4G architecture considers the use of
external networks not controlled by operators as new forms of access, and threats
are spreading more and more in IP networks.
In this scenario, mobile operators must prepare for challenges by building a robust
and flexible security architecture, while at the same time ensuring at least interoper-
ability with legacy systems (2G/3G/4G networks), a smooth transition to IPv6 and
support for virtualizing infrastructure [3].
2 Background
The first generation (1G) was a technology widely used in the 1980s by the Advanced
Mobile Phone System (AMPS) network and was made up of analog systems, with
only voice transmission possible. It was gradually replaced by the digital signal (2G)
[4].
Second generation (2D) became popular in the 1990s when the mobile phone
began to be more used by the population, and the signal changed from analog to a
digital signal with the most widely used technologies Code Division Multiple Access
(CDMA) and Global System for Mobile Communications (GSM).
CDMA is a method of accessing communication systems that can be used for
both mobile telephony and GPS. GSM—it is a method used to send and receive
Short Message Service (SMS) [3, 4].
Mobile Communication Systems: Evolution and Security 89
Between the second generation (2G) and the third generation (3G), a number of
developments have taken place: Deploy the General Packet Radio Service (GPRS)
wireless data transmission system for telephones that send and receive short mes-
sages; the 3G pioneer standard, Enhanced Data rates for GSM Evolution (EDGE), is
being used; set the High-Speed Circuit-Switched Data (HSCSD) as a specification
for transferring data over GSM networks with digital voice signals and channels; and
the Wireless Application Protocol (WAP), that is, the basic mobile Internet system
for any mobile device, allowing easy access of content to original pages [1, 4].
As there was evolution in the technology of communication of wireless networks
and evolution of the devices that until then only allowed to make analog connection,
there was the advance in the digital technology that allowed not only the voice call,
but also the communication of data through images, audio, and video. With the
new form of wireless network communication, large companies in the global mobile
device landscape began to vie for a growing market of users looking for devices
capable of communicating over a more advanced wireless network, services ranging
from sending messages to sending image, audio, or video and technology called 3G
made it all possible.
3G technology emerged in the 2000s, when mobile phones finally became smart-
phones with their own operating systems, Wi-Fi Internet, better quality cameras,
Bluetooth signal, and more. 3G technology has come to enable smartphones to func-
tion properly, as they have better capabilities. Highlights include data transmission
over long distances in mobile environments. 3G mobile technology is capable of
supporting a greater number of customers and data, especially in urban areas, by
increasing data rates [4].
The fourth generation started in 2010, being entirely based on IP, it can be under-
stood as a system and network at the same time, being much more than the mere
extension of 3G technology. In this way, it is possible to converge cable, wireless, and
computer networks with electronic devices, exceeding access speeds of 100 Mbps
and reaching up to 1 Gbps [3] (Fig. 1). It is anticipated that mobile networks of 5G
will be 10–20 times faster than those of previous generation (4G).
The world does not stop, and 5G technology is already taking its initial steps.
Mobile devices and computers are increasingly interconnected, transmitting more
data, and soon they will need a new network to handle all that speed and information.
3 4G Technology
system based on packets containing fewer network elements, among its main features
are providing high performance in terms of higher connection speed and decreased
latency when accessing the connection compared to its predecessor technologies [5].
This technology works with the TCP/IP architecture and its set of protocols, and
because of the fact that it works with the TCP/IP protocol group, this technology has
greater vulnerabilities in its security compared to its previous technologies [4].
In 4G technology, it is a real challenge to ensure the security of communications,
and one of its main factors to take into account is that wireless technology does
not have fixed connection points and must focus on the mobility and flexibility
requirements of the 4G technology [6].
The 4G technology was initially designed to support a bandwidth with large
capacity, are designed based on flat architectures with fewer network elements, low
latency, and fast convergence for adapt to new wireless network technologies.
The 4G architecture was developed taking into account the principles of security
from its inception and design based on the following security features: security of
access to the network; security of the network domain; security of the user’s domain;
and security of the domain of the application [1].
4G technology is based on the use of IP technology in the core network and
access in order to support all services. In comparison with the old technologies, the
4G technology has a smaller number of elements in its implementation, basically as
all the technologies of the mobile communications have three networks where they
must follow until finally reaching the service to the station: core network; transport
network; and access network [6].
In the core network, we have the main controllers MME and SGW, where the
security parameters of the different 4G nodes are configured, the transport network
is responsible for transporting the encapsulated service that leaves the core network
and it transports it to the access network through the different existing networks using
Mobile Communication Systems: Evolution and Security 91
fiber optic in most cases, the access network is responsible for bringing the service
finally to the 4G nodes, the main technologies of the access network are optical fiber
and microwave [7].
4G technology is designed with strong cryptography techniques, mutual authen-
tication between the elements of an LTE network, these techniques are embedded in
its architecture, and industry regulators have evaluated and identified new security
vulnerabilities that can be mitigated moment of network implementation.
The main purpose of implementing the LTE standard was to provide a high-
performance radiofrequency access that allows high transmission and reception
speeds in mobile devices and allows coexistence with other systems [5, 6].
The LTE standard has enough flexibility to allow vendors to combine these differ-
ent modules into a single device or multiple devices, for example, separating MME
and SGW into different devices.
In just over a decade, there has been an extraordinary growth associated with mobile
telephony, both in terms of number of users and technology, which went from the
first to the fourth generation. Due to this phenomenon, the mobile devices have
changed their status, becoming fewer and fewer phones and computers, and therefore
gradually becoming more susceptible to various forms of attacks.
An unprotected mobile device associated with an insecure network can result in
an invasion of individual privacy [8], allowing for facts such as tampering with data
or even theft, the intruder will be able to listen to your calls, read your text messages,
track your activity on the Internet and not know your geographical location.
A network to be minimally safe should follow some basic principles of security:
confidentiality; integrity; availability; and authenticity [9]. Confidentiality ensures
that access to information is linked only to legitimate entities, that is, those authorized
by the owner of the information. In the case of integrity, all manipulated informa-
tion maintains all original characteristics established by the owner of the informa-
tion, including changes, birth, maintenance, and end of the information. Availability
ensures that the information is always available for legitimate use, by those users
authorized by the owner of the information. With regard to authenticity, it is guar-
anteed that the information was produced, modified, or discarded by a particular
person, body, entity, or system in order to validate its origin.
Among the most common types of attacks in mobile networks are: unauthorized
access; denial of service; channel jamming; eavesdropping; session hijacking; man-
in-the-middle attack; and message forgery [10–12] (Table 1).
Due to the dynamism of the technology of a mobile network, there is no way
to offer any kind of definitive security certainty. However, there are many methods
to minimize or in several cases eliminate these attempts to break down the security
mechanisms of mobile networks [13].
92 T. Guarda et al.
can perform fingerprints of Web sites. The third, in turn, is an active attack, which
the researchers nicknamed aLTeR.
ALTeR uses a separate device by which the cybercriminals can simulate the orig-
inal network and trick the victim so that they unknowingly reveal information. This
method, however, is quite complex since the attacker first redirects network connec-
tions by performing DNS spoofing and then exploits a specific fault in LTE.
Apparently, the attack can happen to anyone, but because it is a complex method
of exploiting vulnerability, it is likely that such invasions will occur with people of
interest, i.e., politicians, journalists, and the like. The researchers further conclude
that while the demand to perform these actions is exhaustive, current technology
allows cybercriminals to evolve and even perform them outside of LTE; even those
that support authenticated cryptography [2].
5 Conclusions
First generation networks have almost no security features, gaining second generation
attention from developers, creating systems of authentication and confidentiality,
which were previously non-existent.
In turn, 3G networks have brought integrity techniques as well as advances in
existing security requirements, such as increasing the size of 128-bit security keys.
Fourth generation networks, predominantly IP-based, add security techniques until
then used only in the network core.
In 4G, all the interfaces except the radio are IP, and this facilitates and makes
flexible the installation and maintenance of the networks. Authentication and key
exchange systems have been improved compared to systems applied to 2G and 3G
networks using HMAC-SHA-256 switches. Encryption uses authentication vectors
that are incompatible with those used in 3G networks and to maintain user com-
patibility, the USIM must check the separation bit. The algorithms used are AES
and SNOW 3G, which use 128-bit keys capable of processing 256-bit keys in an
upcoming release.
The fifth generation (5G) is already in the test phase, with promises to be imple-
mented by the middle of 2020, to revolutionize its services, uniting 3G technologies
such as voice, data, videos; and services available in 4G such as digital broadband,
IP communication, HD transmission, dynamism of information exchange, among
others.
5G technology will better serve the radio spectrum and enable more devices to
access the mobile Internet at the same time, promising faster data download and
upload speeds, broader coverage, and more stable connections.
The purpose of 5G is not to be a new technology, but to unify the best in 3G and 4G
technology. In addition, it intends to improve the hardware part such as the devices
themselves that will serve as base stations for connection between the devices, thus,
there will be no loss of signal or interruption of services, thus managing to maintain
the quality of connection.
94 T. Guarda et al.
References
1. Dahlman, E., Parkvall, S., Skold, J., Beming, P.: 3G evolution: HSPA and LTE for mobile
broadband. Academic Press (2010)
2. Rupprecht, D., Kohls, K., Holz, T., Pöpper, C.: Breaking LTE on layer two. In: IEEE Symposium
on Security & Privacy, pp. 2–16 (2019)
3. Rost, P., Banchs, A., Berberana, I., Breitbach, M., Doll, M., Droste, H., Sayadi, B.: Mobile
network architecture evolution toward 5G. IEEE Commun. Mag. 54(5), 84–91 (2016)
4. Gupta, P.: Evolvement of mobile generations: 1G to 5G. Int. J. Technol. Res. Eng. 1, 152–157
(2013)
5. Ratasuk, R., Prasad, A., Li, Z., Ghosh, A., Uusitalo, M.A.: Recent advancements in M2M
communications in 4G networks and evolution towards 5G. In: 18th International Conference
on Intelligence in Next Generation Networks (ICIN) (2015)
6. Dahlman, E., Parkvall, S., Skold, J.: 4G, LTE-advanced Pro and the road to 5G. Academic
Press (2016)
7. Sun, K., Kim, Y.: Gap analysis for adapting the distributed mobility management model in
4G/5G mobile networks. In: IEEE Conference on Network Softwarization (NetSoft) (2017)
8. Garba, A.B., Armarego, J., Murray, D., Kenworthy, W.: Review of the information security and
privacy challenges in bring your own device (BYOD) environments. J. Inf. Priv. Secur. 11(1),
38–54 (2015)
9. Li, S., Tryfonas, T., Li, H.: The internet of things: a security point of view. Internet Res. 26(2),
337–359 (2016)
10. Maxim, M., Pollino, D.: Wireless Security. McGraw-Hill/Osborne (2002)
11. Yang, H., Ricciato, F., Lu, S., Zhang, L.: Securing a wireless world. Proc. IEEE 94(2), 442–454
(2006)
12. Welch, D., Lathrop, S.: Wireless security threat taxonomy. In: Information Assurance Work-
shop, pp. 78–83 (2003)
13. Liyanage, M., Abro, A.B., Ylianttila, M., Gurtov, A.: Opportunities and challenges of software-
defined mobile networks in network security. IEEE Secur. Priv. 14(4), 34–44 (2016)
14. Mavoungou, S., Kaddoum, G., Taha, M., Matar, G.: Survey on threats and attacks on mo-bile
networks. IEEE Access 4, 4543–4572 (2016)
Part II
Computer Networks, Mobility and
Pervasive Systems
Evaluating Trail Formation in
Collaborative UAV Networks with Lethal
Threats
Abstract Aerial vehicles are widely used for missions in hostile environments.
Some of these missions can benefit from the use of unmanned aerial vehicles (UAVs)
working collaboratively to achieve a common goal. In such scenarios, the use of
stealth approaches is essential for mission success, because it allows missions to
be conducted in the proximity of threat radars and also reduces the probability of a
UAV being spotted by enemies by enemies. In this direction, we extend a model that
allows autonomous UAVs to dynamically and collaboratively reduce their exposure to
threats by adopting a stealth policy in which they turn off their communication radars
once a threat is detected. The model also encompasses strategies for UAVs leaving
the threat regions as quickly as possible and estimating the future position of others
UAVs, thus trying to regroup to formation. The model was evaluated in simulations
using different hostility and weapon range distributions. The results demonstrated
that the proposed model is able to significantly improve the number of UAVs that
are able to complete the mission without being hit by any threat. In addition, the
proposed approach for calculating the goal position when a UAV is exposed to a
threat proves to be a key factor for missions performed in hostile environments as its
significantly reduces the fraction of UAVs hit by threats.
1 Introduction
Advanced air defense radar systems significantly reduced the traditional electronic
warfare effectiveness. Unmanned aerial vehicles (UAVs) are currently used as a re-
placement for traditional aircraft on potentially dangerous missions where threats
have to be detected and avoided. In addition, considering that autonomous UAVs are
able to make decisions faster than non-autonomous counterparts [1], it is possible
to connect different types of autonomous UAVs to dynamically and collaboratively
reduce their exposure to threats. When autonomous UAVs make decisions collabo-
ratively, they compose a collaborative UAV network (CN) [2].
Since the UAVs act collaboratively, the features of formation flying become a
key factor for the success of the mission. Formation flying is a technique that is
implemented by more than one aircraft. The aircraft keeps its positions against a
leader and maintain the formation shape during the flight. Different formations can
be used with different objectives, such as maximizing coverage area for surveillance
or rescue missions. Regarding offensive missions in hostile scenarios, one of the
most used formation flyings is the trail. This formation minimizes the exposure of
UAVs, thus improving their stealthiness [2]. Moreover, this formation also reduces
the fuel usage during the flight [3].
In this work, we focus on a stealth approach for trail formation proposed in
[2]. Their model performance was evaluated based on the minimization of the CN
exposure to threats, disregarding how the formation would behave in scenarios where
the UAVs can be hit by the enemies. In this sense, we extend this model to allow the
UAVs, which are exposed to enemy radars, to evade the threat regions, thus reducing
their overall time exposure to enemies and improving their chance to regroup with
the other UAVs. Additionally, considering that the trail formation is an effective
formation for attack missions and that UAVs may be hit during missions, we analyze
the impact of lethal threats on the mission accomplishment by verifying the fraction
of UAVs hit during the flight. Regarding lethal threats, we consider that our scenario
contains ground-based air defense systems [4].
The remaining of this paper is organized as follows. Section 2 presents the model
proposed in [2]. Section 3 details the proposed approach for UAVs to leave threat
regions. Section 4 discusses the hitting probability of a UAV. Experiments are pre-
sented in Sect. 5 and the results are discussed in Sect. 6. Finally, Sect. 7 concludes
the paper and outlines future research steps.
In this section, we describe the general aspects of collaborative UAV networks using
the model proposed in [2] as a reference. Thus, our scenarios are composed of UAVs,
all flying at the same height, and threats. For convenience, we will refer to this model
as reference model.
Evaluating Trail Formation in Collaborative UAV Networks … 99
Threats are represented by circles, defined by their center position (physical radar
position) and detection range. Considering that all enemy radars monitor critical
locations, we extended the scenario of the reference model to make the threats lethal,
that is, whenever a radar detects a UAV it automatically triggers the weapon systems
that aim to destroy it. Notice that this does not imply that the UAV will necessarily
be hit by the enemy. The likelihood of a UAV being hit by the weapon is addressed
further.
As in the reference model, UAVs flight from a start to a goal position using a
collaborative approach to detect and avoid threats through a stealth policy. Similarly
to [2], we adopt a simulation model over a time interval t = [t0 . . . tmax ]. However,
considering that the proposed scenario is composed of lethal threats, the simulation
for a single UAV ends when it reaches the goal position, is destroyed by the enemy
or due to the maximum simulation time. If the simulation of all UAVs ends before
tmax , the simulation also ends. A typical scenario consisting of UAVs performing
collaborative tasks in hostile environments is presented in Fig. 1 with threats depicted
by red circles.
In military missions, surveillance radars are expected to monitor strategic spots. Thus,
they are often paired with passive radars to enhance their detection capabilities. In
this regard, when a UAV is exposed to a surveillance radar, its communication with
neighbors can also be exposed to a passive radar, which may compromise the entire
mission. In such a scenario, for stealth purposes, the UAV shuts off its communication
radar while its RWR identifies a threat and connects it again when no threat is detected
by the RWR. This approach, called stealth dissemination, was based on the Try-and-
Bounce communication protocol described in [7]. Notice that the RWR is a passive
receiver, so it does not have to be disabled.
According to [8], in a typical formation flying there are the roles of leader and
wingmen. In the context of the trail formation, the wingmen try to follow the trajectory
of the leader, taking the other aircraft as a reference to keep its own position in the
formation. The leader defines the trajectory to the goal.
For generating the trail formation, firstly, it is computed the path of all UAVs to
the goal position. The UAV that is chosen to be the leader of a connected component
of the network is the UAV that has the shortest path to the goal. The other UAVs’
ranking is generated based on the length of their path to the leader: The closer a UAV
is to the leader, the lower is its ranking index, i.e., the higher is its ranking position.1
The formation ranking, however, cannot be static because the connection between
two UAVs may be lost. This can occur because both the distance between the UAVs
is greater than its communication range or a UAV shuts off its communication radar.
Hence, it is essential for the formation flying to detect these situations so that UAVs
can perform actions to reestablish the formation as quickly as possible [8].
There are several path planning algorithms for UAVs and, among those that consider
obstacle or threat avoidance, one of the most frequently referenced in the literature
is the Rapidly Exploring Random Tree (RRT) [9].
This algorithm is based on the construction of a tree of feasible trajectories through
randomly generated intermediate points. The branches are created as long as they do
not pass through any threat regions. One limitation of the RRT for UAV applications,
especially for fixed-wings, is that there is no restriction on invalid movements to be
performed. In this direction, it is possible to adapt the algorithm for only generating
branches in the tree if the angle between the new intermediate goal point and the
nearest node in the tree is in a specific range.
Notice that the output of the RRT is a path composed of consecutive lines. These
lines can be processed to reduce the length of the resulting path. Since the path of
all UAVs is computed and reduced, they must fly according to a control law, referred
here as displacement model [2].
Given the path of each UAV, defined by the path planning, it is possible to define
the control law responsible for implementing the UAVs movements. Consider that
each UAV is modeled as a single integrator system and its velocity can be directly
controlled, namely:
ṗi = u i , (1)
where u i ∈ Rm is a control input that must be set so that a global objective can be
achieved.
102 N. P. Borges et al.
The objective of this control law is to drive the UAV i to follow a path avoiding
threat regions. Thus, consider the path Pathγ (i) of the UAV i, which is located at
the position pi at a moment t. By using interpolation, it is possible to estimate the
position xγi in which the UAV should be at a moment t + 1, by following Pathγ (i).
Thus, the control law that drives the UAV i to follow the path is defined by:
x i − pi
u i = xγi − p β (t) , (2)
γ i
The stealth policy of disabling the communications radar, described in the preliminary
model, considers that a UAV in a threat region cannot communicate with other UAVs.
Besides, it should still act independently of the network and outline a path to leave
the threat area toward the goal position. The reference model considers that a UAV
that has entered a threat region will trace a path to the goal position and will fly until
it leaves the threat region. We extend this approach, considering different strategies,
described as follows.
Regarding strategies to leave the threat region, one of the most intuitive is to
leave it as quickly as possible. However, the collaboration between UAVs is crucial
for stealthiness [2]. Therefore, it is also important providing UAVs with means that
allow them to trace a path that improves their chance of regrouping with the others
UAVs in the network.
The procedure consists in generating candidate points that allow the UAV that is
exposed to a threat to leave the threat region as quickly as possible. For this, it is
assumed that a UAV has two candidate points to use as a reference, named here as Pi
and Pi . Given that, the linear regression of the last position of the UAV L Pr oj and its
current position Pi are computed. The candidate points Pi and Pi are the first points
that are outside the threat region, considering the line L Per p which is perpendicular
to L Pr oj and pass through the center of the threat.
The procedure for computing a goal for the UAV in a threat region assumes
that each UAV knows its own position Pi and its neighbor positions. Thus, the next
candidate point Pi results from the estimation of future positions of connected UAVs.
Considering that all wingmen follow the leader in the trail formation, it is possible
Evaluating Trail Formation in Collaborative UAV Networks … 103
Fig. 2 Candidate points for computing path planning to leave threat region
to estimate the future position of UAVs by computing the path of a UAV’s successor
in formation. The UAV that is exposed to a threat computes the path assuming its
successor’s position in the formation as its current position. Moreover, it is assumed
that its successor knows about the threat. The candidate point Pi is the point in the
successor path that is closest to Pi or Pi . Figure 2 illustrates a scenario in which this
procedure is applied.
Give the three candidate points, the last step consists in selecting which one will
be the goal position to leave the threat area. Considering that the collaboration is
crucial for CN, in case that the length of the path between the current UAV position
Pi and Pi is lower than a threshold, Pi will be selected as the goal. Otherwise, the
goal will be the candidate point (Pi or Pi ) which results in the shortest path length
from Pi .
4 Hitting Probability
For computing the probability of a UAV being hit by a threat, several factors must be
taken into account. For instance, the position and characteristics of both the UAV and
the weapon, as well as the weather conditions must be considered. A straightforward
way to evaluate the hitting probability of a UAV is addressed in [10]. However, it is
based only on computed path. We adapted it for computing the probability of a UAV
being hit considering only its current position Pi , as follows:
104 N. P. Borges et al.
0 if dw > rweapon
Pweapon (Pi ) = (3)
Dw2 /dw2 otherwise.
where Dw is the weapon attack range, dw is the distance between Pi and the weapon
and rweapon is the hitting radius of the weapon.
Notice that as the UAV approaches to a weapon its probability of being hit in-
creases. We assume that the position of the weapon and the surveillance radar is the
same. Besides, for validation purposes, we consider that a UAV that is inside a threat
region can be hit by it, i.e., rweapon is the same value of the detection range of the
corresponding surveillance radar. In addition, once a UAV is hit it cannot proceed
the mission, i.e., the UAV is removed from the CN.
5 Experimental Setup
The proposed model was evaluated through simulations, using MATLAB® R2018a.
The UAVs fly from a start to a goal point in different scenarios. Each scenario
is composed of a start and a goal position—same position for all the scenarios—
approximately 17 km apart, as well as threats and UAVs, and last at most 3,000 s,
with a 1 second time step. Three sets of scenarios were considered: low, medium and
high hostility, with 2, 8 and 16 threats, respectively. The location of each threat in
each scenario was randomly generated.
Each UAV possesses a communication and RWR ranges of 200 m, while threats
have 700 m of detection range and hitting radius. The model performance was evalu-
ated considering networks with 10 UAVs. The initial network topology is always the
same, since the variation of the threat displacement is more relevant to the scenario
than the UAVs start positioning. Moreover, it is assumed that the trail formation starts
established.
For model validation, we evaluate the fraction of UAVs that have been hit during
the simulation. This metric assumes values in the range [0, 1]. The closer the value
is to 1, the higher the fraction of UAV hit during the mission.
With regard to the limited weapon attack range distribution (Eq. 3), let N t be
the total number of threats, [ri, r f ] be the possible values interval for the weapon
range, and [ri , r f ] be a subset of [ri, r f ]. Moreover, let f d 2 be the fraction of
threats that will have weapon range in the interval [ri , r f ]. For instance, setting
N t = 20, ri = 100, r f = 600, ri = 100, r f = 250 and f d = 0.8, means that 16
threats will have weapon range between 100 and 250 ((80% of 20) and 4 threats
will have weapon range between 250 and 600 (20% of 20)). For properly evaluating
the impact of different weapon range distributions on the model performance, we
predefined weapon ranges in three intervals: (100, 250] (ψ = 1), (250, 400] (ψ = 2)
and (400, 550] (ψ = 3). The results were confronted with a uniform weapon range
distribution (ψ = 0).
Simulations were carried out for 100 scenarios with 10 UAVs, for each hostil-
ity level and weapon range distribution. The results are then the average of these
scenarios. Regarding the parameters of the CN, simulations were performed con-
sidering the stealth approach active. For convenience, we adopted ρ = 1 when this
approach is active and ρ = 0 when it is inactive. For ρ = 0, the UAVs fly directly
to the goal position without the threat detection and avoidance policy. Moreover, we
performed simulations with and without the approach for leaving threat regions. For
convenience, we adopted φ = 1 when this approach is active and φ = 0, when it is
inactive. Thus, we investigate 3 combinations of parameters: (ρ = 0, φ = 0), (ρ = 0,
φ = 1) and (ρ = 1, φ = 1). Notice that the combination of parameters (ρ = 1, φ = 0)
corresponds to the reference model, while the combination (ρ = 1, φ = 1) simulates
the extension of this model.
This section presents and discusses the results of the experiments. The reference
model results show that the exposure of UAVs reduces when the stealth policy is
active [2]. Once we introduced lethal threats in the scenario, the fraction of UAVs
that have been hit during the mission significantly reduces when the stealth policy is
active, as shown in Fig. 3. This occurs because the exposure of UAVs to threats also
reduces, as described in the preliminary model.
1 1
=0 =0 =0 =0
0.8 =1 =0 0.8 =1 =0
=1 =1 =1 =1
0.6 0.6
0.4 0.4
0.2 0.2
0 0
Low Medium High Low Medium High
Hostility level of scenarios Hostility level of scenarios
(a) Results with ψ = 0 (b) Results with ψ = 1
1 1
=0 =0 =0 =0
0.8 =1 =0 0.8 =1 =0
=1 =1 =1 =1
0.6 0.6
0.4 0.4
0.2 0.2
0 0
Low Medium High Low Medium High
Hostility level of scenarios Hostility level of scenarios
(c) Results with ψ = 2 (d) Results with ψ = 3
Notice that as the hostility level of the scenario increases, the fraction of UAVs
hit also increases, especially when the stealth policy is inactive (ρ = 0). In addition,
for this case, the weapon range distribution does not result in significant variation of
UAVs hit. The first reason for this relies on the fact that the fraction of UAVs hit, for
the medium and high hostility level, is already close to 1. In the case of low hostility
level, the variation was insignificant because the UAVs can be exposed, at most, to
only 2 threats during the mission.
When the stealth policy is active (ρ = 1), the weapon range distribution signifi-
cantly affects the hitting probability of UAVs. The fraction of UAVs increases when
the values of ψ were larger. For the case in which the weapon range distribution was
uniform (ψ = 0), the fraction of UAVs hit was closer to the case in which weapon
range distribution was intermediary, i.e., ψ = 2.
The approach for leaving threat areas proposed in this paper proved to be a key
factor regarding the hitting probability of UAVs. The fraction of UAVs hit by threats
was always lower when this approach was active (ρ = 1 and φ = 1). The importance
of this approach becomes more evident as long as the values of weapon range dis-
tribution and hostility level of the scenario increases. For instance, considering the
high hostility level and ψ = 3, the fraction of UAVs hit decreases in approximately
300%, when this approach is active, in comparison with the approach ρ = 1 and
φ = 0. This occurs for three reasons. The first is because the overall time of UAVs
exposure to threats reduces. The second is due to the fact that our approach makes
the UAV avoid the center of the threat, where the hitting probability is larger. The
last one is because it increases the probability of the UAV that turned off the radar re-
connecting to the network, increasing the stealth level of the network; consequently,
reducing the number of UAV exposed.
the maximum operation time of the UAVs during the computation of the path plan.
Moreover, we are assuming that the threats position and ranges are precisely esti-
mated. Evaluating the impact of the model for the cases which these are not correctly
estimated can be exploited. Finally, 3D modeling of the scenario will allow exploring
other stealth approaches considering control of yaw and pitch angles [10].
Acknowledgements The authors thank CAPES (Social Demands Program) and FAPESP (proc.
no. 2017/02055-8) for the financial support to carry out this research.
References
1. Bekmezci, I., Sahingoz, O.K., Temel, Ş.: Flying ad-hoc networks (FANETs): a survey. Ad Hoc
Netw. 11(3), 1254–1270 (2013)
2. Borges, N.P., Ghedini, C.G., Ribeiro, C.H.C.: A local communication model for improving
stealth in collaborative UAV networks. An. do Comput. Beach 249–258 (2017)
3. Cetin, O., Yilmaz, G.: Real-time autonomous UAV formation flight with collision and obstacle
avoidance in unknown environment. J. Intell. Robot. Syst. 84(1–4), 415–433 (2016)
4. Wållberg, K.: Method of fire control for gun-based anti-aircraft defence (2017). US Patent
9,625,236
5. Adamy, D.: EW 102: A Second Course in Electronic Warfare. Artech House, Boston (2004)
6. Gee, W.A.: Radar warning receiver (RWR) time-coincident pulse data extraction and process-
ing. In: 2012 IEEE Radar Conference, pp. 0752–0757 (2012). https://doi.org/10.1109/RADAR.
2012.6212238
7. Turgut, D., Turgut, B., Bölöni, L.: Stealthy dissemination in intruder tracking sensor networks.
In: 2009 IEEE 34th Conference on Local Computer Networks, pp. 22–29 (2009). https://doi.
org/10.1109/LCN.2009.5355150
8. Giulietti, F., Pollini, L., Innocenti, M.: Autonomous formation flight. IEEE Control Syst. 20(6),
34–44 (2000). https://doi.org/10.1109/37.887447
9. LaValle, S.M.: Rapidly-exploring random trees: a new tool for path planning (1998)
10. He, P., Dai, S.: Stealth coverage multi-path corridors planning for UAV fleet. In: Proceed-
ings of the 2013 International Conference on Mechatronic Sciences, Electric Engineering and
Computer (MEC), pp. 2922–2926. IEEE (2013)
Visual Analytics for the Reduction of Air
Pollution on Real-Time Data Derived
from WSN
Abstract Nowadays, the contaminated and poor air quality that is inhaled by the
city population in industrialized cities around the world has led to one of the main
causes of premature death due to respiratory diseases. Therefore, the improvement
of air quality becomes a priority. In this sense, the current study aimed to design and
implement a visual analytics tool, in order to process large data sets, which have been
generated by wireless sensor networks (WSN), which measured different environ-
mental pollutants in real time. Hereby, the phases of the CRISP-DM methodology
have been applied as a reference to guide the process. In the data preparation phase,
programs have been implemented using Python. Then, the results have been stored in
collections within a MongoDB database. Furthermore, for the modeling and visual
exploration of the data, the Tableau tool has been used. The evaluation of the results
allowed to demonstrate certain behavior of air pollutants around the city, such as the
increased air pollution levels during daylight hours. Similarly, we discovered that the
presence of particulate material PM10 and PM2.5 is directly related to the increase
of the Air Quality Index for the city of Quito (IQCA). This leads to the conclusion
that our analysis may be useful as a support tool in the decision-making of public
policies for the reduction of air pollution.
1 Introduction
The remainder of the article is structured as follows: Sect. 2 presents related works.
Section 3 shows an insight of the conducted research process, while in Sect. 4 we
explain the results obtained and the validation of this study. Section 5 finalizes with
the obtained conclusions.
2 Related Work
With the implementation of WSNs that monitor the concentration of air pollutants
in real time, hundreds of thousands of data have been available that will continue
to increase over time. Therefore, the design of visualization tools that facilitate the
interactive analysis of these data becomes indispensable. Thus, Liao in [3] developed
a visual analytics system for monitoring air quality data called AirVIS for China.
This system has the availability of allowing three views: GIS for spatial analysis of
data, scatter plots for temporal analysis, and a parallel coordinated view used for
multidimensional analysis. Similarly, [4] presents a system that uses visual analysis
for the study of air pollution in Honk Kong. The authors in such work propose sev-
eral visualizations that allow tasks such as the detection of correlations of variables,
comparative data, identification of trends, and predictions about climate and air qual-
ity. In [5], a semi-supervised learning approach was used to generate visualizations
that allow researchers to model the spatial correlation of the air quality of different
locations according to meteorological data, traffic flow, human mobility, structure of
road networks, and points of interest.
In [6], authors designed a system for visual analysis of air pollution data. They
added cluster concepts, transforming the data into 2D plots views, allowing them
to relate geographic areas, and identifying patterns among them. They also used
the Voronoi diagram to allow users to iterate with the spatial clusters. Currently,
they provide access to a large quantity of multidimensional spatiotemporal data and
greater precision generated by environmental monitoring sensors. This has generated
the need to create visualizations available to users with a more comprehensive and
interactive approach.
To facilitate the analysis in [7], a detailed study focused on the use of visual meth-
ods based on maps, calendars, and views of trends to identify lines and patterns was
presented. Within this same context in [8], the identification of correlations between
different regions where environmental pollution is determined was also presented.
In order to allow such approach, meteorological data (wind and its direction) were
used to calculate the lead/lag correlation. The Pearson correlation coefficient was
used to determine the pollution ratio between the different regions monitored along
different time spaces.
The attempt toward the implementation of smart cities based on (IoT) has been
described in [9], where an ecosystem of management and analysis of data was con-
structed, which ranges from processing, integration, analysis up to visualization.
Also, in [10], an analysis of the air pollutants in Bahrain was conducted using the
robust and nonparametric Theil–Sen method in order to study temporary quantitative
112 D. Quiroz et al.
variations of PM10 and PM2.5 particles, NO2 , SO2 , and O3 , as well as trends and
effects of temperature, humidity, and wind.
The correlation analysis between different parameters of air quality determina-
tion is the center of the study reported in [11], which demonstrates how to analyze
distributed data in spatial temporal contexts. Additionally, the authors proposed a
visualization tool using a Time Correlation Partition Tree (TCP). Similarly, in [12],
authors presented an interesting approach in visual analytics in order to detect pat-
terns in numerical time series, specifically environmental sciences. Furthermore, a
guide for the correct design of large data visualizations has been analyzed in [13].
This is a fundamental guide for the visual management of different types of data.
Finally, in [14], large stored volumes of fixed data derived in real time from our
WSN have been analyzed using business intelligence (BI) and data mining (DM)
techniques.
All previous studies described in this section demonstrate the importance of pro-
viding managers with some descriptive analysis tools for decision-making support.
Therefore, our project has been designed to provide visual analytics as an input in
the improvement of public policies in this context.
3 Research Design
This section describes the process conducted based on CRISP-DM, which has been
chosen to provide a standardized description of the life cycle of a data analysis
project, which is analogous to the way used in software engineering with software
development life cycle models [15]. The CRISP-DM model covers the project phases,
their respective tasks, and the relationships between these tasks. Additionally, CRISP-
DM considers the data analysis process as a professional project, thus establishing
a much broader context that influences the development of the models. Descriptions
of the phases executed are described below.
The air pollution study is important because of the possible negative effects on
peoples health [1]. Therefore, the World Health Organization (WHO) has designed
several air quality guidelines, which set the guidelines on the values of concentration
of pollutants and their permissible limits [16].
The Metropolitan District of Quito, from the Ministry of the Environment, has
implemented the Environmental Monitoring Network, establishing the Index of Air
Quality for the city of Quito (IQCA), which is based on the Ecuadorian Standard of
Air Quality [17, 18]. The established ranges to determine pollution levels are shown
in Table 1. Based on these guidelines, the information to be used was identified and
it was defined how this problem will be addressed through data mining.
Visual Analytics for the Reduction of Air Pollution … 113
Table 1 Index of Air Quality for the city of Quito (IQCA) [17]
Ranges Condition Condition from the health point of view
0–50 Desirable Air quality is considered satisfactory and environmental pollution has
little or no risk to health
50–100 Acceptable Air quality is acceptable. However, there may be minor effects on
health for individuals highly sensitive to environmental pollution
100–200 Caution Not healthy for individuals (chronic and convalescent)
200–300 Alarm Not healthy for the majority of the population
300–400 Alert Not healthy for the majority of the population and dangerous for
sensitive individuals
400–500 Emergency Dangerous for the entire population
The data collection has been conducted automatically. The sensor nodes send the
determined information to each gateway node. The latter then sends the data to the
application server in the cloud, where they are stored in a non-relational database such
as MongoDB. Each message sent from the sensor nodes is composed by the concen-
tration measurements of each gas, as well as for the particulate material concentra-
tions, geographical location, time of measurement, temperature, pressure, humidity,
and identifier of each sensor node. Figure 1, illustrates the JSON format of the frame
that each sensor node sends.
each gas have been added. Then, the total air quality index has been obtained. For
these tasks, several programs for data cleaning, transformation and subsequent stor-
age in several collections in MongoDB, have been implemented in Python.
3.4 Modeling
Figure 2 illustrates the architecture of the descriptive model of the data analysis
process conducted on air pollution data and meteorological variables. The model
has been composed of three individual layers: (1) The data source layer. This is
the information from the WSN, which has been stored in a central database. In the
same way, the information derived from external sources that have been used in the
preparation process. (2) The storage layer, composed of the base resulting from the
ETL process, where the data has been purified, transformed, treated, and then stored
in different collections of a database. Finally, (3) the visualization layer, for which the
Tableau tool has been applied in order to visualize and understand the data through
the generation of dashboards and interactive graphics, correlation and trend among
the studied variables.
With the execution of the tasks indicated in the data preparation, the obtained infor-
mation was stored in collections in a database. This allowed the task of data analytics
through the preparation of visualizations in order to study the behavior of pollutants
measured in the sensed sectors. In order to provide important information about these
data, a view model has been designed that follows the scheme shown in Fig. 3. The
Visual Analytics for the Reduction of Air Pollution … 115
used design criteria were the bar graphs that facilitate the comparison between the
different values of the pollutants. The visualization of the behavior of the pollutants
has been designed using time series in which trend lines were included. The iden-
tification of patterns is fundamental within this analysis; therefore, we have used
dispersion graphs. Additionally, we have included correlation matrices in order to
detect direct or inverse linear relationships between the different parameters; thus,
we calculated the Pearson correlation.
Furthermore, dashboards have been designed using the Tableau visualization tool.
In each of them, the behavior of air pollutants in the monitored sectors has been
reflected. Figure 4, for example, illustrates the first dashboard, where the behavior
of gases in each of the concentrators is presented based on their averaged index.
Specifically, it is the general visualization per concentrator and pollutant. From this
panel, users may select a concentrator and/or a contaminant to see the details in the
two remaining panels.
The second dashboard, illustrated in Fig. 5, presents the categories in which the
determinations have been framed. These categories have been those defined in the
regulations on the IQCA. This consist on IQCA by concentrator: It demonstrates the
index that has been calculated from the IQCA for each concentrator and the category
according to the Quito standard.
The identification of patterns and correlations is one of the most important points
in visual analysis. Therefore, one visualization was created, which indicates the
Pearson correlation values between the IQCA and the presence of pollutants (see
Fig. 6).
4 Evaluation of Results
The dashboard of Fig. 4, allows to analyze the behavior of the pollutants in the
Alameda Concentrator. As it can be seen, the bar graph allows to identify that PM2.5
has the highest concentration. The dashboard of Fig. 5 shows the panel with the heat
116 D. Quiroz et al.
maps, which allows, for example, to identify that the last week of October in the
Villa Flora Concentrator the IQCA went from DESIRABLE to ACCEPTABLE.
During the months of July, August, and September, in the sensors of Villa Flora
and ESPE nodes, a high influence of NO2 on the IQCA points out, while in Alameda
node a low correlation has been observed even being inverse due to its negative
coefficient. While, for San Diego node, it lacks of a clear conclusion, since it does
not provide of any significant correlation.
Visual Analytics for the Reduction of Air Pollution … 117
5 Conclusions
This study has been conducted with the purpose of analyzing the determined data of
air pollutants collected by a WSN in real time. The CRISP-DM methodology was
followed for the DM process. In the preparation phase, an ETL process has been
operated, in which data were cleaned, treated, and transformed, the results of this
process were subsequently stored in collections within a non-relational database.
For the analysis and visualization of the obtained data, we applied the Tableau tool.
Views were generated, allowing pollutant behavior analysis as well as the correlation
and patterns analysis of pollutants at every minute in the sensed sectors. Therefore,
the descriptive analysis may be used as a significant decision-making support tool.
This study may be used as an aid for the generation of public policies that certainly
will better address environmental problems.
Acknowledgements The authors would like to thank the financial support of the Ecuadorian Cor-
poration for the Development of Research and the Academy (RED CEDIA) in the development of
this study, within the Project Grant CEPRA-XI-2017-13.
References
1. Kampa, M., Castanas, E.: Human health effects of air pollution. Environ. Pollut. 151(2), 362–
367 (2008)
2. WHO: Ambient air pollution: A global assessment of exposure and burden of disease. World
Health Organization, Geneva, Switzerland (2016)
3. Liao, Z., Peng, Y., Li, Y., Liang, X., Zhao, Y.: A web-based visual analytics system for air quality
monitoring data. In: 2014 22nd International Conference on Geoinformatics (GeoInformatics),
pp. 1–6. IEEE (2014)
4. Qu, H., Chan, W.Y., Xu, A., Chung, K.L., Lau, K.H., Guo, P.: Visual analysis of the air pollution
problem in hong kong. IEEE Trans. Vis. Comput. Graph. 13(6), 1408–1415 (2007)
5. Zheng, Y., Liu, F., Hsieh, H.: U-air: When urban air quality inference meets big data. In:
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining, pp. 1436–1444. ACM (2013)
6. Zhou, Z., Ye, Z., Liu, Y., Liu, F., Tao, Y., Su, W.: Visual analytics for spatial clusters of air-
quality data. IEEE Comput. Graph. Appl. 37(5), 98–105 (2017)
7. Du, Y., Ma, C., Wu, C., Xu, X., Guo, Y., Zhou, Y., Li, J.: A visual analytics approach for
station-based air quality data. Sensors 17(1), 30 (2016)
8. Du, Y., Abish, M., Zhou, L., Zhou, Y.: A correlation visual analytics system for air quality.
Chin. J. Electron. 27(5), 920–926 (2018)
9. Ahlers, D., Kraemer, F., Braten, A., Liu, X., Anthonisen, F., Driscoll, P., Krogstie, J.: Analysis
and visualization of urban emission measurements in smart cities. In: Proceedings of the 21st
International Conference on Extending Database Technology (EDBT) (2018)
10. Jassim, M.S., Coskuner, G., Munir, S.: Temporal analysis of air pollution and its relationship
with meteorological parameters in bahrain, 2006–2012. Arab. J. Geosci. 11(3), 62 (2018)
11. Fangzhou Guo Tianlong Gu, W.C.F.W.Q.W.L.S., Qu, H.: Visual exploration of air quality data
with a time-correlation partitioning tree based on information theory. ACM Trans. Interact.
Intell. Syst. 1(1) (2018). https://doi.org/10.1145/3182187.
Visual Analytics for the Reduction of Air Pollution … 119
12. Sips, M., Kothur, P., Unger, A., Hege, H.C., Dransch, D.: A visual analytics approach to
multiscale exploration of environmental time series. IEEE Trans. Vis. Comput. Graph. 12,
2899–2907 (2012)
13. Keim, D., Andrienko, G., Fekete, J.D., Görg, C., Kohlhammer, J., Melançon, G.: Visual analyt-
ics: Definition, process, and challenges. In: Information visualization, pp. 154–175. Springer,
Berlin (2008)
14. Fuertes, W., Alyssa, C., Torres, J., Benítez, D.S., Tapia, F., Toulkeridis, T.: Data analytics on
real-time air pollution monitoring system derived from a wireless sensor network (2019)
15. Marbán, Ó., Mariscal, G., Segovia, J.: A data mining and knowledge discovery process model.
In: Data Mining and Knowledge Discovery in Real Life Applications. InTech (2009)
16. WHO.: Air Quality Guidelines: Global Update 2005. Particulate Matter, Ozone, Nitrogen
Dioxide and Sulfur Dioxide. World Health Organization (2006)
17. Secretaría del Ambiente: índice Quiteño de la Calidad del Aire (2004)
18. del Ambiente, Secretaría: Informe de la Calidad del Aire del Distrito Metropolitano de Quito
2017. Tech. rep, Secretaría del Ambiente Alcaldía (2018)
Part III
Defense Engineering
Toward the Development of Surveillance
and Reconnaissance Capacity
in Ecuador: Geolocation System
for Ground Targets Based
on an Electro-Optical Sensor
Abstract This paper presents the progress of a research work that seeks to deter-
mine the geographic coordinates of an object on the land of interest by applying
the Denavit–Hartemberg methodology to the surveillance and recognition system
developed in the CID FAE SEO-D1; this together with mathematical cartography
will provide information in support of military operations. The results shown in the
simulation present a good approximation of the geographic coordinates of interest. In
light of the above, it is suggested that this kind of study provides a low-cost surveil-
lance and reconnaissance alternative to existing advanced systems such as satellites
for countries that do not have this type of technology, as is the case of Ecuador.
1 Introduction
The Armed Forces of Ecuador, as part of their doctrine, must guarantee Ecuadorian
society the defense of sovereignty and territorial integrity and, in addition, support
the integral security of the state [1]. This doctrine also establishes a relationship
with the socioeconomic development of the population, a relationship that within its
process and conception has had changes due to the appearance of organizations that
have caused problems within the country. Therefore, the Ecuadorian state has seen
the need to prioritize the border sector, specifically the northern border where illegal
activities have been developing, which constitute serious threats to the security of
the state [2].
On the other hand, the strategic planning of the defense is intended to guarantee
the security and defense of the state, conceiving from a comprehensive approach a
correct decision making in everything related to sovereignty and territorial integrity;
generating policies aimed at contributing to the safety and welfare of its citizens,
through surveillance and control activities such as land, river and air patrol operations.
Therefore, the Research and Development Center of the Ecuadorian Air Force
CID FAE is an entity dedicated to the development of projects oriented to security
and defense. Among the emblematic projects developed in this research center, there
is the surveillance and reconnaissance system. This system arises from the need to
capture images in real time for surveillance and reconnaissance applications [3].
The surveillance and reconnaissance system developed at the CID FAE consists
of a ground station, the gimbal system and a camera. These sub-systems allow the
operation of the gimbal in flight along with the camera and obtaining real-time
information of images and parameters such as height, gimbal geographic location,
pitch, yaw and roll degrees.
The known geographical location (latitude and longitude) corresponds to the gim-
bal mounted on an aircraft in flight, but we cannot say that these coordinates are those
corresponding to the surrounding objects on land. That is to say that we can visualize
images on the ground without knowing their geographical location.
To solve this problem, it is necessary to know the orientation and position of the
lens of the gimbal’s camera in the space; this way we would determine the direction
where the camera points and consequently know the location of surrounding objects
on land.
In robotics, it is a common need to know the orientation and location of the final
effector of a robot (a tool normally) from the knowledge of the values taken by the
articulations of the robot. This is called the direct kinematic problem [4] (Fig. 1).
There are different approaches to solve the direct kinematic problem, but for the
geolocation system developed the Denavit–Hartemberg methodology was used.
Denavit and Hartenberg proposed in 1955 a matrix method to systematically
establish a coordinate system which we will call Si linked to each link i of an articu-
lated chain, and the kinematic equations of the whole chain can then be determined
[5] which are the result of the multiplication of the homogeneous transformation
matrices.
The homogeneous transformation matrix is symbolized by i−1 Ai and represents
the relative position and orientation of the system Si with respect to the system Si−1 .
That is to say that 0 A1 describes the position and orientation of the solidary reference
system to the first link with respect to the solidary reference system to the base.
i−1
Ai = T(z, θi )T(0, 0, di )T(ai , 0, 0)T(x, αi ) (1)
⎡ ⎤⎡ ⎤⎡ ⎤⎡ ⎤
cos(θi ) − sin(θi ) 0 0 1 0 0 0 100 ai 1 0 0 0
⎢ sin(θi ) cos(θi ) 0 0⎥ ⎢0 1 0 0⎥ ⎢0 1 0 0⎥ ⎢ 0 cos(αi ) − sin(αi ) 0⎥
i−1
Ai = ⎢
⎣ 0
⎥⎢ ⎥⎢ ⎥⎢ ⎥ (2)
0 1 0 ⎦⎣ 0 0 1 di ⎦⎣ 0 0 1 0 ⎦⎣ 0 sin(αi ) cos(αi ) 0⎦
0 0 0 1 0 0 0 1 000 1 0 0 0 1
To represent the position and orientation of the solidary reference system to the final
effector S6 with respect to the solidary reference system to the base S0 , it will only
be necessary to multiply the homogeneous transformation matrices of all successive
links of the robot.
⎡ ⎤
nx ox ax px
⎢ n oy ay py ⎥
T = 0 A6 = 0 A1 1 A2 2 A3 3 A4 4 A5 5 A6 = ⎢
⎣ nz
y ⎥ (3)
oz az pz ⎦
0 0 0 1
Since the Denavit–Hartemberg algorithm gives us the position and orientation of the
final effector in values relatives of the plane X, Y, Z, it is necessary the application
of mathematical cartography for the representation of values of latitude (φ) and
longitude (λ) of the globe to their respective values passed to a plane and vice versa.
Cartography is the science that deals with the drawing of geographical charts.
Geographical charts, also called maps, are representations on a plane of all or part of
the earth’s surface. In order to make this representation, a certain projection of the
aforementioned reference land surface on a plane will be used [6].
To obtain the cartographic representations of a terrestrial zone, it is necessary to
know the formulas as that relate the values in the plane with the values of latitude
and longitude.
x = f 1 (φ, λ) (4)
y = f 2 (φ, λ) (5)
To these, formulas must exist a biunivocal correspondence for its inverse case.
φ = F1 (x, y) (6)
λ = F2 (x, y) (7)
For the calculation of these values, we used the (UTM) Universal Transversal Mer-
cator representation, because it is the most widely used and has less deformations
in its representation to the plane. Whose formulas and calculations are detailed in
“Bolletino de Geodesia e Science Affini” number 1 presented by Alberto Cotticia
and Lucia-no Surace (Fig. 2).
126 Z. C. Marco Antonio et al.
Ecuador is inside four zones (15, 16, 17 and 18), so the formulas applied will have
this condition (Fig. 3).
The geolocation system is composed of elements that have the electro-optical sensor
such as the altimeter and inertial measurement unit (IMU), the gimbal, the ground
station with its HMI screen and algorithms implemented by software. In this paper,
we will focus on the algorithms to be implemented by software.
First, it is necessary to establish the characteristics of the gimbal on which the
Denavit–Hartenberg algorithm will be applied.
Since the gimbal is mounted on an aircraft, this will have variations in height,
pitch, yaw and roll product of the maneuvers executed in flight; these four variables
will be considered as values equivalent to those taken by the joints of a robot (four
degrees of freedom). These four degrees of freedom are added to two degrees of
freedom corresponding to two servomotors that integrate the gimbal (Fig. 4).
With these conditions, we proceed to put all systems associated with each joint
in accordance with Denavit–Hartemberg (Table 1).
S6 (Camera lens)
Once the systems associated with the joints have been established, we can obtain
the values for the homogeneous transformation matrices (Table 2).
T = 0 A6
⎡ ⎤⎡ ⎤⎡ ⎤
10 0 0 cos(q1 ) 0 − sin(q1 ) 0 cos(q2 − 90) 0 − sin(q2 − 90) 0
⎢0 1 0 ⎥ ⎢ 0⎥ ⎢ 0⎥
=⎣⎢ 0 ⎥⎢ sin(q1 ) 0 cos(q1 ) ⎥⎢ sin(q2 − 90) 0 cos(q2 − 90) ⎥ (8)
00 1 h 1 ⎦⎣ 0 −1 0 0 ⎦⎣ 0 −1 0 0⎦
00 0 1 0 0 0 1 0 0 0 1
Toward the Development of Surveillance and Reconnaissance … 129
⎡ ⎤⎡ ⎤
cos(q3 − 90) 0 − sin(q3 − 90) −d0 cos(q3 − 90) cos(q4 − 90) 0 − sin(q4 − 90) 0
⎢ ⎥⎢ ⎥
⎢ sin(q3 − 90) 0 cos(q3 − 90) −d0 sin(q3 − 90) ⎥⎢ sin(q4 − 90) 0 cos(q4 − 90) 0 ⎥
⎢ ⎥⎢ ⎥
⎣ 0 −1 0 0 ⎦⎣ 0 −1 0 −d1 ⎦
0 0 0 1 0 0 0 1
⎡ ⎤
cos(q5 ) − sin(q5 ) 0 d2 cos(q5 )
⎢ ⎥
⎢ sin(q5 ) cos(q5 ) 0 d2 sin(q5 ) ⎥
⎢ ⎥
⎣ 0 0 1 0 ⎦
0 0 0 1
The T matrix will allow obtaining the orientation and position of the camera lens
S6 with respect to the S0 system.
In this way, a straight line in the x-axis (camera lens) of the system S6 can be
projected into space using two points that are part of the x-axis (camera lens). The
equation of the line in space with the continuous form is given by [8]:
x − x0 y − y0 z − z0
= = (9)
v1 v2 v3
v1 = x1 − x0 (10)
v2 = y1 − y0 (11)
v3 = z 1 − z 0 (12)
From this projected line, the x and y values of the plane z = 0 are determined.
Which we will call x0utm and y0utm , these are the differential values in X and Y with
reference to the origin system S0 (Fig. 5).
In order to carry out the simulations, the conditions in a certain period of time in
which the gimbal is in flight are established. For this, it is imposed that the gimbal
is up to 1000 m of height, in the coordinates (1.285309, −78.834736) and whose
orientation is the result of the variation of q4 and q5 in 45°.
With these parameters, the orientation given by the transformation T matrix will
be as follows (Fig. 6).
The values of the desire parameters are obtained by programing in MATLAB,
and the formulas are presented or mentioned in this paper (Table 3).
In order to appreciate the results, Google maps [9] are used, where the gimbals
and target will be visualized (Fig. 7).
Fig. 7 UTM target points Google maps. Source Google maps [9]
As we can see, the geolocation system of targets on land shows a good approxi-
mation of the geographical coordinates of the target pointed by the camera.
In order hand to test the system, preliminary experiments were carried out in
controlled conditions and in locations with heights of no more than 13 m (Fig. 8).
132 Z. C. Marco Antonio et al.
4 Discussion
This paper presents the results of the simulation of the designed geolocalization
system. This is a tool that can give information in real time of the geographic coordi-
nates of the surroundings, specifically of the objects visualized by the camera of the
gimbal. This information can be very useful as an input for the planning of military
ground operations.
The results of the preliminary tests of Table 4 show good results with a tolerable
error; this error was product in greater proportion by the sensitivity that presented
the servomotors of the gimbal which by their physical characteristics and the time
of operation presented a resolution of 1.5° if this resolution improved the error will
consequently reduce.
It is important to emphasize that the system has the limitation of the UTM zone,
since the formulas of the transformation of geographic coordinates to UTM and vice
versa use as input to the central coordinate of the corresponding UTM zone, which
is different for each zone.
With the development of the geolocation system, a boost will be given to the
development of operational capabilities in the Air Force by means of new tech-
nologies. The use of this technology will be attached to the nation’s security and
defense activities. In addition, this technology can be extrapolated for use in civilian
applications.
References
Abstract This article presents the autonomous speed and positioning control for a
drone using fuzzy logic to track a target within a restricted area. Classical controllers
present a problem, as in general they only support one input and one output and a
system model is always required. For this application, it is necessary to analyze two
inputs, the position in “x” and the position in “y” of an object that will be recognized
by the drone through artificial vision. The goal is to control the speed at which the
drone moves according to the position of the object detected by the machine vision
within a restricted area, resulting in a faster or slower movement that will improve
the tracking of a moving target by delivering real-time object monitoring information
to the user in order to take some action based on this information.
1 Introduction
tion from the environment through cameras, sensors, etc. [3]. At Zayed University,
they analyzed the potential applications of drones in environmental monitoring and
urban space management, as well as their potential risks [4]. In the USA, researchers
are looking for ways to supply basic necessities [5] and improve logistics in the
event of natural disasters [6]. In agriculture, combining the benefits of working with
unmanned aerial vehicles and introducing concepts of AI and the Internet of Things
(IoT), so-called precision farming is sought after [7]. This shows that drones are an
ideal tool to provide solutions to multiple problems in today’s world. An application
for security and surveillance is the tracking of targets by means of several robots
with sensors on board [8], and this evidences that the use of robots that provide data
in real time is an advantage in the monitoring of restricted areas. Early detection of
an intruder invading private or restricted property ensures that defense mechanisms
take more efficient action to safeguard the integrity of the complex and the security
of elements of force, occupying a network of technologies that help maintain order.
This research proposes a fuzzy control system to improve the positioning of a
drone in a satisfactory manner. There are classic control systems well known as
the PID which requires precise mathematical models, used by Korean engineers
to develop an intelligent tracking drone [9]. Hybrid controllers such as fuzzy PID
control have also been used to avoid obstacles in enclosed environments, proposed
by the Universidad de La Frontera (Chile) [10]. However, fuzzy logic control was
chosen for its favorable performance in systems where it is intended to position
itself in a point of interest, a field in which this research is focused; for example,
the autonomous landing system of an unmanned aerial vehicle based on artificial
vision, which, through the integrated camera, detects the landing point and positions
it through a fuzzy control [11]. The implementation of the fuzzy control was carried
out using a Python programming algorithm without the use of libraries. To form the
fuzzy logic sets, the work of researchers at the University of Surabaya [12] was taken
into account, showing how they built the sets for each of the axes of a drone.
Fuzzy logic allows ordinary language to be used as a variable for a computer. Knowl-
edge is interpreted as a collection of fuzzy constraints on a group of variables. This
logic is widely used in decision support systems. Fuzzy logic allows a computer to
reason in linguistic terms and rules in a manner similar to that of human beings [13].
A fundamental part of the fuzzy logic is the selected membership functions. A
fuzzy logic set is an ordered pair of an “x” element belonging to a U universe and its
degree of membership, as shown at (Fig. 1). The functions of membership, which give
the degree of membership, can be defined in a functional way, which has different
forms such as trapezoidal, triangular, bell, etc. [14].
The type of controller chosen was the Mamdani [15], its architecture, which has
the following structure [16]:
Fuzzy Logic for Speed Control in Object … 137
3 Development
To form fuzzy sets and membership functions, it is necessary to know what input
data and the range of values they can take. The system detects by artificial vision
the position of the object’s center of interest so the data entry will be the location of
pixels in the X- and Y-axes of the image; and the size in pixels of the input image is
640 in the X-axis and 480 in the Y-axis as shown in (Fig. 2a).
The purpose of the application is to move the drone to the location of the object
in question; therefore, it must be located in the center of the input image, being this
the set point. Thus, we have the image divided into four quadrants, sectioning the
X-axis into two parts of 320 pixels each and the Y-axis into 240 pixels as shown in
(Fig. 2b).
Within the image, three regions are defined to determine in which area the object
is located. “Close” corresponds to the area near the center of the image, i.e., when
the distance between the drone and the object is relatively small. “Normal” refers
to the middle zone between the center of the image and the peripheral zone of the
image, and in this region, the distance will be intermediate. And “Far” corresponds
to the farthest area located at the edges of the image, and at these points, the drone is
at a long distance from the target, as shown at (Fig. 3a). The set point, located in the
center of the image, divides the X- and Y-axes into two equal parts. The X-axis has
its components right and left, and the Y-axis has its components above and down, as
shown at (Fig. 3b).
Once the input parameters and the way in which the data obtained is sorted are
defined, the fuzzy sets are formed. As can be seen in (Fig. 4), both the X- and Y-axes
are similar, so the number of sets will be the same, with a variation in the range of
values. On the X-axis, the range of values is from −320 to 320 pixels forming five
sets: “FarL,” region far to the left side, “NormalL” intermediate region to the left
side, “Near” region near the center of the image, “NormalR” intermediate region
to the right side and “FarR” distant region to the right side, as shown in (Fig. 4a).
Fig. 4 a Fuzzy sets on the “x” axis. b Fuzzy sets on the “y” axis
Fuzzy Logic for Speed Control in Object … 139
Similarly, on the Y-axis, the range of values ranges from −240 to 240 pixels, making
five sets: “FarL,” far region on the left side, “NormalL” intermediate region on the
left side, “Near” region near the centre of the image, “NormalR” intermediate region
on the right side and “FarR” far region on the right side, as shown in (Fig. 4b).
Once the sets have been formed, they are mathematically defined for later coding in
programming language. The mathematical equation of the lines forming the polygon
of each set and the range of values they are in are described in Tables 1 and 2.
With the fuzzy process data dissemination, the fuzzy controller rules for speed vari-
ation are developed, where the considerations are as follows: For “far,” the drone
will be at its maximum “fast” speed, and as it approaches the object it will pass at
“normal” distance so that its speed will be “medium” and when it reaches a location
near it “near,” its speed will be “slow” with respect to the center point. The rules are
shown in Table 3.
For the deburring of the processed data, the membership functions for the fuzzy
control are formed where the speed given for the drone is from 0 m/s to a maximum
of 15 m/s, considering the three parameters for “slow,” “medium” and “quick,” as
shown in (Fig. 5). Finally, the previously formed sets are mathematically defined for
later implementation in programming language (Table 4).
Fuzzy Logic for Speed Control in Object … 141
4 Implementation
The implementation of the code was done in Python, since in this language it is
possible to find the functions that allow control the air vehicle. The programming of
the image acquisition, addressing and fuzzy controller for the speed was based on
the structure shown in (Fig. 6).
The drone used for the implementation is a 3DR SOLO (Fig. 7) with a PIX-
HAWK 2.1 controller, to encode the board is used Python programming language
and as Linux development environment. The controller board has its own libraries to
send instructions to the unmanned aerial vehicle and position it at the point of inter-
est; these libraries are used to send the fuzzy controller result to the drone’s flight
parameters. The communication protocol used is mavlink wifi, which establishes a
stable connection with the PC control medium.
For image processing, OpenCV was used to develop a BGR file with the parame-
ters to highlight the blue object between the ranges (B = 100, G = 65, R = 75) and
(B = 130, G = 255, R = 255) placed in a filter layer as in (Fig. 8). In this case, the
blue object was used to represent the unauthorized object inside the restricted area,
but it could be customized in order to detect different objects, such as vehicles or
people, using advanced artificial vision algorithms which are not presented in this
paper.
5 Analysis of Results
Then, it is analyzed whether the result of the fuzzy control is consistent with the
requirements, i.e., whether the velocity value grows and grows according to the
position of the detected object. The speed values are then compared with the values
obtained through Matlab to check if the implemented code responds correctly.
Fuzzy Logic for Speed Control in Object … 143
Test 1: The object is in one position (1.0) and the speed is 0.04375, tending to
zero. Therefore, the result is acceptable as in this position the drone should remain
static.
Test 2: The object is in a position (−69.43) one and the speed is 5.9885. The
two coordinates are at extreme values of the near and normal sets, so it follows that
the speed must be within the range of slow and average speeds. The speed value is
acceptable.
Test 3: The object is in a position (−123.75) one and the speed is 8. The two
coordinates are in values belonging to the normal position sets, i.e., the speed of the
drone is average. The result is acceptable for this test.
Test 4: The object is in one position (−276,166) one and the speed is 13.49. The
values of the X, Y coordinates are between the far and far ranges of normal and far,
and speed is expected to be between the mid and fast ranges. The speed delivered in
this test meets the requirements.
Test 5: The object is in one position (−290.199) one and the speed is 14.25. Both
coordinate values are in the far range, and the speed is the maximum the algorithm
can provide. The result is optimal in this case.
Table 5 presents the results where it is compared with the Matlab software where
a similarity between the values obtained is evident without this altering the func-
tionality of the implemented controller. As you can see, the results vary slightly,
although the growth trend is similar. The probable cause is that Matlab uses a dif-
ferent method to debrister the final result than the one used for code implementation
(Discrete centroid method).
Several tests were carried out, three of which are presented at (Fig. 9), which shows
an increase in speed as a function of the distance from the drone to the object. The
results are shown in Table 6.
144 R. N. Jácome et al.
6 Conclusions
A fuzzy controller with two inputs and one output (MISO) has been easily imple-
mented on a drone, which provides speed data based on the distance of the object
that has been recognized. Real-time images of 640 × 480 pixels have been acquired,
resulting in triangular-shaped membership functions defined for the distance in “x”
and “y” to be able to associate when an object intended to track is near or far.
Fuzzy logic control was implemented in Python programming language because
it is a high-level hybrid language, and it is the development native language of the
drone. The principal advantage of this fuzzy logic controller is that it could be applied
to any type of UAV because the system model of the UAV is not required for control,
and it could be developed in any other programming languages depending on the
UAV manufacturer.
Importance of the presented research work is that the speed control and positioning
system can be used and developed within applications mostly in the area of security
and defense, such as, for example, non-identified people and objects tracking inside
secure areas.
Acknowledgements Thanks to the University of the Armed Forces ESPE for the support provided
to this research work.
Fuzzy Logic for Speed Control in Object … 145
References
1. Ramírez, N.V., Laguna Estrada, M.: La lógica borrosa: conjuntos borrosos, razonamiento aprox-
imado y control borroso (2012). http://pistaseducativas.itc.mx/wp-content/uploads/2013/01/6-
RAMIREZ-PE-100–55-65.pdf. Accessed 20 November 2017
2. Camastra, F., Ciaramella, A., Giovannelli, V., Lener, M.: A fuzzy decision system for geneti-
cally modified plant environmental risk assessment using Mamdani inference, ScienceDirect,
1710–1716 (2015)
3. Olivares Mendez, M., Mejias, L.: See-and-avoid quadcopter using fuzzy control. In: IEEE
World Congress on Computational Intelligence, p. 1 (2012)
4. Gallacher, D.: Drone applications for environmental management in, Science Target, p. 1 (2016)
5. Scott, J.E., Scott, C.H.: Drone delivery models for healthcare. In: 50th Hawaii International
Conference on System Sciences, p. 1 (2017)
6. Restas, A.: Drone applications for supporting disaster, SciRes, p. 1 (2015)
7. Saha, A.K., Saha, J., Ray, R.. Sircar, S.: IOT-based drone for improvement of crop quality.
IEEE, p. 1 (2018)
8. Hausman, K., Müller, J., Hariharan, A., Ayanian, N., Sukhatme, G.S.: Cooperative control for
target tracking with onboard sensing. Exp. Robot. 879–892 (2015)
9. Yang, W.-S., Chun, M.-H., Jang, G.-W.: A study on smart drone using quadcopter and object
tracking techniques. IEEE, p. 1 (2018)
10. Gatica, N., Muñoz, C., Sellado, P.: Real fuzzy PID control of the UAV AR.Drone 2.0 for, IEEE
(2017)
11. Olivares Mendez, M., Kannan, S., Voos, H.: Vision based fuzzy control autonomous landing
with UAVs: From, IEEE, p. 1 (2015)
12. Indrawati, V., Prayitno, A., Utomo, G.: Comparison of two fuzzy logic controller schemes.
IEEE (2015)
13. González Morcillo, C.: Lógica Difusa. técnicas de Softcomputing. http://www.esi.uclm.es/
www/cglez/downloads/docencia/2011_Softcomputing/LogicaDifusa.pdf
14. Santos, M., Suescun, E.M.: Aplicación de la lógica difusa en el ambito de las energías renovables
(2012). https://dialnet.unirioja.es/descarga/articulo/5085360
15. Ören, A., Koçyığıt, Y.: Landing sequencing modelling with fuzzy logic: opportunistic approach
for unmanned aerial systems. In: 2016 International Conference on Unmanned Aircraft Systems
(ICUAS), pp. 943–948, (2016)
16. Lovato, A.V., Oliveira, J.C.M.: Airplane level changes using fuzzy control. In: International
Conference on Fuzzy Systems (2010)
Part IV
Health Informatics in Military Applications
Micro-controlled EOG Device for Track
and Control Military Applications
Abstract This paper presents a system with tracking and remote control capabilities
for military applications. An electrooculogram and a micro-controlled system with
wireless communication were developed as controller based on the eye movement.
The system can be used as remote control for military purposes and also for soldier
monitoring. A proof of concept to act and be tested as mouse pointer was implemented
with reduced circuitry and PIC microcontroller in order to achieve low cost and
low profile platform. Experimental results are shown to validate a prototype of the
proposed system.
1 Introduction
Biopotentials are signals that result from electrophysiological activities that occur
inside the cells. Those activities can represent many physical behavior that human
being does along the day, for example, to walk, to pick an object and to blink the
eyes [1, 2].
Those biopotentials can be measured and applied to track some specific behavior
or to treat diseases and to control objects [2].
There are four biosignals covering all activities performed by humans, that are
electrocardiogram (ECG), electroencephalogram (EEG), electromyography (EMG)
and electrooculogram (EOG), which are the potential arising from muscle contrac-
tions of the heart, neural activities (or brain activities), activity from fiber or group of
muscle fibers and difference of potential between the cornea and the retina, respec-
tively [1–4].
Rising advances in biopotential acquisition, processing and applications are allow-
ing low profile devices, with more battery life and lower cost, motivating new markets
to use them like consumer and defense [4, 5]. Acquisition and control of EOG sig-
nals appear in this scenario as an alternative to track soldier behavior, to monitor his
health from remote places or to use as a remote control signal for military devices
[6–11].
This work presents a device that can be applied for military purposes both in track
or monitor field as in control applications. As a proof of concept of device idea,
a mouse pointer micro-controlled by eye movement is developed and validated by
experimental tests.
2 Proposed System
The EOG signals are pulses that vary proportional to the degree of eye movement.
As higher the degree of eye movement, higher is the EOG signal amplitude [1, 2].
Figure 1 shows typical EOG signals.
To validate the proposed system idea, to track eye movement and to control objects
by the same biopotential, a mouse pointer device micro-controlled by the EOG signal
was implemented. The EOG system block diagram is shown in Fig. 2.
The implemented system can be divided into two subsystems: the acquisition
system, that contains the electrodes, instrumentation amplifier and filters; and the
processing and control system that is performed by the PIC18F microcontroller. Also,
a wireless transmission system can be added in order to send the control signals to
remote devices. Below are presented those subsystems in more detail.
Fig. 3 Electrodes
positioning
EL+ Rf2
Rf3
Vout
Cf2 Rf3
EL-
Rf3 Rf2
Filter. In order to get a better pulse acquired from eye movement and suitable to
be read in PIC inputs, an active low-pass filter is implemented at the output of the
instrumentation amplifier in order to eliminate the high frequency noise. The filter
schematic can be seen in Fig. 5.
At filter output is a signal ready to be read at PIC microcontroller input and
processed.
Micro-controlled EOG Device for Track and Control … 153
Cf2
Rf1 Rf2
Vin
Cf1 Vout
Rf3
Rf2
Start
The processing and control system can have a transmitter after filter output, that
wirelessly transmits the EOG signals to a receiver coupled to the PIC microcontroller,
in order to process and control remote devices or to monitor the EOG signals. The use
of radiofrequency signals can allow remote control applications for long distances
for example in battlefield context.
The microcontroller used was the PIC18F. Its function is to acquire the analog
signal from the EOG and convert it into a digital signal using one of its analog-
to-digital converter (A/D) inputs. Then the signal is processed using an algorithm
developed exclusively for this application which its flowchart can be seen in Fig. 6.
Two PIC A/D inputs are used to acquire EOG signals represented in the flowchart
as X and Y inputs, or horizontal and vertical inputs, respectively. Since PIC A/D is
10-bit resolution so the microcontroller can read 1024 different levels representing
EOG voltages from 0 to 5 V. Before EOG signal enters in PIC A/D input, it passes
through a 2.5 V offset in order to test the average value 512. As can be seen in Fig. 6,
the mouse movement is incremented or decremented in two dimensions if the inputs
are below or above of the offset.
154 N. L. M. Viana et al.
The post-processed signals are used to control the device. Depending on the device
to be controlled, the signals can be sent wirelessly or by serial connection, stored to
be monitored in real time by another device.
3 Results
In Fig. 9, the pulses higher than offset indicate that the volunteer eye movement
was to the left side and the pulses less than offset represent the eye movement to the
right side. In the same way, Fig. 10 represents the volunteer eye movement down
when pulses are higher than offset and up when pulses are less than offset which is
in agree with the fluxogram previously presented.
Transmission and reception prototypes in the same modular profile are under
construction.
4 Conclusions
This paper presented a system proposal for track and remote control based on the eye
movement and can be used for military purposes both monitor or control applications.
In order to validate the system device, a micro-controlled mouse pointer was
implemented and tested. The results showed the pulses acquired from the horizontal
and vertical movements and the prototype proved a low profile, as low as 5 × 3 cm,
and low cost platform to be used.
The prototype tested was effective attending the initial proposal, with the functions
of track eye movement for each direction: right, left, up and down, and also the blink,
that for military control applications could be a confirm signal.
Micro-controlled EOG Device for Track and Control … 157
Some improvements are been done as to adapt acquisition system to special glasses
without the necessity of disposable electrodes and cables, to be applied in a more
real battlefield context, and also, with receive-transmit capabilities.
References
1. Bronzino, J.D.: The Biomedical Engineering Handboook, 2nd edn. CRC Press, Boca Raton
(2000)
2. Malmivuo, J., Plonsey, R.: Bioelectromagnetism: Principles and Applications of Bioelectric
and Biomagnetic Fields. Oxford University Press, USA (1995)
3. Yazicioglu, R.F., Hoof, C.V., Puers, R.: Biopotential Readout Circuits for Portable Acquisition
Systems. Springer Science & Business Media (2009)
4. Tseng, Y., Ho, Y., Kao, S., Su, C.: A 0.09 µW low power front-end biopotential amplifier for
biosignal recording. In: IEEE Transactions on Biomedical Circuits and Systems, pp. 508–516.
IEEE (2012)
5. Ha, S., Kim, C., Chi, Y.M., Akinin, A., Maier, C., Ueno, A., Cauwenberghs, G.: Integrated cir-
cuits and electrode interfaces for noninvasive physiological monitoring. In: IEEE Transactions
on Biomedical Engineering, pp. 1522–1537. IEEE (2014)
6. Patil, N., Iyer, B.: Health monitoring and tracking system for soldiers using internet of
things (IoT). In: International Conference on Computing, Communication and Automation
(ICCCA2017), pp. 1347–1352, IEEE, Greater Noida, India (2017)
7. Bisio, I., Delfino, A., Lavagetto, F., Sciarrone, A.: Enabling IoT for in-home rehabilitation:
accelerometer signals classification methods for activity and movement recognition. IEEE
Internet Things J., 1–11. IEEE (2016)
8. Rossi, M., Rizzi, A., Lorenzelli, L., Brunell, D.: Remote rehabilitation monitoring with an IoT-
enabled embedded system for precise progress tracking. In: IEEE International Conference on
Electronics, Circuits and Systems (ICECS), pp. 384–387. IEEE, Monte Carlo, Monaco (2016)
9. Jiang, M., Gia, T.N., Anzanpour, A., Rahmani, A.-M., Westerlund, T., Salantera, S., Liljeberg,
P., Tenhunen, H.: IoT-based remote facial expression monitoring system with sEMG signal.
In: IEEE Sensors Applications Symposium (SAS). IEEE, Catania, Italy (2016)
10. Reyes, C.R.P., Vaca, H.P., Calderón, M.P., Montoya, L., Aguilar, W.G.: MilNova: an approach
to the IoT solution based on model-driven engineering for the military health monitoring. In:
CHILEAN Conference on Electrical, Electronics Engineering, Information and Communica-
tion Technologies (CHILECON). IEEE, Pucon, Chile (2017)
11. Tavakoli, M., Turicchia, L., Sarpeshkar, R.: An ultra-low-power pulse oximeter implemented
with an energy-efficient transimpedance amplifier. IEEE Trans. Biomed. Circuit. Syst. IEEE
(2009)
Part V
Leadership and e-Leadership
Multilevel Military Leadership Model:
Correlation Between the Levels
and Styles of Military Leadership Using
MLQ in the Ecuadorian Armed Forces
1 Introduction
The increasing complexity and evolution of organizational science means that lead-
ership research should be prepared for a multilevel study approach, supported mainly
by the progress in the analysis of its data. This analysis allows the complex field of
leadership to develop specific theoretical-methodological advances at each level [1],
going from conceiving a type of individual leadership in the 1980s, organizational
in the 1990s and multilevel since 2000 [2].
C. H. P. Narváez (B)
Programa de Doctorado de Economía y Empresa, Universidad de Málaga, Málaga, Spain
e-mail: celiopn@hotmail.com
A. F. J. Vélez
Centro de Investigación y Desarrollo FAE, Ambato, Ecuador
R. C. Fernández
Universidad de Málaga, Málaga, Spain
O. F. Téllez
Universidad Técnica de Manabí, Portoviejo, Ecuador
© Springer Nature Singapore Pte Ltd. 2020 161
Á. Rocha and R. P. Pereira (eds.), Developments and Advances in Defense
and Security, Smart Innovation, Systems and Technologies 152,
https://doi.org/10.1007/978-981-13-9155-2_14
162 C. H. P. Narváez et al.
The multilevel approach appears in 1989 under the name of stratified systems
theory, depending on the time and work complexity. Subsequently, Hunt (1991,
1996) adapts the theory to a vertical leadership perspective at the different levels of
the organization, called the multi-organizational leadership model.
This model establishes that there are critical tasks that must be carried out by
the leaders in an organization, according to their level, thus they will have tasks
that change its complexity based on their level. The complexity of these tasks can
be measured in several ways, one of them will be the time taken to accomplish
every single task, activities or projects developed by an individual or team. The tasks
assigned to the lower levels will have a shorter time of execution than the tasks
performed at higher levels.
That is why the multilevel extended model indicates that the variety of tasks com-
plexity leads to a division of three levels; where the lowest level of the organization
is called direct or production, the level in the middle is called organizational and the
highest level as systems or strategic, being these levels highly related to each other.
Leadership at the direct or production level involves administrative or operational
procedures and maintenance of individual or collective skills; the organizational
comprises the integration of organizational elements focused on the compliance of
the objectives and its mission statement; and the leadership of systems implies the
development of the mission statement, articulation of objectives, strategies, princi-
ples, policies and planning of the organizational systems [3, 4].
In this sense, Reeves-Ellington (2015) presents another classification of leader-
ship: junior, middle and higher. The junior level leadership is in charge of taking
care of the lower levels of the organization; the medium has a key role in the com-
pany integration, its broader social environment and personal climate have strong
links throughout the organizational community; and the superior level with the main
responsibility of controlling strategic execution through the supervision of human
and budgetary resources, achieving a community and holistic result [5].
Although the time that the military officer remains at this level depends on the
acquired skills, generally spoken, it is made up of military personnel who start their
military career until around the 12 years of service, being this reference the limits,
and considering that the military profession could last for approximately 35 years;
logically, these times vary according to the institution and analyzed country.
In mid-level operational leadership, the main objectives and resources are adapted;
where a link between the complex decisions, guidelines of the strategic level and the
tasks fulfilled by the tactical level is established.
At this level, a large amount of useful information is analyzed to advise the
superior level; therefore, the people at this level must have a clear understanding of
the different systems of the organization, which allows them to decide their correct
interaction. The operational level is made up of military professionals whose service
time can generally be 12–24 years of service.
The strategic leadership is the highest level, where the organizational goals and
objectives are established, and it is unfolding in an uncertain, changing, unknown
and complex environment, because the strategic leader is the direct link to organiza-
tions outside the military environment, with different characteristics. Therefore, the
leader at this level has a knowledge focused on the national, regional and global per-
spective, with a capacity for convincing and negotiating, which allows him to make
successful decisions, since the implications will affect the direction and evolution of
the institution.
The level of strategic leadership is made up of the entire institutional high com-
mand, with approximately 24–35 years of service.
Hence, leaders are trained to finally achieve their full leadership at a higher level. It
is important to point out that during the process, they acquire a series of institutional
and personal competencies.
Among the competencies that must be developed by leaders for the growth of their
leadership, there are three broad categories: technical, interpersonal and conceptual
competencies; at the tactical level, specific skills or technical knowledge is required,
which decrease as the level of leadership increases, in contrast to the interpersonal
skills that are essential at all levels, as well as the conceptual competencies that grow
as the level of leadership increases, allowing to determine important aspects of the
organization.
In the case of technical competencies, these cover specific knowledge regarding
the assigned technical aspects, they are required at all levels, but in a different way,
at the tactical level consists generally in using, operating or maintaining a team or
system; they focus on solving specific problems, as well as carrying out specific
tasks and missions. At the operational level, the personnel can lead to establishing a
network of systems, and at the strategic level, they are useful for decision-making, by
facilitating the synchronization of information with a system of systems, or to design
164 C. H. P. Narváez et al.
The statistics mentioned that no leadership model will have all the elements that
make it effective. The effective leader develops skills in three areas: personal, team
and organizational.
Personal competency is considered as the basis for the growth of the leader, since
it refers to leadership over oneself, here self-knowledge and awareness of skills,
strengths, weaknesses and values are highlighted, before leading the rest of people;
it also works on development, self-growth and continuous learning, which are based
on feedback and image as a role model for other followers.
In the case of the team competency, it is based on personal leadership, plus the
sum of values and competencies of the people, this competency means heading a
team that works in a coordinated way that pursues a common goal, and also the
leader seeks to lead the entire team toward the same vision, within the scope of their
competencies, contributing with collaboration, creativity and innovation, developing
relationships of trust and solidarity among team members.
Finally, the organizational competency is the one that handles the general context,
the macro-tendencies of the different systems, basing its action in the strategic think-
ing, where the organizational leader must establish the vision of the organizational
future, values, objectives, strategies, as well as making decisions and developing
Multilevel Military Leadership Model: Correlation … 165
actions to try to take advantage of the changes that occur in the external environment
of their institution [7].
Leadership has been one of the most important variables in the consideration of the
leadership effectiveness perceived by employees and their performance and satisfac-
tion at work.
Bass and Avolio, important leadership researchers, based on charismatic leader-
ship and transformational leadership, establish a new leadership model called multi-
factorial leadership theory in which the types of transformational, transactional and
laissez-faire leadership are included. These leadership researchers also raise a ques-
tionnaire of multifactorial leadership (MLQ Multifactor Leadership Questionnaire)
to evaluate and measure these types of leaders with their characteristics and effects.
The transformational leadership is the one that motivates, transforms, inspires
employees to overcome personal interests, seeking optimal performance, for organi-
zational benefit. It comprises five factors: idealized influence (attributed), idealized
influence (behavior), inspiration or inspirational motivation, intellectual stimulation
and individualized consideration (Table 1).
The transactional leadership is characterized through the fulfillment of objectives
that implies a reward; financial or moral; as well as, negative results due to poor
performance have a negative action from the leader. This leadership is not identified
by presenting a vision of the future, but rather by focusing on the current organi-
zational situation. It comprises three factors: contingent rewards, management by
active exception and management by passive exception (Table 2).
In the wide range of leadership, there is a topic of permanent relevance and it has been
the military leadership. Wong and several authors review the existing literature in this
field, highlighting the opportunities and importance of research in this field, bringing
up Hunt’s Multilevel Leadership Model, mainly for the various facets involved in
that leadership [8].
In addition, we know that this military leadership is classified into three levels,
which are related to levels of military strategy, requiring the military to develop
different types of competencies. Among the main required developed competencies
are the personal and institutional competencies, in order to be properly prepared to
be able to ascend to the next level of leadership.
That is why institutional competencies, classified in technical, interpersonal and
conceptual, are required at all levels of military leadership, but in different ways at
each level.
In the case of the technical skills, they are very necessary at the tactical level, since
the tasks developed at this level are predominantly technical and specific. However,
these competencies decrease as the leader rises in the operational level, and his needs
are even lower at the strategic level, which is no longer purely technical.
On the other hand, interpersonal skills are fundamental at all levels of leader-
ship; however, they are not always the same as they are developed according to the
level, because at the tactical level the people deal with military personnel, while at
the strategic level is required to have strong networking abilities, coordination and
negotiation with other institutions.
Finally, highlight that conceptual competencies begin at the tactical level, which
are being necessary to understand the importance of specific tasks for the use of
Multilevel Military Leadership Model: Correlation … 167
means, until reaching the strategic level where the global concept that implies leading
the organization is essential.
However, we not only have institutional competencies, but also personal compe-
tencies that exist within the military leadership, which refer to the development of
the military’s personal leadership, being these: personal, team and organizational.
Personal competency is referred to self-knowledge and self-awareness in the per-
sonal formation as a leader, fundamental in the level of tactical leadership at the
beginning of the military career, as the time passes by, the military personnel needs
less of this competency, as they evolve in the leadership levels, until they become a
leader with solid personal training at the strategic level.
Regarding the competency of teams and people, it will always be in the evolution
of the leader since the composition of the team members varies, for example, at the
tactical level teams will be made up of technical personnel, while at a strategic level
teams of directors, commanders, leaders of different disciplines must be led.
In the case of organizational competencies, these allow the leader to have a vision
of their environment, develop strategies to achieve objectives in the unit they lead,
which at the tactical level will be a small structure while at the strategic level the
whole organization will be.
It is important to note that currently the military leaders of countries such as
Canada, the USA and Portugal have focused their efforts on developing transforma-
tional leadership in depth, since it is due to its own characteristics of motivation,
transformation and the vision it transmits superiors to subordinates, the levels of
effort and satisfaction with the objectives have been evidenced, when it comes to
guiding behaviors in military organizations [9, 10], and also in civil organizations
[11, 12].
Therefore, even when the laissez-faire leadership is present in the tactical leader,
because he is a leader in the initial stage of their formation; that transactional lead-
ership is found at the operational level in actions, that generate responses and effects
that could be whether negative or positive from their superiors, and that transforma-
tional leadership is present in the strategic leader, who leads the entire organization;
there is no determined interrelation between the levels of leadership and the three
styles of leadership, being fundamental to establish this relationship as an initial step
to develop a Multilevel Military Leadership Model whose scheme is presented in
Fig. 1, and its purpose is focused on promoting the formation of qualified leaders
committed to the military organization.
The present study proposes the application of the Multifactorial Leadership Ques-
tionnaire (MLQ) of Bass and Avolio [13, 14], whose empirical validity has been
recognized and used to obtain data that allow to determine the style of leadership
and the relationship with variables of performance and satisfaction at work. The
168 C. H. P. Narváez et al.
Fig. 1 Military Multilevel Leadership Model. Source Prepared by the authors, based on [6, 7]
MLQ has some versions, we will use one adapted to the needs of the Armed Forces
of Ecuador [15].
The first stage will be done through surveys, whose questions will be based on
measurement instruments determined by the MLQ. This survey will be applied to
military officers of the three branches of the Armed Forces of Ecuador (Army, Navy
and Air Force), via Google Forms due to the respondents that are in different cities
of the country.
The officers have been initially considered, since they lead the different levels
of the military organization (tactical, operational and strategic) and are the ones
that receive the direct influence of their leaders, influencing their subordinates or
followers through their leadership, throughout the different charges they occupy.
The people surveyed will be stratified, based on the three leadership levels, in order
to provide data for each level. For the distribution and application of the survey,
the authorization of the corresponding authorities will be requested, establishing
preparatory meetings with the focal points determined by each military unit.
For the tabulation phase, data analysis and treatment of results, comparisons will
be made with similar studies in the military field. In addition, it is intended to deter-
mine, based on the surveys and data, the predominant leadership style at each level of
leadership, be it transformational, transactional and laissez-faire, as well as its rela-
tionship with influence on variables such as performance and satisfaction at work.
Multilevel Military Leadership Model: Correlation … 169
The final results will be needed to proceed to the validation stage using multivariate
techniques, determining the modeled relationship between the leadership style and
the aforementioned variables.
Finally, the results obtained with the organizational authorities will be analyzed
and discussed, in order to later move on to a socialization stage and structuring of
institutional leadership manuals with regional projection, which seeks to highlight the
importance of the influence of the type of leadership of officers in the organizational
management variables of the Armed Forces under a multilevel military leadership
approach.
4 Conclusion
References
1. Dionne, S.D., et al.: A 25-year perspective on levels of analysis in leadership research, Leadersh.
Q. 25(1), 6–35 (2014)
2. Batistič, S., Černe, M., Vogel, B.: Just how multi-level is leadership research? A document
co-citation analysis 1980–2013 on leadership constructs and outcomes, pp. 1–18 (2016)
3. Hunt y, J., Ropo, A.: Multi-level leadership: grounded theory and mainstream theory applied
to the case of general motors 6(3), 379–412 (1995)
4. Van Wart, M.: Leadership in Public Organizations, 2nd edn. Routledge, New York (2014)
5. Reeves-Ellington, R.: Enviroscapes: a multi-level contextual approach to organizational lead-
ership. Emerald Gr. Publ. Ltd., pp. 337–420 (2015)
170 C. H. P. Narváez et al.
1 Introduction
E-leadership is an emerging research topic and for this reason, several studies [2, 3]
have determined its importance for the challenges and benefits it brings to organiza-
tions; creating a new way of leading in a virtual environment. In this regard, we find
some empirical studies of e-leadership, as shown below:
1 WhatsApp is a messaging application for smartphones, which sends and receives messages via the
Internet, complementing instant messaging services, short message service or multimedia messag-
ing system.
E-leadership Using WhatsApp, A Challenge for Navy Organizations: An Empirical … 173
• Liu et al. [10], conducted a qualitative study to study the communicative adoption
of the e-leader. A model is used on structural equations proposed by Van Wart et
al. [12]. The authors mention that the model adjusts adequately to e-leadership,
achieving a greater understanding of the performance of e-leaders.
• Fan et al. [7] conducted an experimental study to test the influence of the moti-
vational language of the e-leader in virtual teams. The experiment was conducted
on 107 university students in Taiwan. The results showed that the instructions
given by digital media have positive effects on creativity and generation of ideas.
Although, the positive stimulus depends on the empathic writing of the e-leader.
• He et al. [8] conducted a study to establish the difference between leadership and
e-leadership, establishing the effectiveness and challenges of e-leadership in the
virtual environment, (e.g., technology, communication, cultural differences, trust,
and logistics). However, there are limitations such as: lack of confidence, lack of
cohesion, level of relationship, among others.
The aforementioned empirical works show that empirically evaluating e-leadership
in organizations is important. However, the evaluation could be specific to each orga-
nization because of the way each one works. Therefore, these authors [3, 8, 10] have
proposed strategies based on three perspectives: technology, communication, and
trust, as a starting point to evaluate e-leadership, as explained below.
and supervision of dispositions, especially when in recent years its members have
ventured into the use of WhatsApp as a means to issue and follow up on dispositions.
This is the reason why we have posed the following research question (RQ):
3 Research Methodology
1. Design of the Survey. An on-line survey was designed considering the guidelines
for creating and conducting surveys proposed by [9, 11]. This allowed, on the one
hand, to produce descriptive statistics, and, on the other hand, to obtain important
information to answer the research question proposed for this study.
2. Construction of the survey. Based on the perspectives of e-leadership mentioned
by [7, 8, 10] in the Sect. 2, the survey is constructed with 18 obligatory questions:
4 general information questions, 6 technology questions, 4 communication ques-
tions, and 4 questions of trust. The survey can be answered in an average of 10 min
(depending on the feedback provided) which does not fatigue the respondents.
The questions are closed so as not to give rise to erroneous interpretations or
irrelevant answers. The detail of the obtaining of the questions of the survey can
be found in the link: https://bit.ly/2QPLqOV.
3. Evaluation instrument. It was done in two stages. First, a researcher with experi-
ence in the subject of leadership reviewed the survey and provided feedback on its
readability, understandability, and potential ambiguities. Your feedback allowed
to lead to the elimination of 3 mandatory questions. Secondly, piloting was car-
ried out with two members of the naval–military organization (not included as
authors), who helped to pilot the survey before being formally applied.
4. Population and sample size. The population is oriented to the members of a
naval–military organization of Ecuador in different hierarchical levels: Comman-
ders Lieutenants and Lieutenants of the last years who have proven experience
of naval–military leadership. The population is adjusted around 1360 members.
To obtain the sample size (η), the following formula was applied (1):
(Z 2 ∗ p ∗ q ∗ N )
η= (1)
N ∗ e2 + Z 2 ∗ p ∗ q
E-leadership Using WhatsApp, A Challenge for Navy Organizations: An Empirical … 175
4 Results
The results obtained from the survey are very interesting and allow us to answer our
research question. Next, the characteristics of the respondents are mentioned and
then our research question is answered.
The results allow us to respond to our RQ. However, they will be explained in the
three perspectives of e-leadership, as mentioned below:
2 Instatistics, the sample size (η) is the number of subjects that make up the sample drawn from
a population and are necessary for the data obtained to be representative of the population. The
variable Z is a constant that depends on the level of confidence for this study is 95%. The variable
p is the proportion of individuals who possess the characteristic of study in the population. This
data is generally unknown and it is usually assumed that p = q = 0.5, which is the safest option. The
variable q is the proportion of individuals that do not possess this characteristic, that is, it is 1-p.
176 R. P. Reyes Ch. et al.
dents (29.41%) mentioned that there should be trust from subordinates to the e-leader.
This allows us to reflect on a possible distrust of the superior; and for this reason, the
e-leaders considered that their subordinates could not ethically handle the disposi-
tion or information belonging to the virtual group (e.g., forwarded to other groups,
etc.). Almost half of respondents (41.18%) mentioned this strange behavior of their
subordinates while 44.12% of respondents are not sure if their subordinates would
have handled or not ethically the information or dispositions within the virtual group.
We also ask respondents if they apply confidence-building strategies. Several of
them mentioned writing congratulatory messages or similar within the WhatsApp
178 R. P. Reyes Ch. et al.
group (47.06%) or simply they maintain a fluent and proactive communication before
interacting with WhatsApp (47.06%). Likewise, respondents were asked if they fol-
low up on dispositions. The results show that 55.88% of respondents use a control
model based on the continuous monitoring of virtual messages while a 17.65% con-
siders leaving the subordinate the compliance.
5 Threats to Validity
The possible threats to the validity of this study are discussed according to the aspects
mentioned by Creswell [5], as indicated below:
• Conclusion Validity. It refers to the degree to which the conclusions obtained are
derived from the data [5]. Only possible threat is the lack of representativeness of
180 R. P. Reyes Ch. et al.
the chosen sample. This threat does not operate, since it was chosen respondents
who possess a high level of experience and leadership practice within the naval–
military organization.
• Internal Validity. This type of validity refers to the absence of other influential
variables in the study, except those that are being studied [5]. In the online survey
conducted, the appearance of other influential variables should only appear due
to errors in the formulation or understanding of the survey questions. To mitigate,
an introduction to the survey is provided to familiarize the respondent with its
purpose. On the other hand, as a way to guarantee the veracity of the data, we have
given anonymity to the responders.
• Construct Validity. This type of validity refers to the relationship between a
theory behind the observation [5]. For this, a study of the previous literature about
the e-leadership mentioned in the Sect. 2 was carried out. Likewise, the survey was
evaluated by an experienced researcher and piloted by two members (non-authors)
of the organization.
• External Validity. External validity refers to the generalization of results [5].
The results obtained are valid externally because the selected sample size is very
representative in the naval–military organization.
The results obtained for our RQ based on the technology, communication, and trust
perspectives proposed by [7, 8, 10] show that e-leadership using WhatsApp in a
naval–military organization maintains conflicts that are not easy to solve in the virtual
environment, it is even possible to say that they are difficult to solve in a traditional
leadership. The conflicts we refer to are those that appear between perspectives: (1)
technology–communication, (2) communication–trust, and (3) trust–technology.
Regarding the first case, conflicts appear when the dispositions sent by virtual
messages are ignored. Reason why, the e-leader tries to make communication efforts
to mitigate these conflicts such as the telephone or in person. The second case refers
to conflicts for distributing exclusive information and high priority of the virtual
group by other electronic means (e.g., Facebook, other virtual groups, etc). The latter
is very complicated to mitigate by the e-leader given the degree of viralización of
information (without restriction) that WhatsApp allows. And regarding the third case,
conflicts are generated by the little effective trust that virtual environments allow,
since it is shown that subordinates do not usually handle ethically the information
and dispositions in their virtual group.
Practically, the e-leadership on electronic messaging tools like WhatsApp are still
complicated to articulate. Several of these conflicts that we mentioned were detected
by their authors [7, 8, 10] but in other virtual environments such as: videoconference
or e-mail. Therefore, before a military–naval organization wishes to complement
its traditional leadership with e-leadership, it is necessary to develop an attitude
framework based on institutional values and principles. Possibly, modeling an ethical
E-leadership Using WhatsApp, A Challenge for Navy Organizations: An Empirical … 181
Acknowledgements This work was supported by the Academia de Guerra Naval - Armada del
Ecuador and Dirección General de Educación y Doctrina and sponsored by Universidad de las
Fuerzas Armadas ESPE.
References
1. Aggarwal, A.: E-leadership-a new and modern style of leadership. IJAME (2018)
2. Avolio, B.J., Kahai, S., Dodge, G.E.: E-leadership: implications for theory, research, and prac-
tice. Leadersh. Q. 11(4), 615–668 (2000)
3. Avolio, B.J., Kahai, S.S.: Adding the e to e-leadership: how it may impact your leadership.
Organ. Dyn. (2003)
4. Bass, L., Israel, M.S.: Modeling ethical leadership: being an ethical leader means modeling
principles of self-awareness, reflective practice, transparency, and ethical behavior. In: Devel-
oping Ethical Principles for School Leadership, pp. 29–49. Routledge (2018)
5. Creswell, J.W., Clark, V.L.P.: Designing and Conducting Mixed Methods Research. Sage Pub-
lications, Thousand Oaks (2017)
6. Esguerra, G.A., Contreras, F.: Liderazgo electrónico, un reto ineludible para las organizaciones
de hoy. Estud. Gerenc. 32(140), 262–268 (2016)
7. Fan, K.T., Chen, Y.H., Wang, C.W., Chen, M.: E-leadership effectiveness in virtual teams:
motivating language perspective. Ind. Manag. Data Syst. 114(3), 421–437 (2014)
8. He, R., et al.: E-leadership strategy in virtual organizations and virtual teams (2008)
9. Kitchenham, B.A., Pfleeger, S.L.: Personal opinion surveys. In: Guide to Advanced Empirical
Software Engineering, pp. 63–92. Springer, Berlin (2008)
10. Liu, C., Ready, D., Roman, A., Van Wart, M., Wang, X., McCarthy, A., Kim, S.: E-leadership:
an empirical study of organizational leaders virtual communication adoption. Leadersh. Organ.
Dev. J. 39(7), 826–843 (2018)
11. Punter, T., Ciolkowski, M., Freimut, B., John, I.: Conducting on-line surveys in software engi-
neering. In: Proceedings of 2003 International Symposium on Empirical Software Engineering,
ISESE 2003, pp. 80–88. IEEE (2003)
12. Van Wart, M., Roman, A., Wang, X., Liu, C.: Integrating ICT adoption issues into (e-) leadership
theory. Telemat. Inform. 34(5), 527–537 (2017)
Part VI
Planning, Economy and Logistics Applied
to Defense
Career Anchors for the Portuguese
Army’s Volunteers and Contract
Personnel: Using the Career Orientations
Inventory
Abstract This study aims to identify and discuss the career anchors of the Por-
tuguese Army’s volunteers and contract personnel, in order to outline a “profes-
sional profile” that can help the organization improving its decision-making process,
in terms of management practices and working and living conditions. The study
addresses the internal dimension of the concept of career using a three-pronged
approach—regulatory, theoretical, and empirical—to find out whether career anchors
are determinants for the choice to join the military, as well as for the length of
time served. The study uses quantitative and qualitative strategies, with emphasis on
Schein’s Career Orientations Inventory (COI). The survey had a valid final sample
of 1821 members from the Portuguese Army. The study’s findings suggest a pro-
fessional profile based on a dominant career anchor, “Lifestyle”, which, combined
with complementary anchors (e.g. “Security/Stability”), and provide a qualitative
explanation for the participants’ choices.
1 Introduction
This study examines the career orientations of the Portuguese Army’s volunteer and
contract personnel to discover how this knowledge could help solve and/or mitigate
the current constraints to the model’s sustainability.
About 15 years after Portugal formally suspended its compulsory military service
(CMS) in the wake of it having been declared unconstitutional their requirements
[1] in 2004, implementing a strictly voluntary service [2–4], the military’s ability
to recruit and maintain the personnel needs has been progressively declining. These
difficulties are currently on the political agenda and have been addressed by multiple
studies conducted by the Ministry of National Defence, by the branches of the Por-
tuguese Armed Forces (AAFF), and by several independent researchers (e.g. [5–12]).
In the light of this, the paper attempts to diagnose the causes of the main difficulties
and devise ways to mitigate their negative consequences.
Despite the studies conducted in Portugal during recent years (e.g. [13, 14]), it
was only recently that some authors [9–11, 13] began to examine the AAFF’s man-
agement practices and the living and working conditions of citizens, who join the
military as volunteers for a maximum period of seven years [2, 3]. However impor-
tant, this awareness of some intrinsic factors in the organization’s functioning does
not seem to be sufficient to guarantee the success of the military professionalization
model, as the current situation is critical and calls into question the model’s sustain-
ability. Therefore, it remains necessary to explore, from a theoretical and practical
perspective, the reasons that hinder recruitment and retention, especially in terms of
“internal career” orientation [15, 16], a concept that will be explained further on.
The first phase of the study is focused on the Army branch, and its objective
was to identify and discuss the career anchors of the Portuguese Army’s volunteers
and contract personnel. In order to outline a “standard professional profile” which
the AAFF can use as a guide to select the most appropriate management practices
and create suitable working and living conditions, helping members to achieve their
“internal career” orientations as well as encouraging citizens to join the military.
The research question is: “What are the main ‘internal career orientations’ of the
Portuguese Army’s volunteer and contract personnel, and how do they relate to the
main reasons that lead citizens to join and remain in the military?”.
As for the quantitative dimension of the research, an adapted version of Schein’s
Career Orientations Inventory (COI) [15] was used to identify the main “career
anchors” of the military volunteers and contractors” of the Portuguese Army. The
qualitative dimension of the empirical study can provide a better understanding of
members’ professional profile, as well as increase awareness regarding the adoption
of management practices that can be used to improve recruitment and retention.
The article is divided into five sections. After this introductory section, the second
section briefly presents the legal framework of military service and the theoretical
framework, examining the concept of career anchors as a determinant for members’
professional choices and the nature and type of link that exists between them and
organization. The third section outlines and explains the methodology, and the fourth
section presents and discusses the study’s main findings. The fifth and final section
presents conclusions based on the main findings and answers the general objective
and the research question, also providing suggestions for future research.
Career Anchors for the Portuguese Army’s Volunteers … 187
The legal framework, an essential part of this research, concerns the service model
for volunteer and contract military personnel, its conceptual and legal organization,
and its operationalization. The model is defined in the legislation as voluntary service
and contract service (VS/CS) and is governed by a set of specific law, which include:
the Military Service Law, the Military Service Law regulations, and the regulations
of the military Incentive Scheme [2–4].
The concepts of recruitment and retention are especially relevant for this legal
framework. Military recruitment can refer to both voluntary and contract schemes,
and consists of the set of operations carried out to capture human resources, that is,
citizens above the age of 18 who are willing to serve in the AAFF [2]. Retention
refers to the need to maintain contract personnel and their expertise in the AAFF,
to meet specific organizational goals and obtain an appropriate return on the organi-
zation’s investment on education and training [3, 16]. If the “expectation of service
completion” is not met, members could have to pay damages proportional to their
training period and its associated costs.
Currently, the military voluntary and contract service model of the Portuguese
AAFF provides only short-term careers: if members fulfil certain requirements after
one year of voluntary service, they can become “regular” contract personnel for a
period of six years [2, 3]. Under certain conditions, members may also opt for a
medium-term career by entering a “special contract scheme” that allows them to
extend their contractual link up to 18 years of service. Despite a specific law having
been recently approved to allow for this type of career mobility [17], this option has
not yet been regulated and is in the process of regulatory expansion. In addition to the
possibility of career mobility between regular contract schemes and the possibility
to transfer to a longer-term contract scheme, members can also apply to the career
staff of the AAFF [2, 18], which provides them a long-term career until retirement
age.
In 2000, after the enactment of the new Military Service Law [2], an incentive
scheme [4] for military personnel serving under VS/CS was approved, which proved
instrumental to capture and retain, staff, as well as to support their socio-professional
transition to the labour market. Due to fiscal difficulties, this law has been revised
and reduced in its scope and possibilities. The increasing difficulties recruiting and
retaining staff are compounded by changes in the sociocultural, demographic, and
generational context. Therefore, a new law was recently approved expanding the
incentive scheme for military volunteers and contract personnel, which now mentions
the special military contract scheme [19].
188 L. A. B. dos Santos and M. M. M. S. S. Coelho
which are subject to his or her “individual will”, allowing for greater functional and
inter-organizational mobility [24–29].
Despite Schein’s [21] suggestion that each person has one anchor that defines
their strengths, goals, motivations, and values, several studies have tested the eight
types and have obtained different systematizations, which indicates that, while a
dominant anchor may exist, individual career orientations are a dynamic process and
a professional profile is consolidated over time, resulting from a combination of up
to three anchors, according to Feldman and Bolino [30].
On the other hand, the construct’s empirical limitations have led to other studies
that attempt to validate and/or refine Schein’s construct by reducing the number of
clusters (e.g. [31]) or, in contrast, by adding more clusters (e.g. Security/Stability;
Entrepreneurial-Creativity), such as those conducted by Danziger, Rachman-Moore,
and Valency [32]. Other studies even suggest additional anchors to meet twenty-
first-century requirements such as “Employability” and “Spiritual Dimension” [25].
Despite these various updates and adaptations, the foundations of the original con-
struct proposed by Schein seem to have remained current due to the instrument’s
internal consistency. However, in order to account for sociocultural, economic, gen-
erational, and other contextual factors, researchers should use the COI in combination
with other instruments to ensure more robust results. This study combines Schein’s
eight career anchors with a qualitative dimension.
Another concept addressed in this study, which is fully applicable to military
contexts, is that of psychological contract, which refers to employee perceptions
about the organization’s obligation to reciprocate the work performed [33, 34]. These
perceptions are based on explicit or implicit promises and may result from more or
less formal agreements with the organization, or simply from the expectations of
individuals regarding the organizational context and the interactions with some of
its elements [35]. The type of relationship that is established between individual
and organization and the degree to which the expectations match reality can either
strengthen or weaken the psychological contract and can ultimately lead to its dis-
solution (breach). This could cause employees to become less involved in activities
outside their regular duties, leading to uncertainty and dissatisfaction and increasing
employee exits from the organization [36–38]. Some common reasons for a breach of
the psychological contract may stem from (1) inadequate management practices, (2)
lack of support from the organization and/or management regarding external issues,
and (3) lack of equity among employees [35].
A review of the sociocultural and professional characteristics of the Y and Z
generations was conducted to investigate the implications of their specific features
for recruitment and retention. Despite their relevance, due to space constraints, the
results of the review are not included in this article.
Based on the regulatory and theoretical review, a chart was prepared to illustrate
the guiding structure for the study (Fig. 1).
190 L. A. B. dos Santos and M. M. M. S. S. Coelho
Fig. 1 Guiding structure for the study: summarizes the theoretical framework and the main concepts
reviewed
contexts, these policies and practices are relatively standardized, although there are
some differences according to professional groups and areas.
This section summarizes the methodological procedures and identifies the popula-
tion, the sample, the gather data instruments, and the analysis techniques.
The research is based on a case study [39] that investigates the applicability and value
of career anchors to the Portuguese Army’s volunteer and contract personnel during
2018.
The study used a mixed research strategy (quantitative and qualitative) developed
simultaneously in the context of the proof and of the discovery. The findings were
obtained by combining the processes of induction and construction of meaning, in
which the researchers assumed an ontological and epistemological posture closely
related to constructivism and interpretivism [40–42].
The study used documentary data based on the legislation that regulates the military
VS/CS model, as well as empirical data obtained from a questionnaire that consisted
of 40 close-ended questions and four open-ended questions. The target public of the
questionnaire was volunteers in contract regime of the Portuguese Army belonging
to several professional categories.
The questionnaire used in this study (closed-ended questions) is adapted from
Dutra and Albuquerque questionnaire [22]. However, this one was also adapted from
Schein [15, 21].
In order to apply our questionnaire to the Portuguese military context, we did
three procedures: firstly, an adaption to the military population, secondly we did a
validation with experts on military human resources, and thirdly, we did a pretest
with 11 Portuguese military in regime of contract volunteers.
The final version of the questionnaire was online and the link was sent by e-mail to
the Army, Navy, and Air Force, being available for filling from March until October
2018. The answers were automatically introduced in an Excel database.
192 L. A. B. dos Santos and M. M. M. S. S. Coelho
An overall analysis of the results of the quantitative component reveals that the eight
career anchors defined by Schein are present in the sample, although in different
proportions.
The mean values show that all three professional categories (officers, sergeants,
and enlisted) and both genders have a dominant career anchor (“Lifestyle”), as well
as secondary career anchors (“Stability/Security”, “Technical/Functional”, “Service
and Dedication to a Cause”, and “Pure Challenge”), which obtained relatively high
values (Tables 2 and 3).
This analysis can be fundamental for the definition of a standard professional
profile (career orientations) of the citizens currently serving in the Portuguese Army
as volunteers or under contract.
The dominant career anchor obtained much higher values than the second most
important anchor, although this difference is less marked in the officer’s category. The
relative importance of secondary anchors varies according to professional category
and gender: “Technical/Functional Competence” is the second most important career
anchor for officers and sergeants, as well as for men, and “Security/Stability” is the
second career anchor for enlisted personnel and for women. For the latter, the anchor
“Service/Dedication to a Cause” is also important.
The least relevant career anchor for all categories and genders is “General Manage-
ment Competence”, followed by the anchor “Autonomy/Independence”. The career
anchors “Service/Dedication to a Cause” and “Pure Challenge”, which are charac-
teristic of the military environment, are moderately important for military volunteers
and contract personnel, and are slightly higher for the sergeants category and for
female members.
It is relevant to conclude that women score high in the main anchors, and on the
other hand, they score low in the less important anchors, which can indicate a more
developed self-concept in terms of professional orientation.
The results obtained from the analysis of the qualitative component of the ques-
tionnaire confirm that career anchors are generally present in all phases dur-
ing the service term in the AAFF—recruitment, retention, and transition to the
labour market—although some anchors (General Management Competence, Auton-
omy/Independence, and Entrepreneurial-Creativity) obtained insignificant values,
which confirms the general trend of the results of the quantitative analysis.
Figures 2, 3, 4, and 5 summarize the results of the content analysis of the four
open-ended questions.
Only results that obtained 15 or more occurrences were included in the type net-
works, regarding the initially defined types (which means that not all types associated
with the anchors are shown in the images) and emerging types.
The size of the nodes and the thickness of the line segments that link them rep-
resent, respectively, the importance of each type within each topic/question and the
strength of the relationship between the types.
First and Second Open-Ended Question: Reasons for Joining and Remaining
in the Military
Reasons for joining the military. The types of career anchors Pure Challenge (CH)
(505 occurrences) and Service/Dedication to a Cause (SV) (261 occurrences), as
well as the relationship between them, obtained more relevant values than the other
types, which confirms the results obtained by earlier studies done by AAFF in 2012,
196 L. A. B. dos Santos and M. M. M. S. S. Coelho
2016, and 2017 [7–9]. Security/Stability (SE) is a key type for the process of joining
the military, showing a significant correlation with the emerging type Employability.
In military context, this last type represents the choice to remain in the organization
under VS/CS or to seek further qualifications and/or apply to the career staff.
Reasons for joining the military. The type of career anchor Security/Stability (SE)
(750 occurrences) is one of the most important reasons given by respondents for
remaining in the military and is associated with the types Pure Challenge (CH)
(240) and Service/Dedication to Cause (SV) (119), as well as with the type of
Employability (138). Work Conditions and VS/CS Incentive Scheme are emerging
types closely correlated to the quality of the work environment and the possibility to
benefit from the incentive scheme provided by law.
Third Open-Ended Question: Reasons for Early Separation
The reasons that lead members to separate from the military before completing the
minimum length of service defined by law, although they still wish to maintain their
“employee” status (Security/Stability) (650 occurrences), stem from dissatisfaction
regarding certain individual needs. When faced with Work Conditions (310), which
they find inadequate, members look for job and financial stability outside the AAFF,
where they believe they can achieve better life conditions (Lifestyle (LS) (270).
In most cases, the Employability type (130) refers to the possibility of joining the
military for the advantages, when applying to a position in the security forces or to
certain positions in the Portuguese civil administration (provided for by law). The
VS/CS Incentive Scheme could be especially relevant in these cases.
Fourth Open-Ended Question: Concept of Career/Professional “Success”
The values obtained in the types of career anchors Security/Stability (271 occur-
rences) and Lifestyle (103), as well as the correlation between them, show that the
respondents’ concept of professional success confirms the overall relevance of the
corresponding anchors in the quantitative component of the analysis. Here, the first
type correlates to all the others. The emerging type Achievement (161) is the second
most important type for the concept of success and correlates with each of the types
obtained from the responses to the fourth open-ended question. The other emerg-
ing types that explain respondents’ perceptions are Employability (57), Recognition
(78), Military Career (101), Career Development (69), and Successful (46).
This section presents the main conclusions of the methodological procedure and
provides an answer to the general objective and research question.
The study’s general objective was to identify and discuss the types of career
anchors of the Portuguese Army’s volunteers and contract personnel. The purpose is
Career Anchors for the Portuguese Army’s Volunteers … 197
6 Final Conclusions
This section discusses the study’s contributions, usefulness, and limitations, as well
as it makes recommendations and suggestions for future studies.
According to the “Professional Profile”, VS/CS Personnel, the Results Suggest
– Seek to balance their personal, family, and career/professional needs, which career
anchor is the “Lifestyle”.
– Prefer to work in specific areas of expertise and/or technical functions, where they
can use the qualified skills they acquired previously or developed in a military
context, which career anchor is “Technical/Functional Competence”.
– Seek stability, work benefits, and financial security through long-term employment
in an organization, preferably, and if possible, in a functional and geographic area
198 L. A. B. dos Santos and M. M. M. S. S. Coelho
that allows them to be close to their family/close social group, which career anchor
is “Security/Stability”.
– Are (moderately) motivated by the symbolic, vocational, and operational aspects
of military service, by the utility of the work and its role in helping to solve societal
problems, which career anchor are “Pure Challenge, and Service/Dedication to a
Cause”.
– Find typical management and general management activities and responsibilities,
which career anchor is “General Management Competence”, somewhat unappeal-
ing.
References
1. Law No. 1/97, of 20 September: Approves the Fourth Revision of the Constitutional Law.
Assembly of the Republic. Diary of the Republic, Lisbon (1997)
2. Law No. 174/99 of 21 September: Approves the Military Service Law. Assembly of the Repub-
lic. Diary of the Republic, Lisbon. https://dre.pt/application/dir/pdf1sdip/1999/09/221A00/
65416550.pdf (1999)
3. Decree-Law No. 289/2000 of 14 November: Approves the Regulation of the Military Service
Law. Portuguese Government. Diary of the Republic, Lisbon. https://dre.pt/application/dir/
pdf1sdip/2000/11/263A00/64256438.pdf (2000)
Career Anchors for the Portuguese Army’s Volunteers … 199
Difficulties and challenges of a changing context.] ARES Collection, vol. 22, pp. 193–238.
Military University Institute, Lisbon (2018)
15. Schein, E.: Career Anchors: Discovering Your Real Values. Pfeiffer & Company, University
Associates, San Diego (1990)
16. RTO/NATO: Recruiting and Retention of Military Personnel. Technical Report of RTO
(Research Task Group), HFM-107, NATO Research & Technology Organization. https://www.
nato.int/issues/women_nato/Recruiting%20&%20Retention%20of%20Mil%20Personnel.pdf
(2007)
17. Decree-Law No. 75/2018 of 11 October: Second amendment to Decree-Law No. 130/2010 of
14 December, approving the special military contract scheme. Portuguese Government. Diary
of the Republic, Lisbon (2018)
18. Decree-Law No. 90/2015 of 29 May: Approves the Statute of the Armed Forces Military Person-
nel. Portuguese Government. Diary of the Republic, Lisbon http://www.emgfa.pt/documents/
cqw3zjnhvg4s.pdf (2015)
19. Decree-Law No.76/2018 of 11 October: Establishes the incentive scheme for former or active
duty AAFF personnel under contract (CS), special contract (SCS) or volunteers (VS). Por-
tuguese Government. Diary of the Republic, Lisbon. (2018)
20. Derr, C.: Five definitions of career success: implications for relationships. Appl. Psychol. 35(3),
415–435 (1986)
21. Schein, E.H.: Identidade Profissional: como ajustar suas inclinações e opções de trabalho.
Nobel, São Paulo (1996)
22. Dutra, J.S., Albuquerque, L.: Âncoras de Carreira – In: Career Anchors by Edgar H. Schein.
Adapted for Human Resource Management. FEA-USP, São Paulo (2009)
23. Rego, A., Cunha, M., Gomes, J., Cunha, R., Cabral-Cardoso, C., Marques, C.: Manual de
Gestão de Pessoas e do Capital Humano, 3rd edn. “Gestão” Collection. Edições Sílabo, Lda,
Lisbon (2015)
24. Arthur, M., Rousseau, D.: The Boundaryless Career: A New Employment Principle for a New
Organizational Era. University Press, New York, Oxford (1996)
25. Baruch, Y.: Managing Careers: Theory and Practice, pp. 79–80. Prentice Hall, FT, Harlow,
England (2004)
26. Chanlat, J.F.: Quais carreiras e para qual sociedade? RAE – Revista de Administração de
Empresas. São Paulo 35(6), 67–75 (1995)
27. Dutra, J.: Administração de Carreiras – Uma Proposta para Repensar a Gestão de Pessoas.
Atlas, São Paulo (2012)
28. Hall, D.: Careers In and Out of Organization. Sage, London (2002)
29. Martins, H.: Gestão de Carreiras na Era do Conhecimento. Qualitymark, Rio de Janeiro (2010)
30. Feldman, D.C., Bolino, M.C.: Careers within careers: reconceptualising the nature of career
anchors and their consequences. Hum. Resour. Manag. Rev. 6(2), 89–112 (1996)
31. Coetzee, M., Schreuder, D.: Using the career orientations inventory (coi) for measuring internal
career orientations in the South African organisational context. S. Afr. J. Ind. Psychol. 35(1),
99–111 (2009). https://doi.org/10.4102/sajip.v35i1.806
32. Danziger, N., Rachman-Moore, D., Valency, R.: The construct validity of Schein’s career
anchors orientation inventory. Career Dev. Int. 13(1), 7–9 (2008). https://doi.org/10.1108/
13620430810849506
33. Rousseau, D.M.: Psychological and Implied Contracts. Empl. Responsib. Rights J. 2(2),
121–139 (1989)
34. Rousseau, D.: Psychological Contracts in Organizations: Understanding Written and Unwritten
Agreements. Sage, Thousand Oaks (1995)
35. Conway, N., Briner, R.: Understanding Psychological Contracts at Work. Oxford University
Press, New York (2005)
36. Cable, D.A.J.: The Psychological contract: the development and validation of a managerial
measure. Ph.D. Thesis in Phylosophy. Hamilton, Waikato University, New Zeeland (2008)
37. Turnley, W.H., Feldman, D.C.: Re-examining the effects of psychological contract violations:
unmet expectations and job dissatisfaction as mediators. J. Organ. Behav. 25–42 (2000)
Career Anchors for the Portuguese Army’s Volunteers … 201
38. Van de Ven, C.: The psychological contract: a big deal! (Chapter 3E). In: Recruiting and
Retention of Military Personnel, Literature Reviews for Selected Recruitment and Retention
Topic 3-1 Areas, pp. 3E1-19. Research and Technology NATO, Paris. https://www.nato.int/
issues/women_nato/Recruiting%20&%20Retention%20of%20Mil%20Personnel.pdf (2007)
39. Yin, K.R.: Case Study Research – Design and Methods, 5th edn. Sage Publications, Los Angeles
(2014)
40. Bryman, A.: Social Research Methods, 4th edn. Oxford University Press, Oxford (2012)
41. Creswell, J.W.: Qualitative Inquiry & Research Design: Choosing Among Five Approaches,
3rd edn. Sage Publications, Los Angeles (2013)
42. Guerra, I.C.: Pesquisa Qualitativa e Análise de Conteúdo: Sentidos e Formas de Uso. Principia,
Parede (2006)
43. Denzin, N., Lincoln, Y. (eds.): Collecting and Interpreting Qualitative Materials, 4th edn. Sage
Publications, Los Angeles (2013)
Part VII
Simulation and Computer Vision in
Military Applications
Implementation of Dubin Curves-Based
RRT* Using an Aerial Image
for the Determination of Obstacles
and Path Planning to Avoid Them During
Displacement of the Mobile Robot
1 Introduction
Unmanned aerial vehicles (UAVs) and mobile robots are used in different operations
according to their performances. UAVs have many limitations, for example, the
carrying capacity, flight time, etc. However, UAVs has a more ample range of vision
of a workspace and higher velocities [1]. On the contrary, mobile robots present many
advantages compared to UAVs. Mobile robots can carry heavier loads, have more
power units, and higher capacity for processing [2, 3]. The purpose is to combine
them to create a hybrid system taking into consideration the advantages of those
two robotic systems. In this proposal, the UAV is able to analyze a broad portion of
ground in specific workspace to provide safe displacement directions to the grounded
vehicle [4, 5].
The research presents a study to establish a global planner that represents the data
obtained from a top view generated by UAV [6]. First, the system develops an image
through processing algorithms based on artificial vision in order to determinate the
most relevant features inside the picture. In this case, the algorithm estimates the
position of the obstacles as well as the mobile vehicle’s destination.
LaValle [7] proposed RRT algorithm considered as an optimal technique to con-
struct trajectories in nonconvex high-dimensional spaces and used to solve path
planning problems. Commonly, an RRT is deficient to solve a problem related with
the planning; therefore, it is necessary to implement a path planning algorithm based
on that RRT* to expand the tree in free spaces [8]. The kinematic constraints of the
ground vehicle based on Ackerman steering makes RRT* algorithm grows drawing
curves easy to adapt the vehicle turning movements. This kind of curves is named
Dubins path. Finally, it is important to consider adjusting many parameters to expand
the tree; it will allow to know how the algorithm is affected when existing variations
of the obstacles, number of iterations and the length of the connection between the
tree’s nodes.
In Sect. 2, the article presents an image processing algorithm for constructing
a global planner. In Sect. 3, it details an analysis to establish a RRT* algorithm
using a geometrically method based on constructing tangent lines that connect two
points with a shortest curve in a Euclidean plane. Finally, in Sect. 4 results will be
presented according to the data obtained in different scenarios and various obstacle
configurations.
2 Image Processing
Transformaon
Image Image Image Morphological
from RGB to
Acquision smoothing binarizaon operaons
HSV
Parrot Bebop 2 was used as UAV. It has a 14-megapixel ‘fisheye’ with a 3-axis image
stabilization system that maintains a fixed angle of the view. The drone’s camera has
to point to the ground (vertical position), for getting vertical camera’s rotation we
have used a software development kit provided by Robot Operating System (ROS).
Experimental results show to an altitude of 4 m above ground level our region of
interest (ROI) covers an approximately metric area of 6 m × 4 m.
Object discrimination using red, green, and blue color space (RGB) turns difficult
because the object’s color is correlated with the amount of light exposure at the
moment. For that reason, hue, saturation, and value color space (HSV) is more
relevant to discriminate colors regardless the amount of light at the scene. Change
of color spaces from RGB to HSV in this application allows better adapting of the
obstacles’ algorithm to light changes, in cases which shadows contribute to false
positives [10].
Noise reduction is a very important factor for good image processing. In this case, it
is applied a Gaussian Blur filter [11]. This means that each pixel was affected for a
kernel (neighbor pixels). A kernel of size 5 was used and a Gaussian kernel standard
deviation in an X direction of 0, where the target is not to get a blurred image if else
to eliminate the small percent of noise.
2.4 Binarization
element on the ground, therefore, establishing a binarized map where the obstacles
have a pixel value of 0 and a pixel value of 1 is a free space. The hue value which
represents red color goes from 0º to 30º and 330º to 0º approximately. Another stage
is using the binarization to detect the target blue [13].
The dilation convolution adds pixels to the boundaries of the obstacles’ structure
reducing noise, while erosion removes pixels on the outside boundaries of the obsta-
cles’ structure. The dilatation and erosion combined result in better filter. It fills holes
(opening) and removes small objects (closing). The opening operation works with a
structuring element a size kernel of 5. The operation affects the pixel and a 5 × 5
matrix size, meanwhile closing operation uses a size kernel of 21 [14].
3 RRT* Algorithm
Dubins curves-based RRT* is used as a global planner. It establishes the path by two
types of configurations divided into curve—straight—curve (CSC) and curve-curve-
curve (CCC), which are the pattern of expansion in the RRT* algorithm. Random
sample paths are generated from combination of straight lines and curves.
Data input to get the path with the RRT* algorithm serve as initial state and orienta-
tion, numbers of iterations, goal state, and step size. To set Dubin curves parameters,
it is necessary to know the minimum turning radius of the robot. Finally, another
important input data is having the binarized map (workspace).
According to Noreen et al. [15], RRT* is based in a group of features which allow
tree expansion very similar to RRT algorithm. The difference between the systems
is that RRT* incorporates two special properties called near neighbor search and
rewiring tree operations.
The algorithm is represented by a tree denoted as T = (V, E), where V is a set
of vertices and E is a set of edges. The initial configuration (qinit ) includes a set
of vertices that represents where the tree starts. In each iterations configured (Lines
Implementation of Dubin Curves-Based RRT* … 209
3–11), the algorithm establishes a random position (qrand ) in free region, (qnear est ) is
searched in the tree according to predefined step size from (qrand ) and immediately
the algorithm establishes a new configuration (qnew ) with Steer function which
guides the system from (qrand ) to (qnear est ). The function Choosepar ent allows to
select the best parent node for the new configuration (qnew ) before its insertion in
tree considering the closest nodes that lie inside of a circular area, finding (qmin ).
Finally, near neighbor operations allow to generate the optimal path repeating the
previous process [16] (Table 1).
The Dubin curves describe six types of trajectories: RSR, LSR, RSL, LSL, RLR, and
LRL. Each configuration comes from an analogy that is denoted by R (right move),
S (straight move), and L (left move) [17].
All these configurations use geometrically computing method based on construct-
ing tangent lines between two circles. The first step has two circles C1 and C2 , with
their respective radius r1 and r2 , where C1 represents coordinates (x1 , y1 ) and C2 as
(x2 , y2 ) (see in Fig. 2).
Inner tangents. Then a line is drawn between two center points C1 and C2 estab-
−
→
lishing a vector V1 , magnitude D and the midpoint p3 (point between p1 and p2 ) is
calculated, circle C3 is constructed with a radius r3 as we reflected in Fig. 3
D= (x2 − x1 )2 + (y2 − y1 )2 (1)
x1 + x2 y1 + y2
p3 = , (2)
2 2
D
r3 = (3)
2
The next step is to draw another circle C4 located in C1 ’s center, with radius
r4 = r1 + r2 , we obtained pt , which is the intersection between C4 and C3 like
the one shown in Fig. 3. A triangle is built joining the points p1 , p3 , pt and we can
define geometrically that segment pt p1 = r4 and p1 p3 = pt p3 = r3 . The angle
γ = ∠ pt p1 p3 is very important to define the coordinates of pt . The next equation
−
→
determinates the amount of rotation about the x-axis, θ for V2 .
→
−
θ = γ + atan2 V1 (4)
−
→
−
→ V2
V3 = ∗ r1 (7)
V2
−
→
pit1 = p1 + V3 (8)
−
→
Finally, it is possible to draw a vector V4 from pt to p2 , as shown in the figure.
−
→
Using V4 magnitude and the direction, it is possible to find the inner tangent point
on C2 .
−
→
V4 = ( p2 − pt ) (9)
−
→
pit2 = pit1 + V4 (10)
Outer tangents. The process is very similar to the one of inner tangents, having
two circles C1 and C2 , and considering r1 ≥ r2 , the procedure is the same as before,
C4 is centered at p1 , with a difference the radius r4 = r1 − r2 , after getting pt and
−
→
following all steps performed for the interior tangents, V2 is obtained and the first
outer tangent point pot1 . This condition produces that r4 < r1 . To get the second
outer tangent pot2 an addition is performed by:
−
→
pot2 = pot1 + V4 (11)
The main difference between calculating outer tangents compared to inner tan-
gents is the construction of circle C4 ; all steps keep the same.
In the next figure (see Fig. 4), it can be seen the path establishes using data input.
212 B. Daniel Tenezaca et al.
4 Results
The experimental results produced by RRT* path planning based on Dubins curves
were performed using a CPU with an i7 third generation processor and 16 Gb RAM
memory. For algorithm testing, a scene with a necessary amount of light was chosen
to obtain the correct object segmentation. From this point, the test started with no
obstacles in the scene. Then, obstacles were gradually added to establish four different
configurations, in such way, algorithm functionality and efficiency was tested.
The algorithm was tested in five different cases (see Fig. 5), with no obstacles
(first case), one obstacle (second case), two obstacles (third case), three obstacles
(fourth case), and four obstacles (fifth case).
The algorithm satisfies its purpose because the path established (red line) started
from car’s position to the final configuration (blue circle) avoiding the obstacles.
Fig. 5 Scene configurations. a No obstacles. b One obstacle. c Two obstacles. d Three obstacles.
e Four obstacles
Implementation of Dubin Curves-Based RRT* … 213
150
Nº Obstacles vs Input data 150
nº itera ons
y = -4.6429x2 + 44.357x + 3
step size 100 R² = 0.9756 100
Step size
Poly. (nº 50 50
itera ons) y = 8.5714x2 - 67.429x + 196
Poly. (step R² = 0.9752
size)
0 0
0 1 2 3 4
nº itera ons 40 80 90 105 110
step size 140 90 70 70 70
nº Obstacles
Fig. 6 Number of iterations and step size processed for each obstacle configuration
Another aspect to consider was that the goal position should have a tolerance radius
of 60 pixels measured from the goal position’s center point.
The first measurement of results (see Fig. 6) showed that the cases in which
obstacles were added, it was necessary to increase the number of iterations to reach
the configuration desired. Forty iterations were the minimum to reach the goal in the
first case, compared with the fifth case where it was necessary at least 110 iterations
to establish a path for UGV to represent.
Based on the data processed, a second-grade polynomial equation was obtained
to represent the number of iterations required for a scene where there are more than
four obstacles in a scene.
The ideal value for step size for each case is decreasing if we take into considera-
tion the first test is with no obstacles and the fifth test has four obstacles in the scene.
One hundred forty pixels the maximum step size for the optimal performance of the
algorithm within the limits of workspace and for UGV to follow the path described.
In the last three cases (case 3, case 4, and case 5), the necessary step size is 70 pixels,
although the correlation of data is high by number of tests, the best possible solution
in case the number of obstacles increase would be tested with the same value of step
size.
Processing time required by the algorithm compared with the number of obstacles
is presented in (Fig. 7). The blue line (time 1) describes the necessary time for
expanding RRT* using an optimal data input for each case. The red one (time 2)
describes the time required to reach de goal destination if the data is fixed with
values of 30 pixels for step size and the maximum number of iterations is 1500.
214 B. Daniel Tenezaca et al.
Time
50
0
0 1 2 3 4
Ɵme 1 2 2 5 5 5
Ɵme 2 6 7 66 70 62
Nº Obstacles
5 Conclusions
From the data aforementioned in this paper, we can conclude that exists a direct
relationship between several iterations, step size, and quantity of obstacles. In case
with few obstacles within the workspace, we can configure the step size in maximum
value of 140 pixels allowing to reduce the number of times that mechanical direction
of UGV has to rotate. The number of iterations is directly proportional to the number
of obstacles because, more obstacles in the scene require to construct more iterations
to reach the goal with an optimal path.
Establishing constant input data was not the most efficient way to execute the
algorithm because if the step size configuration is too low, near 30 pixels, so the
UGV can take an excessive time to follow the path and require too many changes in
the direction of the robot.
This study has determined the importance of configuring initial parameters to
construct the RRT* algorithm. Considering the path planning is based in a global
planner, it is important to get the parameters in lesser time and optimal manner
possible to obtain a better routing of data between UGV and UAV. Also, the study
is the first stage of a global research for developing a collaborative robot system; we
focused on getting a correct path for a mobile robot to navigate without colliding with
objects around it. Finally, this work could be complemented with the development
of pure pursuit control for UGV.
References
1. Yulong, D., Bin, X., Jie, C., Hao, F., Yangguang, Z., Guanqiang, G., Lihua, D.: Path planning
of messenger UAV in air-ground coordination. IFAC-PapersOnLine 50, 8045–8051 (2017)
2. Sivaneri, V.O., Gross, Y.J.N.: UGV-to-UAV cooperative ranging for robust navigation in GNSS-
challenged environments. Aerosp. Sci. Technol. 71, 245–255, 2017
3. Rahimi, R., Abdollahi, F., Naqshi, K.: Time-varying formation control of a collaborative het-
erogeneous multi agent system. Robot. Auton. Syst. 62, 1799–1805 (2014)
4. Melin, J., Lauri, M., Kolu, A., Koijonen, J., Ritala, R.: Cooperative sensing and path planning
in a multi-vehicle environment. IFAC-PapersOnLine 198–203 (2015)
5. Rosa, L., Cognetti, M., Nicastro, A., Alvarez, P., Oriolo, G.: Multi-task cooperative control in
a heterogeneous ground-air robot team. IFAC-PapersOnLine 48, 53–58 (2015)
Implementation of Dubin Curves-Based RRT* … 215
6. Ropero, F., Muñoz, P., Moreno, M.D.R.: TERRA: a path planning algorithm for cooperative
UGV-UAV exploration. Eng. Appl. Artif. Intell. (2019)
7. LaValle, S.: The RRT Page (1999). [En línea]. http://msl.cs.uiuc.edu/rrt/index.html
8. Abbadi, A., Prenosil, V.: Collided path replanning in dynamic environments using RRT and
cell decomposition algorithms. Modelling and Simulation for Autonomous Systems: Second
International Workshop, pp. 131–143 (2015)
9. Sieberth, T., Wackrow, R., Chandler, J.H.: Automatic detection of blurred images in UAV image
sets. ISPRS J. Photogramm. Remote Sens. 122, 1–16 (2016)
10. Chernov, V., Alander, J., Bochko, V.: Integer-based accurate conversion between RGB and
HSV color spaces. Comput. Electr. Eng. vol. 46, pp. 328–337, 2015
11. Huang, J., Feng, H., Xu, Z., Li, Q., Chen, Y.: A robust deblurring algorithm for noisy images
with just noticeable blur. Optik 168, 577–589 (2018)
12. Chen, S., Li, D.: Image binarization focusing on objects. Neurocomputing 69, 2411–2415
(2006)
13. Dougherty, E.: Mathematical Morphology in image processing. Marcel Dekker, Nueva York
(1993)
14. OpenCV.: OpenCV 2.4.13.7 documentation. [En línea]. https://docs.opencv.org/2.4/modules/
imgproc/doc/filtering.html
15. Noreen, I., Khan, A., Habib, Z.: Comparison of RRT, RTT* and RRT*-smart path planning
algorithms. IJCSNS Int. J. Comput. Sci. Netw. Secur. (2016)
16. Karaman, S., Frazzoli, E.: Sampling-based algorithms for optimal. Int. J. Robot. Res. (2011)
17. Yao, W., Qi, N., Zhao, J., Wan, N.: Bounded curvature path planning with expected length for
Dubins vehicle entering target manifold. Robot. Auton. Syst. 97, 217–229 (2017)
Machine Learning and Multipath
Fingerprints for Emitter Localization
in Urban Scenario
Abstract A hybrid approach is proposed to perform the locate and tracking a non-
collaborative radio frequency emitter using ray tracing (RT) simulation tool, chan-
nel impulse response (CIR), and machine learning estimation. The technique can
enhance communication intelligence (COMINT) systems or even perform the local-
ization using a single sensor in an non-line-of-sight (NLOS) suburban scenario. A
multipath fingerprint can identify the target position using the machine learning
classification engine to perform the matching. Conventional localization techniques
mitigate errors trying to avoid NLOS measurements in processing emitter position,
while the multipath fingerprints proposed uses the reflection information to feed the
pattern matching engine build on a machine learning classification framework. The
method was applied to simulate a tactical scenario, where a navy frigate is in Ipanema
and tries to track an RF emitter target in the Rio de Janeiro streets using only one RF
sensors fixed in an aerostat in a hypothetical counterinsurgency situation.
1 Introduction
The estimation of the source of a signals’ location remains the subject of extensive
research for years and is increasingly receiving considerable interest in signal pro-
cessing scholarly community, including radar, GPS, wireless sensor networks, sonar,
animal tracking, multimedia, and mobile communications. In urban and counterin-
surgency operations, there is an increasing demand to have an information superiority
2 Problem Formulation
Assuming the typical scenario displayed in Fig. 1, Where a frigate if the navy is
placed close to a city cost to support some counterinsurgency operations, the ship
has an RF sensor with direction finding capability, and the sensors are installed in an
aerostat connected to the frigate flying at 100 meters over the sea level. A schematic
view of the sensor, the platform, and the navy frigate is shown in Fig. 2. To map the
reflection points in the environment as virtual sensors, assume a “non-collaborative”
emitter that has been tracked inside the city, the buildings, and the urban scenario
makes it impossible to have a clear line-of-site situation to locate the emitter (Fig. 3).
Using the approach introduced by [6], modified to perform the calculation using
the sensor S1RT and M scatters points at location Ri = [xi , yi , z i ]T . If the scatters’
position are known, it is possible to locate the RF target P using an adapted TDOA
measurements scheme introduced by [7].
The three most significant scatters that affect the signal received S1RT will be
considered as three others TDOA sensor, namely as “Virtual Sensors.” The position of
Machine Learning and Multipath Fingerprints for Emitter Localization … 219
Fig. 1 Schematic view using Google Earth of an emitter in a urban scenario (Ipanema-RJ) tracked
by a navy vessel with a RF sensor at 100 m
the sensors, the scatters, and the emitter presents an error, caused by the discretization
of the scenario. As the error also affects the precise reflection points’ information,
the virtual nodes modeled as virtual sensors position also presents a grid error.
The sensor position will be assumed to be TDOA sensor 1, and the three most
significant scatters that affect the signal received S1RT will be considered as three
others TDOA sensor, namely as “Virtual Sensors.” The emitter source is in position
P = [xs , ys , z s ]T ∈ R3 and the TDOA sensors, Si = [Si x , Si y , Si z ]i=1:4 at known
position in 3D coordinate system, as shown in Fig. 4.
As shown in Fig. 5, the channel impulse response presents a diffracted ray (α1 , τ1 ),
and three scatters that where reflected in R2 ,R3 , and R4 , in this situation we have the
time of propagation from emitter and the sensor, and the time of propagation from
the sensor to each reflection wall, as follows:
τ21 = a + b − τ1 ;
τ31 = c + d − τ1 ; (2)
τ41 = e + f − τ1 .
Machine Learning and Multipath Fingerprints for Emitter Localization … 221
The Figs. 4 and 5 can illustrate the differences of the RT virtual nodes data model
with the normal TDOA system. The sensor position and the reflection points are
assumed to be known under certain imprecision. The time differences from the sensor
base (S1RT ) to the other TDOA sensor in Fig. 4 or to the reflection points in Fig. 5, a,
c, e are also known. So, the central question is how to estimate the time differences
and perform the position estimation with this data model of [7]. Assuming that it
is possible to perform the CIR estimation and assign to each ray to each reflection
point in the scenario, these points can work as virtual TDOA sensors. The error in the
reflections points will be assumed as an error in the definition of the station position.
The TDOA computation between the signals received by the sensors is computed
several; first, the signal is filtered (“whitening”) and oversampled using Farrow filters
[8] and generalized cross- correlation function in phase(GCC-PHAT).
3 Proposed Method
This section describes the method proposed to enhance a TDOA localization system
when the emitter is in NLOS position, that is a typical situation of the outdoor channel
characteristics and cannot be avoided. Some methods deal with multipath assuming
222 M. N. de Sousa et al.
that they are outliers, but this approach is not feasible in a typical suburban scenario.
The proposed method is a combination of channel impulse response estimation and
ray tracing. The first step is to discover the strong multipath specular components
that affect the time measurements, this is performed doing the CIR estimation at
sensor position, after that, ones try to identify the main obstacles in the environment,
that produces the multipath rays.
The multipath parameters, defining the amplitude, time of arrival, and directions
of the incoming ray at the sensor position are calculated. The decision to use the
reflection points as virtual TDOA sensor, instead of using only the direct range
estimation was made because there is no synchronization between the emitter and
the receiver. As shown in Fig. 6, the buildings in the scenario cause reflections and
diffraction in the incoming signal at the sensor.
The method is schematically presented in Fig. 6, first, the ray tracing will perform
several simulations of the outdoor scenario, the output of the simulation is a descrip-
tion of the paths from each component of the signal that connects the emitter position
with the receiver point. The second step is to estimate the CIR to extract the multi-
path information (α1 , τi ) from the receiver signal in each sensor position. In the end,
a neural-network-based on machine learning engine performs the estimation of the
emitter position, enhancing the TDOA performance in the outdoor NLOS situations.
Depending on the precision of the obstacles description and the material properties
Machine Learning and Multipath Fingerprints for Emitter Localization … 223
included in the simulation, the ray tracing gives a reasonable representation of the
specular components that characterize the emitter–receiver relationship (Fig. 7).
The next step is to take the signal received by each sensor and make the channel
impulse response (CIR), where the information (α1 , τi ) extracted from the complex
baseband (CBB) received signal is associated with a defined position in the scenario.
The matching procedure between the CIR estimated, and the multipath dataset is
224 M. N. de Sousa et al.
Fig. 8 Wall and edges form the buildings in ray tracing simulation
Machine Learning and Multipath Fingerprints for Emitter Localization … 225
work as virtual sensors and the position estimation engine uses the time differences
as a modified TDOA system with only one station.
Following the approach of [10], the RT gives the information about the ray path,
describing the edges and wall touched by the rays in the emitter–sensor path. The
Fig. 8 gives a graphic representation of the visibility matrix calculation. Fig. 9 shows
the multipath fingerprints produced by ray trace simulation from sensor in the aero-
stat.
As described by [11], the machine learning (ML) tool is used to match the multipath
information to predict geolocation of the emitter. It is possible to use the regression
for prediction because it is a class of supervised algorithm that attempts to estab-
lish a continuous relationship between a set of dependent variables (geolocation
coordinates) and set of other independent variables (multipath fingerprints—αi , τi ).
Figs. 10 and 11 show the machine learning framework proposed.
First, we will try to use ML to approximate the position estimation as a target
function for optimization, the semi-supervised or supervised ML makes an approx-
imation to find a target function ( f ). This function should be able to map input
variables (X ), that are the multipath components (αi , τi ), to an output variable (Y ),
that is the emitter position. We used a set of tools as a machine learning framework
to develop and test the application, including:
226 M. N. de Sousa et al.
fied as semi-supervised learning. The network had ten inputs, i.e., five rays. Neural
networks, linear regression, and random forest algorithm were used to achieve the
result, and the random forest proved to be the best one.
One of the problems in the model proposed was the points that have less than
five paths. Then a set of hyper-parameters tuned the linear regression was used,
giving better results. In our formulation, we use the five strongest rays that arrive at
each point of the simulation domain. The proposed algorithm can be summarized in
Table 1.
4 Experiment Setup
The algorithm was applied to perform the position estimation in the region of
Ipanema, as described in Sect. 2, the target is inside an urban area, and the navy
vessel is trying to perform the localization using only one sensor and the ray tracing
fingerprint framework presented in Sect. 3 using just the sensor 1 and the ray tracing
simulation of the area of interest (AOI). The result was compared with a simulation
using the estimation performed by a complete TDOA systems using 4 (four) base
station nodes (S1 , S2 , S3 , and S4 ), deployed in the ocean in front of the AOI.
First, the complete scenario was reproduced in ray tracing simulation tools to
extract the multipath information, then, the most significant reflectors, considering
228 M. N. de Sousa et al.
the TDOA sensor 1 was obtained from the RT output files. The CIR estimation proce-
dure was performed using a signal synthetic generated using a binary pseudo-random
sequence with length 15 (PBRS15). Several averaging and filtering operations were
performed to reproduce the effects of the urban multipath channel on the received
signal S1RT . The CIR estimated, in the time domain, gave the delay and power profile
of the known position building. Then the CIR estimated from the target with up
to three rays (delay and power) was used to search in the fingerprint database the
position of the emitter.
The fingerprints of the rays suing the machine learning framework are presented
in the results of the application the method are presented in Fig. 12. The Table 2
summarizes the result of the method using three and four multipath components, the
error is caused by the scatter position imprecision in the discretization of the scenario.
It is also important to point out that the multipath components are first filtered out
to taking into account only the first bounce reflections, and the ray association using
the real measurements was possible because the emitter stayed in a static position
Table 2 Performance of the single station TDOA location position compared with a complete
TDOA systems
Method Obs Lat Long Error (m)
TDoA 4 [tau 31 , tau 31 , tau 31 ] 49.591715 11.085821 5
sensor
Qualities [84 57 65]%
Duration 20 ms
Power [−100 −99 −101 −95] dBm
Delays [1.064 1.052 0.471] µs
Sol 1 S1 + 3 Paths at R1, R2 and R3 49.592382 11.085037 27
Sol 2 S1 + 2 Paths at R1 and R2 49.592379 11.088463 82
Fig. 12 Fingerprints from the first rays amplitude and delay in a urban scenario (Ipanema-RJ)
Machine Learning and Multipath Fingerprints for Emitter Localization … 229
Fig. 13 Fingerprints in 3D from the first rays amplitude and delay in a urban scenario (Ipanema-RJ)
during the measurements done. The TDOA location ellipses are shown in Fig. 13, and
the total standard deviation of the position estimator was 89.66 m, and the standard
deviation of each component, using the Chan method was: σ̂ [σx = 28.40 m, σ y =
33.05 m, σz = 78.36 m].
5 Conclusions
References
1. Brady, E., Starr, S.: Assessing C3I in support of dismounted operations in complex terrain.
Technical Report, Strategic Perspectives Inc., McLean, VA (2002)
2. Phelan, B.R., Lenzing, E.H., Narayanan, R.M.: Source localization using unique characteriza-
tions of multipath propagation in an urban environment. In: 2012 IEEE 7th Sensor Array and
Multichannel Signal Processing Workshop (SAM), pp. 189–192, June 2012
3. Fertig, L.B., Baden, M.J., Kerce, J.C., Sobota, D.: Localization and tracking with multipath
exploitation radar. In: 2012 IEEE Radar Conference, pp. 1014–1018, May 2012
4. Setlur, P., Devroye, N.: Bayesian and Cramer-Rao bounds for single sensor target localization
via multipath exploitation. In: 2013 IEEE International Conference on Acoustics, Speech and
Signal Processing, pp. 5845–5849, May 2013
5. de Sousa, M.N., Thomä, R.S.: Enhancement of localization systems in NLOS urban scenario
with multipath ray tracing fingerprints and machine learning. Sensors 18(11), 4073 (2018)
6. So, H.C.: Handbook of position location: theory, practice and advances. In: Reza Zekavat,
R.M.B. (ed.) The Oxford Handbook of Innovation, pp. 23–34. Wiley-IEEE Press, ch. 2 (2011)
7. Ho, K.C., Lu, X., Kovavisaruch, L.: Source localization using TDOA and FDOA measurements
in the presence of receiver location errors: analysis and solution. IEEE Trans. Signal Process.
55(2), 684–696 (2007)
8. Kolb, D., Warzügel, S., Schramm, J.: Hardware-reduced system for TDOA-locating of radio
frequency emitters, eP Patent App. EP20,130,160,415, 25 Sept 2013. http://www.google.com/
patents/EP2642312A1?cl=en
9. Yang, L., Ho, K.C.: An approximately efficient TDOA localization algorithm in closed-form for
locating multiple disjoint sources with erroneous sensor positions. IEEE Trans. Signal Process.
57(12), 4598–4615 (2009)
10. Fuschini, F., El-Sallabi, H., Degli-Esposti, V., Vuokko, L., Guiducci, D., Vainikainen, P.: Anal-
ysis of multipath propagation in urban environment through multidimensional measurements
and advanced ray tracing simulation. IEEE Trans. Antennas Propag. 56(3), 848–857 (2008)
11. Alsheikh, M.A., Lin, S., Niyato, D., Tan, H.P.: Machine learning in wireless sensor networks:
algorithms, strategies, and applications. IEEE Commun. Surv. Tutor. 16(4), 1996–2018 (2014)
(Fourthquarter)
Virtual Rehabilitation System Using
Electromyographic Sensors
for Strengthening Upper Extremities
Abstract This work presents a virtual system for the rehabilitation of the upper
extremities, using the MYO Smart Band device for the acquisition of electromyo-
graphic signals produced by the user. Processing and managing of these signals are
done through the SDK provided by the manufacturer of the bracelet which is com-
patible with the MATLAB software. The virtual environment is developed in the
Unity 3D graphics engine, in which three-dimensional objects that were previously
designed in the 3ds Max software are implemented. The application presents the
user with a virtual scenario set in a natural landscape, in which there is a van that
must be driven on a certain path (the complexity is increasing). The videogame is
of low complexity, since it seeks to avoid situations of stress while the rehabilita-
tion process takes place. Each task in the application is associated with a hand and
forearm movement of the user; it means the patient is given an alternative tool that
allows him/her to perform exercises that improve his/her extremity active mobility,
mitigating the routine effects of a conventional session. To validate this proposal, it
is tested by five retired military personnel in passive state, to whom the using task
ease (SEQ) usability test is applied. The result is (58,8 ± 0,27), which shows that
this interactive interface has a good acceptance when being in the range between 40
and 65.
1 Introduction
Military confrontations and wars are considered extreme and challenging situations
that a human being must endure [1]. It is subjected to a multitude of psychomo-
tor, sensory, cognitive, and psychological tests that exert great pressure on military
personnel [2]. Some get to lose their senses or develop some type of trauma or dis-
ability [3]. Among the main intellectual/cognitive disabilities are learning disorders,
generalized developmental disorders, attention deficit disorders and behavior [4]. In
the sensory field, there are visual, auditory, language, speech, and voice disabilities
[2, 3]. Additionally, in the physical aspect, reference is made to motor alterations
at osteoarticular level, nervous system, amputations, and disability in the extremi-
ties [5]. The most common injuries occur in both the lower and upper extremities
[6, 7]. In the upper ones, there is ankylosis, joint stiffness, sequelae of fractures or
traumatisms and complete paralysis of fingers or hands. That is why, with the aim
of preventing or mitigating any of these illnesses, a physical therapy process must
be initiated [8]. Through a cycle of relearning promote and stimulate muscles and
joints to regain their functionality [9].
The rehabilitation process must be evaluated by a qualified physiotherapist who
provides the patient with the tools to accelerate this process. Previously, routine
coordinated physical exercises were developed to produced boredom and fatigue
during the sessions [10]. But this reality has changed when merging these procedures
with advanced technological tools. A clear example of this is the use of compatible
devices with virtual reality (VR) interfaces and auditory accompaniment. Systems
involving VR are an advanced form of human–machine interaction (HCI), which
allows the user to experience extraordinary situations, without the need to move to
another site. These systems achieve a higher level of immersion with the proper
use of sensors, devices, and peripherals that enrich the experience. All this stuff,
focused on the rehabilitation processes, gives the patient the opportunity to perform
exercises in a different way and with greater encouragement [8]. Especially when
it comes to military personnel who have been subjected to stress and have certain
post-war psychological disorders.
Virtual Rehabilitation System Using Electromyographic Sensors … 233
2 State of Art
3 Methodology
This section details the proposed system and the elements that comprise it. The
general diagram is described in Fig. 1.
The MYO bracelet is used as the input device and the HTC VIVE virtual reality
glasses and binaural headphones as output devices. Next, the respective configuration
of these hardware elements is presented.
MYO Smart Band. To perform the digital processing of acquired signals, this device
is connected to the MATLAB software through the Myo SDK MATLAB MEX
Wrapper library. Through the SDK, information can be accessed provided from the
eight electromyographic sensors and the inertial measurement unit (IMU). Among
the most relevant data are those obtained from the three-axis gyroscope (angular
velocity) and the three-axis accelerometer (linear acceleration).
HTC VIVE. The connection of this device (virtual reality glasses) and the environ-
ment is generated natively in Unity 3D thanks to the SteamVR plugin. In addition,
reorientation and movement scripts have been made due to the fact that HTC con-
trollers are not used. In this device, the teleportation function is activated by default
in standard mode, which is replaced by signals from the Myo bracelet.
Binaural Headphones. They allow to reproduce the spatial sound that is generated
in the virtual scene and in which the user can spatially identify the origin of the
sound.
The signal acquisition process is performed based on the flow diagram described in
Fig. 2. The Myo Armband device from Thalmic Labs integrates a set of eight nonin-
vasive sensors, both electromyographic (EMG) and inertial. All sensors collect infor-
mation that is processed in a central module (sensor number 4), which includes batter-
ies and a communication device based on Bluetooth. Through libraries developed in
C++, it has been possible to use it without restrictions letting know the developer
certain parameters such as the measurement of each one of the electromyographic
sensors, processed and unprocessed information of the inertial sensors, transmission
periods, the gesture made by the patient, the values of accelerometers and gyro-
scopes, properties to eliminate the connected device, transmission rate, among oth-
ers. Figure 3 shows a capture of the eight sensor’s signals in a 10 s period executing
the open hand gesture. The amplitude units of each of the sensor signals are denoted
here as maximum factory value (MFV), a dimensionless value used by the developers
to represent the minimum and maximum amplitudes (−1 to 1) that the signal can
have, given the internal preprocesses and validators (within the SDK).
The interface design is made based on the flowchart of the interaction of programs,
which also includes the configuration in MATLAB and the database presented in
Fig. 4. Using Unity 3D software, a virtual environment has been developed, in which
objects that simulate an open field with a road across it are placed. The aim of
this application is to drive a van-type vehicle and completing a trajectory that is
previously defined by itself. Tasks have been carried out in a simple way so as not
to produce a stressful situation in patients, but instead they are entertained while
performing their rehabilitation exercises. Script programming allows to identify five
gestures that patients can perform: (i) fist, (ii) open hand, (iii) palm inward, (iv) palm
outward, and (v) join thumb and middle fingers.
The three-dimensional objects’ design has been made in 3ds Max software. Once
all the necessary objects have been modeled in 3D, their compatibility is checked, the
rotation points are located, hierarchies are established, and the axes of each element
are oriented. After that, models are imported from 3ds Max using a format with
extension *.fbx. Generally, the model of the imported objects is in gray color, or it
can have certain properties of previously created materials, but commonly the colors
and textures are eliminated. In this way, within the Unity 3D videogame engine,
colors and textures are assigned to the 3D model, depending on the material and
graphic quality required. In addition, the different tools offered by the palette of this
software are used to incorporate the required grass and road, as shown in Fig. 5.
Additionally, the respective environmental sounds are coupled, which complement
the immersive experience of the patient who can feel how the car drives in the middle
of nature.
Virtual Rehabilitation System Using Electromyographic Sensors … 237
4.1 Test
When executing the application, the patient must perform various gestures with his
hand and forearm in order to perform the tasks entrusted, as shown in Fig. 6a, b.
When the first gesture is made, the vehicle is turned on and you can drive on the
road. Once you are in driving mode, moving the palm of the hand outward produces a
turn to the right; depending on the intensity of the gesture, the rotation is performed.
The movement of the palm of the hand inward indicates that it is going to turn to
the left. When you open your hand, it indicates that you have reached the desired
point and so the vehicle must stop. In case that a bad maneuver has been made, the
reverse option is incorporated by joining the thumb and the middle finger. Patients
performed the entrusted exercises in 30 min’ sessions, 2 times a week. This treatment
lasted 4 weeks and was carried out by 5 retired soldiers in a passive state (it must be
Fig. 6 a Tests performed by a patient and b virtual environment seen by the patient
Virtual Rehabilitation System Using Electromyographic Sensors … 239
differentiated that 2 of them required rehabilitation in both arms), with an age range
between 48 and 63 years. The supervision of the therapist is very important, since
it must corroborate that patient performs the exercises correctly so that there is an
improvement in the treatment.
4.2 Results
At the end of the application, each patient data and the values obtained in the
videogame are saved in a text file that is automatically generated with the user’s
name. To determine the level of acceptance of this proposal, the usability test SEQ
has 14 questions, of which 13 have the values of 1–5 points according to the following
scheme: The first seven questions (Q1–Q7) are related to the level of acceptance and
immersion after the user experienced the virtual environment. The following four
questions (Q8–Q11) are related to the effects and discomfort that the system could
cause nausea, disorientation, or ocular discomfort. The next two questions are related
to the difficulty encountered when performing the tests. The last question is open,
so the user can indicate if there is any discomfort when using the virtual system and
its reasons. If the result obtained is in the range of 40–65, the implemented system
is considered acceptable. The questions asked to the users about the virtual system
and the results of the SEQ usability questionnaire are shown in Table 1.
The results of the SEQ test performed by five users after using the virtual system
are: (58,8. ± 0,27). The score obtained is greater than 40. Therefore, it is determined
that patients feel fully comfortable with the developed interface, so it represents
an ideal tool to contribute to the rehabilitation process which requires an extended
period of application.
5 Conclusions
The experimental results after the implementation of this system show that it is a
valid proposal for the rehabilitation of upper extremities. With this, it is pretended to
give the patient a new tool to replace the conventional method; immersing his/her in
a virtual world (fusing the sense of sight and hearing) a wide range of possibilities
for physical rehabilitation is presented. An important fact to note is when dealing
with users who were in active service and were subjected to stress situations, the
execution of simple tasks and the simulation of an environment with nature help
them to mitigate possible side effects of a psychological nature. The application of
the usability test SEQ shows that the interface presented to the user is intuitive, easy
to use, and does not cause discomfort. It should be pointed out that this research has
been evaluated from the point of view of the acceptance generated by this system, but
not with a medical approach, given that the results are not conclusive when requiring
a longer evaluation period.
240 Z. Andrea Sánchez et al.
In this context, the authors of this research propose as future work the execution of
this application in civil patients, in order to make a comparison and determine factors
of incidence. In addition, the development of a system that allows the rehabilitation
of the lower limbs is proposed, taking advantage of the already established design.
Finally, these authors propose the use of a control algorithm to expand the number
of gestures presented in this work and thus allow a better recovery process.
References
1. Drakos, N.D., et al.: In good conscience: developing and sustaining military combat trauma
expertise. J. Am. Coll. Surg. 227(2), 293–294 (2018)
2. Russell, C.A., Gibbons, S.W., Abraham, P.A., Howe, E.R., Deuster, P., Russell, D.W.: Narrative
approach in understanding the drivers for resilience of military combat medics. J. R. Army Med.
Corps. 164(3), 155–159 (2018)
3. Wells, T.S., Seelig, A.D., Ryan, M.A., Jones, J.M., Hooper, T.I., Jacobson, I.G., Boyko, E.J.:
Hearing loss associated with US military combat deployment. Noise Health 17(74), 34–42
(2015)
Virtual Rehabilitation System Using Electromyographic Sensors … 241
4. Writer, B.W., Meyer, E.G., Schillerstrom, J.E.: Prazosin for military combat-related PTSD
nightmares: a critical review. J. Neuropsychiatry Clin. Neurosci. 26(1), 24–33 (2014)
5. Stinner, D.J.: Improving outcomes following extremity trauma: the need for a multidisciplinary
approach. Mil. Med. 181(4), 26–29 (2016)
6. Wilken, J.M., Roy, C.W., Shaffer, S.W., Patzkowski, J.C., Blanck, R.V., Owens, J.G., Hsu,
J.R.: Physical performance limitations after severe lower extremity trauma in military service
members. J. Orthop. Trauma 32(4), 183–189 (2018)
7. Galarza, E.E., et al.: Virtual reality system for children lower limb strengthening with the use
of electromyographic sensors. In: International Symposium on Visual Computing, ISVC 2018,
pp. 215–225. Springer (2018)
8. Gelman, D., Eisenkraft, A., Chanishvili, N., Nachman, D., Glazer, S.C., Hazan, R.: The history
and promising future of phage therapy in the military service. J. Trauma Acute Care Surg.
85(1), 18–26 (2018)
9. Cools, A., Whiteley, R., Kaczmarek, P.K.: Rehabilitation of upper extremity injuries in the
handball player. In: Handball Sports Medicine, pp. 433–459. Springer, Germany (2018)
10. Quevedo, W.X., et al.: Assistance system for rehabilitation and valuation of motor skills. In:
International Conference on Augmented Reality, Virtual Reality and Computer Graphics, AVR
2017, pp. 166–174. Springer (2017)
11. Achanccaray, D., Acuña, K., Carranza, E., Andreu-Perez, J.: A virtual reality and brain com-
puter interface system for upper limb rehabilitation of post stroke patients. In: 2017 IEEE
International Conference on Fuzzy Systems (FUZZ-IEEE), pp. 1–5. IEEE (2017)
12. Levin, M.F., Weiss, P.L., Keshner, E.A.: Emergence of virtual reality as a tool for upper limb
rehabilitation: incorporation of motor control and motor learning principles. Phys. Ther. 95(3),
415–425 (2015)
13. Liu, L., Chen, X., Lu, Z., Cao, S., Wu, D., Zhang, X.: Development of an EMG-ACC-based
upper limb rehabilitation training system. IEEE Trans. Neural Syst. Rehabil. Eng. 25(3),
244–253 (2017)
14. López, V.M., Zambrano, P.A., Pilatasig, M., Silva, F.M.: Interactive system using myoelectric
muscle sensors for the strengthening upper limbs in children. In: International Conference on
Augmented Reality, Virtual Reality and Computer Graphics, AVR 2018, pp. 18–29. Springer
(2018)
Part VIII
Strategy, Geopolitics and Oceanopolitics
The Portuguese Special Operations
Forces as Instrument of Foreign Policy:
The Case Study of Afghanistan
Abstract The aim of this paper is to provide an exploratory overview of the Por-
tuguese special operations forces as instrument of foreign policy. In doing so, we
disclose new dynamics that Portugal employing in fragile states and we discuss its
implications for the North Atlantic Treaty Organization. The research methodolog-
ical approach falls into a qualitative case study research, which includes more than
one method of data collection for triangulation and corroboration purposes. We have
found that Portugal is trying to intensify its international relations within the EU, UN
and the NATO, while the Portuguese special operations forces have been playing an
important role to strengthen its presence within these international institutions. The
new dynamics that Portugal is seeking are based on the democratic values, the rule
of law and the human rights, to dissociate itself from the colonial legacy and thereby
find new avenues of influence. Further research should focus on the new strategic
priorities for the Afghan Government and NATO, as these priorities are changed at
a relatively fast pace.
1 Introduction
This paper focuses the Portuguese special operations forces as instrument of foreign
policy in Afghanistan. We have selected Afghanistan because this country has played
a major role with great regional empires of Persia, India and China in late medieval
J. Reis (B)
Department of Military Science, Military Academy, GOVCOPP, Lisbon, Portugal
e-mail: joao.reis@academiamilitar.pt
S. Menezes
Department of Management and Leadership, CINAMIL, Lisbon, Portugal
e-mail: sofia.menezes@academiamilitar.pt
and early contemporaneous period [1]. The country is known as the graveyard of
empires [2] that reputation invokes the British and Soviet defeats in several wars
in the nineteenth and twentieth century, to argue that Afghanistan is an unconquer-
able quagmire that inevitably dooms even the strongest army that venture there [3].
Moreover, Afghanistan was the first major test for state-building in the twenty-first
century and embroiled the USA and its allies for almost two decades [4].
Afghanistan required virtually every North Atlantic Treaty Organization (NATO)
member’s participation, including Portugal, and its participation is far from certain.
Most probably, the economic and political assistance will continue, even after the
Afghan forces assumed full security responsibility at the end of 2014—the new,
smaller, non-combat mission Resolute Support (January 1st, 2015—until recent days)
began to train, advise and assist (TAA) the Afghan security forces and institutions
[5].
We have chosen the well-trained special operations forces instrument due to its
strategic value, as they were the first to be deployed to Afghanistan, and they will
be probably the last to redeploy. The objective of this research is to ascertain the
suitability of the Portuguese special operations forces within the NATO Resolute
Support Mission (RSM) and its relevance as an instrument of foreign policy for
Portugal.
We have structured this paper in four sections after the introduction, as follows:
we begin by a review of the literature; secondly, we describe the methodological
approach; then, we investigate the relevance of the special operations forces to NATO
and Afghanistan; in the last place, we provide the implications and suggestions for
subsequent research.
2 Theoretical Background
NATO Allied Joint Publication (AJP) defines that special operations as military
activities conducted by specially designated, organized, trained and equipped forces,
manned with selected personnel, using unconventional tactics, techniques and modes
of employment—special operations deliver strategic or operational-level results or
are executed where significant political risk exists [6]. On the other hand, the NATO
special operations headquarters define special operations as operations that may be
conducted across the spectrum of conflict as part of article 5 (collective defence)
or non-article 5 (crisis response operations) to fulfil NATO’s three essential core
tasks—collective defence, crisis management and cooperative security [7]. The
NATO special operations headquarter also describes the special operations missions
to include suitable combination or all of the principal tasks of military assistance
(MA), special reconnaissance (SR) or direct actions (DA), depending on the cir-
cumstances of each operation. While special operations mission may range from
The Portuguese Special Operations Forces … 247
small unilateral actions to large-scale activities of a combined and joint nature, they
are tailored to contribute to the accomplishment of the defined political and mili-
tary/strategic objectives.
Each type of special operations missions may be defined as follows: DA is the
use of a rapid offensive operations to destroy or capture a target, usually by means
of secrecy and surprise [8, 9]; SR involves covert collection of intelligence typically
in denied enemy areas [9, 10]; MA involves the provision of training and advising
to host nations to improve their skills and capabilities [8, 9].
In Portugal, an order from the Chief of Staff of the army (directive nº 90), October
28th, 2007, determines that special operations are divided in special reconnaissance,
direct actions and military assistance. The forces that develop special operations may
be employed across the spectrum of operations. In view of its unique characteristics,
it constitutes adequate forces to perform tasks within the crisis response operations
(CRO), combat operations for search and rescue (CSAR) and counterterrorism oper-
ations, consisting in forces especially suitable in counterterrorism [11]. The same
directive from the Chief of Staff of the Portuguese army states that: (1) SR objective
is to obtain strategic and operationally sensitive information, it can use sophisticated
methods, techniques (e.g. human intelligence) and equipment [11]; (2) DA is a pre-
cise action, which is usually performed on well-defined targets, high criticism and
high value, with strategic or operational significance. The use against tactical objec-
tives is justified only by the action of criticality or by the inadequacy or unavailability
of the use of other forces [11]; (3) MA consists of a broad framework of measures
in support of friendly or allied forces and populations in peace, crisis or conflict,
in situations of need for security and survival, but also development. The MA also
fits into all activities related to the actions of military-technical cooperation, support
in situations of disaster and conflict mediation [11].
The missions developed by the Portuguese special operations forces are similar
to reference countries and NATO members. This section has the objective to define
the elementary concepts, which are going to be necessary for the following sections.
The RSM in Afghanistan is focused on train, advise and assist (TAA) the Afghan
security forces. Historically, the USA special operations forces (SOF) have had the
responsibility to TAA foreign military forces. Even if today, the US National Security
Strategies introduced the US military services (Army, Navy, Air Force and Marines)
to organize, train and equip themselves to carry out these activities at a larger scale
with conventional (non-SOF) forces [12]. Livingston [12] remarks this responsibility
in a broader sense of building the capacity of partner states that has been termed
security force assistance (SFA). SFA is part of the USA and NATO strategic goal
of having Afghanistan responsible for their security. Usually, SFA is directly linked
to counterterrorism strategy and is the key to engage underdeveloped and under-
governed nations, often referred to as weak or fragile states.
248 J. Reis and S. Menezes
In Afghanistan, the SFA mission is in part attributed to the NATO special oper-
ations component command—Afghanistan. This command brought together NATO
and other coalition special operations forces into the same operational headquar-
ters, and it demonstrates both that NATO special operations forces have made major
progress in integration and can potentially be a major part of the alliance capability
[9]. The created synergies among special operation forces community achieve signifi-
cant effect due to the combination of different techniques, technologies and expertise.
Long [9] reinforces the idea of NATO special operations forces that actively performs
three main allied special operations forces missions, i.e. military assistance, special
recognizance and direct actions; but particularly, the military assistance mission to
develop the Afghan police special units was its core mission.
Strandquist [13] also performed a research which suggests the USA and their
allies should change their strategy in Afghanistan, since developing military combat
operations against the insurgents is not enough and the future will have to go through
a focus on the development of local communities to counter-insurgency and that the
Afghan central government should win their support.
During the war in Africa (1961–1974), the Portuguese armed forces also used the
same techniques, in order to obtain public support, as it may be one of the key points to
win the war in Afghanistan. This technique was also used in Vietnam and it had been
termed “winning hearts and minds” [14]. The term was firstly used by Louis Lyautey,
a French army marshal and minister of war. The term included not only military, but
also social actions and improvements in the quality of life [15]. Later, Grochowski
[16] published an article concerning the Takur Ghar battle, a short, but intensive,
military operation that engaged the US special forces and Al Qaeda insurgents in
Afghanistan. According to Grochowski [16], the Takur Ghar battle demonstrated
the short lead-time and short-duration high-intensity tempo of the special operations
missions regarding the war against non-state actors and particularly violent extremist
organizations. The course of Afghan conflict and the commitment of the coalition of
special operations forces has focused on the tactical objectives, but with time, this
path has changed, i.e. the current conflict requires special operations forces highly
committed to TAA the Ministries of the Government of the Islamic Republic of
Afghanistan (GIRoA), which creates strategic and political objectives for a rapid
development of the Afghan Security Forces and its population.
Between April 1974 and January 1986, the Portuguese foreign policy oscillated
between two basic orientations, which marked two distinct phases: the transition
to democracy and the democratic consolidation [17]. Teixeira [17] also portrays
the Portuguese position in the Euro-Atlantic binomial, in the post-colonial relations
regarding the new multilateral triangle and based on foreign policy values, which we
summarize as follows: (1) The Europe-Atlantic binomial remains the geopolitical
equation: Portugal as an EU country seeking to promote and enhance not only the
The Portuguese Special Operations Forces … 249
Atlantic position between Europe and the USA, but also the post-colonial relations
(African Portuguese-speaking countries), the key for the strategic guidelines of the
foreign policy of democracy [17–19]; (2) Portugal seeks participation in terms of
producing international security, such as the military presence in organizations as
NATO, EU and UN (the new multilateral triangle), which has provided not only a
factor of military modernization, but also the external credibility of the Portuguese
State. The armed forces have become a foreign policy tool [17, 19, 20]; (3) The
challenge is in the global plan of international security, in an environment marked by
terrorism, ethnic and religious conflicts; that is why the framework of security has
to be cooperative security [17, 21]; (4) The presence of the Portuguese armed forces
in peacekeeping missions under the umbrella of the UN confirms the diplomacy
of values that had the independence of Timor as one of its major hits [17]; (5)
Lastly, foreign policy always comes from the formulation of interests. However, the
contemporaneous democratic model ignores the interests of the states and focuses
on the human values. The values for Portugal are democracy, the rule of law and
human security [17].
Similarly, Santos [22] argues about the use of the armed forces which is one of the
most important instruments available to support its foreign policy, giving it a specific
weight within the security scope.
3 Methodology
The methodological approach falls into a qualitative case study research. This
research therefore uses a contextual rich data setting from the real world to inves-
tigate a phenomenon which is understudied. We do use multiple sources of data
collection [23], i.e. semi-structured interviews, official documents and direct obser-
vations, for data triangulation and corroboration purposes [24]. The data collection
method focused on ten interviews from two military branches of the NATO Result
Support Mission in Afghanistan; the non-classified documents were collected from
open sources; and the direct observations have collected from informal interviews
and personal field notes of the observed reality. The field study took place in Kabul,
Afghanistan during the following periods: February to July of 2015 and from August
2017 to February 2018. Furthermore, for confidential reasons, all the respondents
kept their anonymity and the collected reports came from unclassified sources. The
goal of the case study is to gain a holistic view of the phenomenon and to understand
the specific reality that is being discussed in this paper [25].
The interviews were the primary data collection method for this case study. Quivy
and Campenhoudt [26] reported the interviews as a method that differs from others
250 J. R eis a n d S. M e n e z es
To ensure the data corroboration, we have used other data collection techniques,
i.e. secondary sources, such as direct observations and official documents. We did
not give priority to these data collection techniques, but they were essential for
triangulation and corroboration purposes.
The direct observations came from field notes that were taken during the research
process and from the author’s own experience, since he has also served as a special
operations operator in Afghanistan. Furthermore, we have also collected data from
the frequent discussion with NATO servicemen about their judgement regarding the
Portuguese special operations forces contribution to NATO and, consequently, to
Afghanistan. The informal discussions were registered and once they provided a
better understanding of the phenomenon, they were taken into account.
We also collected official documents from NATO website that were relevant to
provide the Resolute Support Mission perspective and the commander intention about
all NATO countries contribution to the overall mission.
To analyse the collected data, we defined a set of categories and subcategories to
search associations between the various sources of data collection. Then we sought
to establish relations between the various categories in order to draw conclusions.
The NVIVO10 was used as a qualitative data analysis software to organize, analyse
and finds insights into unstructured or qualitative data.
4 Findings
This section provides an empirical summary of the data analysis, which includes
real-life statements from the respondents.
The most valued aspect attributed by the US special operations forces is regard-
ing the knowledge acquisition by the Portuguese forces. The respondents believed
the Portuguese special operations forces are looking forward to acquire new expe-
riences and new competencies through the contact with other international military
forces, especially in counterinsurgent environments. This exchange of experiences
is allowing the Portuguese servicemen to increase their technical skills, which can
be boosted by continued experience sharing with contributing NATO nations. These
relationships mainly promote the exchange of relevant information that allows tech-
nical innovation with European partner. A US special operations serviceman shares
this view:
I believe that Portugal is participating at this NATO mission (Afghanistan) to intensify its
relations with the United States and to better know our modi operandi. This aspect is relevant
for us because it allows for a better interoperability within NATO, but also because we can
work with our allies (special forces operator, 32 years old, US)
close cooperation with the Portuguese special operations forces, as well as with all
the European countries, as they take into account the European contribution to the
international security—cooperative security. The arguments are well evidenced in
by a US special forces team leader:
Portugal has a very close relationship with the US. To my best knowledge, we have a US base
in a Portuguese Island (Azores) that works as a strategic platform to Europe. The relationship
we have with Portugal is not only due to its geographical position, since we also have had
several special operations exercises, namely cross training in infiltration techniques (special
forces team leader, 42 years old, US)
From the second group of respondents, it was possible to ascertain that the most
valued aspects were the participation in missions that have contributed to peace and
international security, especially the ones that have strengthening the presence of
the Portuguese in international organizations. They believe that Portugal has a stable
international status as a western democracy, a full member of the EU and NATO,
which gives the country the possibility to actively participate in the international
panorama. The participation in international missions, namely through elite forces,
creates bonds between Portugal and the countries of the alliance and contributes to
improve the country´s visibility and credibility. These arguments are well evidenced
by the statement of a Portuguese special operations operator:
The Portuguese special operations forces were created as a counter-insurgency unity for
the Portuguese operations in Africa, during the colonial war period (1961–74). After the
revolution of April 25th, 1974, the Portuguese special operations had to change their way
of employment. The special operations are now used as an icon of national sovereignty,
which acts in the international context as a co-producer of security while working with their
international partners (special forces operator, 32 years old, Portugal)
These respondents also believe the use of the Portuguese special forces intensifies
the relations and defence cooperation with the US military. A good example they
provided is the participation of the Portuguese Commandos in Kabul Capital Divi-
sion, at the time under the mandate of the International Security Assistance Force
(ISAF) and, very recently, with the deployment of special operations forces to which
were assigned several roles, e.g. intelligence, ministerial engagement, etc., under the
mandate of the Resolute Support Mission (RSM).
The Portuguese special forces have long contributed to the develop of the Afghan National
Defence and Security Forces capabilities. I personally work with the General Command of
Special Police Unit (GCPSU), which is an Afghan police unit responsible for responding
to high-profile attacks and to conduct high-risk arrests. The most important for us is to
participate in the peacekeeping operations and to strengthen the Portuguese presence within
the international institutions i.e. NATO. Yes, the Portuguese special forces are operating in
Afghanistan almost since the beginning of the conflict, I am just a small piece this well-
organized and very professional institution (special forces operator and ministerial advisor,
34 years old, Portugal)
During the discussions, we also noticed that Portugal is seeking new dynamics,
based on the democratic values, the rule of law and the human rights, and thereby find
new avenues of influence. We observed that the Portuguese special operations are
The Portuguese Special Operations Forces … 253
also trying to get more influence within the Afghan Ministry of Interior (rule of law),
but also investing on issues such as the gender integration in the Afghan defence
and security forces (human rights). Therefore, further research should investigate
these topics, i.e. new strategic priorities for GIRoA and the NATO. For instance, it
would be interesting to investigate how the Portuguese special operations forces can
improve the integration of Afghan women into their special operations force units.
The data analysis also demonstrated the Portuguese special operations mis-
sions—military assistance, falls under the overall mission of the NATO special
operations component command. Regarding the political foreign objectives, the Por-
tuguese special operations forces capacities and the missions performed by the NATO
special operations forces are perfectly aligned and have two main goals:
(1) influence the long-term strategy and sustainability of the Afghan defence and
security forces.
I feel that we have an effective influence on the defence and security policy. Our
Afghan counterparts are generals and politicians form the Afghan Ministry of Inte-
rior. At the same time that we have received the milestones from NATO and Portugal,
we can decisively influence the long-term sustainability of the Afghan special forces
(informal discussion) and, to develop activities (2) which can strengthen its interna-
tional present and to stimulate cooperative security relations with their international
partners.
In recent years there has been an increase of special operations servicemen to be deployed
to Afghanistan, which may be a reflection of this policy (field notes)
5 Concluding Remarks
We have concluded that Portugal is trying to intensify its international relations within
the EU, UN and NATO. To this end, the Portuguese armed forces have been playing
an important role to strengthen its presence within the international institutions.
We have verified that the Portuguese special operations operators are trained well
enough to operate in complex environments, as the Afghan mission falls under one
of the main special operations missions—the military assistance. In other words, the
mission that brings the Afghan Ministerial capabilities to been raised is suitable for
the Portuguese special forces.
Portugal, as a small European state, has also tried to contribute along with the
USA to spread the rule of law. In Afghanistan, once NATO moved from a combat
role to a TAA mission, the Portuguese special operations forces have been devel-
oping a strategy to build the Afghan Government, as well as the Afghan National
Defence and Security Forces. Thus, under the NATO special operations component
command, the Portuguese special operations operators have played one of the most
demanding missions in the contemporary Portuguese military history. We therefore
closely observed some Portuguese servicemen that helped decisively to develop the
capabilities of the Ministry of Interior, in order to operate the Afghan police forces
and its special units, e.g. GCPSU.
What is new is that Portugal is seeking new dynamics—based on the democratic
values, the rule of law and the human rights—to dissociate itself from the colonial
legacy. Portugal is therefore, trying to get more influence, by using its armed forces,
to rebuild fragile states in remote geographical areas, along with their international
partners.
This paper also presents some limitations, as the identity of the respondents may
not be revealed, thus to clarify any questions to address this subject the first author
should be contacted. The number of interviews was also limited, once it was restricted
to the number of respondents available in a specific period of time. The study is also
exploratory in nature and it lacks generalization. The lack of generalization is due
to different political goals and different existing types of special forces; thus, the
results may differ across NATO countries. Nevertheless, we do believe this study
may be useful to other researchers, in the extent that are no similar studies so far;
to practitioners, this paper may be relevant too, as it can provide new and fruitful
insights into the strategic engagement of special operations forces in fragile states.
References
1. Seddon, D.: Imperial designs. Crit. Asian Stud. 35(2), 175–194 (2003)
2. Jones, S.: In the graveyard of empires: America´s war in Afghanistan. WW Norton & Company,
New York (2010)
3. Miller, P.: Graveyard of analogies: the use and abuse of history for the war in Afghanistan. J.
Strateg. Stud. 39(3), 446–476 (2016)
The Portuguese Special Operations Forces … 255
4. Nojumi, N.: American State-Building in Afghanistan and its Regional Consequences: Achiev-
ing Democratic Stability and Balancing China’s Influence. Rowman & Littlefield (2016)
5. NATO.: NATO and Afghanistan. North Atlantic Treaty Organization (2016). http://www.nato.
int. Accessed 1 Dec 2018
6. AJP 3.5.: Allied joint doctrine for special operations. North Atlantic Treaty Organization (2013)
7. NATO SOF.: NATO special operations headquarters: Special operations forces. Military Assis-
tance Handbook. 1st study draft, North Atlantic Treaty Organization (2014)
8. AAP-06.: NATO glossary of terms and definitions. North Atlantic Treaty Organizations. 2-D-7
and 2-S-9 (2013)
9. Long, A.: NATO special operations: promise and problem. Obris 58(4), 540–551 (2014)
10. Dellinger, B.: Special operations command Europe: strengthening partnership for global secu-
rity. Spec. Warf. (2012)
11. Chefe de Estado-Maior do Exército.: Âmbito de atuação, missões e tarefas das unidades de
tropas especiais. Divisão de Planeamento de Forças, diretiva nº9 do Chefe de Estado-Maior do
Exército (2007)
12. Livingston, T.: Building the capacity of partner states through security force assistance. Security
Force Assistance in the Development of Foreign Forces. Nova Science Publishers (2011)
13. Strandquist, J.: Local defence forces and counterinsurgency in Afghanistan: learning from the
CIA´s village defense program in South Vietnam. Small Wars Insur. 26(1), 90–113 (2015)
14. Anderson, D., Ernst, J.: The war that never ends: new perspectives on the Vietnam War. Uni-
versity Press of Kentucky (2014)
15. Tucker, S., Roberts, P.: The encyclopedia of World War II: A political, social, and military
history. ABC-clio (2004)
16. Grochowski, G.: Planning for the next Takur Ghar. Def. Secur. Anal. 31(2), 152–158 (2015)
17. Teixeira, N.: Breve ensaio sobre a política externa portuguesa. Relações internacionais, R:I(28),
51–60 (2010)
18. Ruivo, L.: Conceito estratégico de defesa nacional contributos para uma revisão. Boletim
Ensino, Instituto de Estudos Superiores Militares (2011)
19. Silva, J.: As forças armadas como instrumento de política externa portuguesa no actual contexto
internacional. Trabalho Individual de Longa Duração do Curso de Promoção a Oficial General,
Instituto de Estudos Superiores Militares (2006)
20. Azambuja, M.: As Nações Unidas e o conceito de segurança coletiva. Estudos Avançados 9(25),
139–147 (1995)
21. Serronha, M.: A cimeira de Lisboa: Uma NATO para o século XXI. Instituto de Defesa Nacional
126–5ª série, 37–46 (2010)
22. Santos, J.: O conceito estratégico da NATO: Superar contradições, manter a coesão. Nação e
Defesa, 37–46 (2010)
23. Barratt, M., Choi, T., Li, M.: Qualitative case studies in operations management: Trends,
research outcomes, and future research implications. J. Oper. Manag. 29(4), 329–342 (2011)
24. Yin, R.: Case study research design and methods. Appl. Soc. Res. Methods Ser. 5 (2003)
25. Benbasat, I., Goldstein, D., Mead, M.: The case research strategy in studies of information
systems. MIS Q. 369–386 (1987)
26. Quivy, R., Campenhoudt, L.: Manual de investigação em ciências sociais (1998)
27. Governo de Portugal.: Grandes opções do conceito estratégico de defesa nacional (2013).
https://www.parlamento.pt/sites/COM/Paginas/DetalheNoticia.aspx?BID=5034. Accessed 1
Dec 2018
The Internal–External Security Nexus:
EU Operation Sophia Through the Lens
of Securitization
1 Introduction
In a context in which the European Union (EU) discourse has been fertile in iden-
tifying Europe’s challenges in a globalized world, amongst which we find the post-
Westphalian security challenges, it is paramount to reflect upon the rationale and
effects of the evolving EU security actorness. The Union has been innovative in cre-
ating a de facto security community that overcame the European interstate conflict,
and since the end of the Cold War, it endeavoured both to be a security actor (with
global reach and through a comprehensive approach) and to address the multisector
and transnational threats of a complex security environment.
A. P. Brandão (B)
CICP—University of Minho, Braga, Portugal
e-mail: abrandao@eeg.uminho.pt
ties for security purposes; perverse transnational actors). In sum, an evolving trend on
internal and external security, from the traditional approach as separated phenomena
(Realism) to the perspectives as interdependent (Neoliberalism) or even as merged
phenomena (Paris School) [5].
As far as the European Union is concerned, the nexus can be applied to different
phenomena which, in short, stem from three dynamics: (a) internalization of external
phenomena; (b) externalization of internal phenomena; (c) cross-border phenomena.
Underlying the in/out narrative is the idea of “globalization of security” associated
with the “predominantly transnational character of postmodern risks” [6]. In this
context, a CFSP that is effective in preventing and combating external threats is
considered to be a condition to ensure the internal security of the European area. In
turn, an effective internal security system is understood as a condition for the former
to be an active policy. This “indissoluble link between internal and external aspects
of security” [7] is explained by several phenomena, namely: Europe’s vulnerability
due to its reliance on an infrastructure interconnected in various areas (transport,
energy, information); the external dimension of organized crime; the global nature
of terrorism, which has increasing resources, including connection through electronic
networks; proximity to troubled areas; regional conflicts that have direct or indirect
impact on European interests; climate change that has a “threat multiplier effect”
[8]. Thus, in the “era of globalization, distant threats may be as much a concern
as those that are near at hand” so “the first line of defence will often be abroad”
[7], and it is therefore necessary to “improve the way we reconcile the internal
and external dimensions” [8]. The most recent events, particularly in the field of
terrorism, have contributed to intensifying the in-out nexus security narrative. In the
words of Federica Mogherini, the fight against radicalization and violent extremism
must continue to be “a priority, not only for internal and security action, but also for
our diplomatic and foreign policy” [9].
The EU agenda on IESN has extended the list of priority issues: transnational
organized crime (since the 1990s), terrorism (since 9/11), migrant smuggling and
human trafficking (post “refugee crisis”), the link between CSDP-FSJ: “The linkages
between internal and external security, including in areas such as irregular migration,
trafficking of all sorts, terrorism and hybrid threats are an increasingly important
context for the further development of CSDP and when considering any possible
new operation/mission” [10]. After the date of entry into force of Lisbon Treaty
changes, the CSDP-FSJ link was the subject of a structured reflection contained in
the joint report of the commission and the HR, which resulted in an operational
roadmap [11] with five areas and 27 lines of action (12 short-time priorities and 15
medium-term priorities). Those initiatives of reflection and operationalization are
concerned specifically to the external component (CSDP missions and operations)
and the externalization of EU internal security (external dimension of AFSJ). The
internalization (of CSDP) component is being approached in a separated vector, in
particular associated with the solidarity clause.
The civilian missions of CSDP are one of the tangible expressions of the IESN,
particularly with regard to security goals, civilian capabilities, planning, situational
awareness and strategic analysis [12]: civilian missions of Rule of Law, Security
260 A. P. Brandão
Sector Reform designated to reduce the criminal activity (organized crime and cor-
ruption) in the host country, through judicial means, thereby contributing to greater
security and stability not only in that country, but also at regional and international lev-
els, and creating the conditions for cooperation with EU and its agencies (EUROPOL,
EUROJUST, FRONTEX); missions sustained by internal police and judicial capa-
bilities; crisis management structures which integrate elements from both domains
(CSDP and FSJ) in the planning of new missions and revision of ongoing missions;
situational reports, risk and threat assessment, early warning and alerting about ter-
rorist attacks and external crisis, which cover both domains (CSDP and FSJ), as
demonstrated by the activity of the EU Situation Centre (SiteCen), EUROPOL and
FRONTEX. The second manifestation of the CSDP-FSJ link regards to intelligence
gathering and sharing whether in Brussels or in the field of the missions/operations,
which has been fostering administrative arrangements between the General Sec-
retariat of the Council and FSJ agencies as well as the interaction between these
agencies and CSDP civilian missions.
The assessment of the first years of implementation of the roadmap (four progress
reports) approved in 2011, and the need to adequate it to situational changes led the
Council to define three priority areas of action [10]: improving situational awareness
and exchange of information within the EU; operationalizing the nexus between
internal/external security, especially by improving the cooperation among the EU
agencies and between these and the EEAS, the joint training, and the coordination and
decision-making process mechanisms; civilian–military convergence and synergies
among EU missions and operations.
Although the documents value the CSDP civilian missions in the link between this
policy and FSJ, we find relevant to focus on a maritime operation which materialize
the IESN through military means used to deal with the (so-called) new type threats
[13].
action of the plan consisted in the capture and destruction of vessels used by the
smugglers. This was reiterated by the European Agenda on Migration (May 2015)
as an immediate key action.
The Crisis Management Concept of EUNAVFOR MED was approved by the
Council on 18 May and the operation launched on 22 June 2015. The mandate of
the operation “disruption of the business model of human smuggling and trafficking
networks in the Southern Central Mediterranean” by “efforts to identify, capture and
dispose of vessels and assets used or suspected of being used by smugglers and
traffickers” (Article 1, Decision 778/2015). “The objective is less to stop migration
flows than to disrupt smuggling routes and capabilities and, hence, reduce the flows
originating from the Libyan Coast, which has been (together with the eastern route)
the main point of departure of migrants coming to Europe” [13]. The operation is
based on the Articles 42(4) and 43(2) of the TEU. The adoption of the Resolution
2240 by the Security Council of the UN, acting under Chapter VII of the UN Charter,
on October 2015, reinforced the legitimacy of EU military operation.
EUNAVFOR MED Sophia Operation is one of the CA’s elements—a complemen-
tary, not a main instrument. Migration had already been implicitly or explicitly men-
tioned in other EU missions and operations (EUFOR ALTHEA, EUCAP SAHEL,
NIGER, EUTM MALI) [15], but for the first time ever an EU military operation is
explicitly and specifically associated with migration issues. It “is the first EU Naval
Force to operate in the Mediterranean, an area of strategic and economic importance
to Europe, and at the centre of many security challenges that affect Europe as a
whole” [16]. This operation reinforced the maritime dimension of CSDP being the
first EU maritime military operation “aimed to deliver sea-based capacity” [17], with
an explicit coercive mandate and the possibility of deploying means on the territory
of a sovereign state (authorized by a UNSC Resolution) without its consent: “while
the EU had so far adhered to the crisis management principles of consent, limited
coercion and relative impartiality for its own CSDP operations, EUNAVFOR MED’s
mandate contains the possibility of the EU going beyond these principles and coming
close to a peace enforcement situation. In and by itself, this constitutes a qualitative
shift in the EU’s security and defence posture” [13].
The operation involves three phases [18]: phase 1 surveillance—“detection and
monitoring of migration networks through information gathering and patrolling on
the high seas” (June–August 2015); phase 2 operational—search operations “board-
ing, search, seizure and diversion on the high seas of vessels suspected of being used
for human smuggling or trafficking” (2A) in international waters (ongoing since 7
October 2015) or (2B) in the territorial and internal waters of Libya (there are still
no legal and political pre-conditions to transit to this sub-phase); phase 3 opera-
tional—disposal practices—“measures against a vessel and related assets, including
through disposing of them or rendering them inoperable, which are suspected of
being used for human smuggling or trafficking”, in the territory Libya (timeline to
be determined).
In June 2016 and July 2017, the Council approved additional (support) tasks:
training of the Libyan Coastguard and Navy and contributing to the implementa-
tion of the UN arms embargo on the high seas off the coast of Libya; setting up
262 A. P. Brandão
since the smugglers find new routes, generally more dangerous and expensive for
the migrants; the search and rescue missions are feeding hopes of safe passage (“a
magnet to migrants”) and having the unintended consequence of “assisting the job
of smugglers, who now only need their boats to reach the high seas, rather than EU
waters”; “serious abuses of the human rights of migrants by the Libyan coastguard”.
In sum, the operation faces “an impossible challenge” [23] and has no meaningful
deterrent and disruption results, being “the wrong tool with which to tackle migration
in the central Mediterranean” [25, 26].
Operation Sophia is a demonstration of the EU narrative and practice on secu-
rity nexuses (defence-migration, military–civilian security, internal–external secu-
rity, border security–human security) that justify the goal of “more security” and
“more actorness”. These nexuses are present in the trend to construct the link between
the CSDP and the AFSJ [11, 12].
The European Agenda on Migration advanced that migration would “become a
specific component of ongoing Common Security and Defence Policy (CSDP) mis-
sions already deployed in countries like Niger and Mali, which will be strengthened
on border management” [27]. It specifically underlined the role of the operations
in the fight against human smuggling: the identification, capture and destruction of
vessels used by criminal networks as “a powerful demonstration of the EU’s deter-
mination to act” [27]. Those tasks constitute the core business of the operation.
The link between maritime border security and migration was initially associated
with FRONTEX operations. FRONTEX is in the forefront of the maritime border
security related with migration since 2005. The main focus has been the control and
surveillance of external borders through EU Joint operations and the forced return of
migrants to the departure state [24]. After the adoption of the Sea Border Regulation,
on May 2014, the operations also encompass search and rescue: “The objective
of Union policy in the field of the Union external borders is to ensure the efficient
monitoring of the crossing of external borders including through border surveillance,
while contributing to ensuring the protection and saving of lives” [28].
One month later, the Council adopted the EU maritime security strategy (EUMSS).
This strategy defines maritime security as “as a state of affairs of the global mar-
itime domain, in which international law and national law are enforced, freedom of
navigation is guaranteed and citizens, infrastructure, transport, the environment and
marine resources are protected” [29]. It encompasses both the internal and external
aspects of EU maritime security. Among others, it identifies the cross-border and
organized crime, including trafficking of human beings and smuggling of migrants,
organized criminal networks facilitating illegal migration, trafficking of arms as a
threat to the security of the EU, its member states and their citizens [29]. EUMSS left
out the humanitarian (search and rescue) dimension. Both operations (FRONTEX
and Sophia) evolve rescue activities, but while FRONTEX operations are mainly
focused on border management; Sophia Operation is dedicated to the disruption
of migrant smuggling and human trafficking routes and capabilities [24]. Despite
Operation Sophia’s humanitarian component, its rationale is mainly security: Oper-
ation Sophia “is also an example of the renewed strategic and political importance
of the nexus between internal and external security in the present European security
264 A. P. Brandão
4 Concluding Remarks
EU security actorness has been evolving since the end of the Cold War by a combina-
tion of opportunity, capacity and (global) presence (ambition). This construction has
been accompanied by the comprehensive approach narrative. This holistic approach
is the result of a co-constitutive adequacy: “more security”—appropriation of poli-
cies and instruments of a multifunctional actor for security purposes (security of the
EU and of European citizens); “more actorness”—securitization of issues in order
to promote the actor and its policies. The internal–external security nexus formu-
lated both in terms of threat perception (transnational, cross-border multifaceted
threats) and response to threats, justifies and is justified by the comprehensiveness
of the approach of a post-Westphalian security actor. Its practices, such as Operation
Sophia, demonstrate how security narratives, civilian and military instruments and
securitization dynamics serve convergent processes of gaining political and public
space for legitimizing policies and actions of the European security actor.
Sophia is a pioneering operation in several aspects: the first Naval EU opera-
tion in the Mediterranean and aimed to deliver sea-based capacity; the first CSDP
operation explicitly and specifically associated with migration issues; the first EU
operation with an explicit coercive mandate and the possibility of deploying means
on the territory of a sovereign state (authorized by a UNSC Resolution) without
The Internal–External Security Nexus: EU Operation Sophia … 265
its consent. The security rationale underlying the operation results of the merging
of several dimensions: border, maritime, military and human security. In the fight
against migrant smuggling and human trafficking, EUNAFOR MED operationalizes
the CSDP-FSJ by being a law enforcement using military assets, carrying out surveil-
lance, intelligence gathering and training activities involving means and structures
of both domains, coordinating actors of both domains (CSDP and FSJ). For this rea-
son, its achievements and failures enlighten the potential limits and effects of IESN
operationalization.
Acknowledgements This paper has been developed in the framework of the collective research
project: “España ante los nuevos retos de la seguridad marítima: Instrumentos y estrategias en
el marco internacional, europeo y peninsular” (DER2016-78272-R), funded by Ministerio de
Economía y Competitividad (Programa Estatal de I+D+i Orientada a los Retos de la Sociedad
2017–2019). The author also acknowledges the financial support of Fundação para a Ciência e
Tecnologia—FCT (Portuguese Science Foundation).
References
1. For the purpose of this paper, the securitisation process was analysed through the lens of the
Copenhagen School (Buzan, B., Waever, O., Wilde, J.: Security: A New Framework for Anal-
ysis. Lynne Rienner Publishers, Boulder, CO (1998)): the security speech act on Operation
Sophia by EU institutions (Council of the EU, European Council, European Commission);
the (perceived) threat (human smuggling and trafficking networks in the Southern Central
Mediterranean); the securitising instrument (the military operation as an extreme version of
securitisation). The analysis of EU actorness was based on the three elements conceptualised
by Bretherton & Vogler: opportunity (“denotes factors in the external environment of ideas and
events which constrain or enable actorness”), presence (“conceptualizes the ability of the EU,
by virtue of its existence, to exert influence beyond its borders”) and capability (“refers to the
internal context of EU external action—the availability of policy instruments and understand-
ings about the Union’s ability to utilize these instruments, in response to opportunity and/or to
capitalize on presence”)—Bretherton, C., Vogler, J.: The European Union as a Global Actor,
p. 24. Routledge, New York (2006). Two security functions were considered in the analysis of
the IESN: compulsion (military operations) and protection (internal security)—Kirchner, E.,
Sperling, J.: EU Security Governance. Manchester University Press, Manchester (2007)
2. See: the European Security Strategy (2003); the Internal Security Strategy for the EU (2010);
the European Agenda on Security (2015); EU Global Strategy (2016)
3. Eriksson, J., Rhinard, M.: The internal–external security nexus. Notes on an emerging research
agenda. Coop. Confl. 44(3), 243–267 (2009)
4. Pastore, F.: Reconciling the Prince’s Two ‘Arms’. Internal-External Security Policy Coordina-
tion in the European Union. Occasional Paper, n. º 30. ISS, Paris (2001)
5. Bigo, D.: Internal and external security(ies): the Möbius ribbon. In: Albert, M., Lapid, Y.,
Jacobson, D. (eds.) Identities, Borders, Orders, pp. 91–116. University of Minnesota Press,
Minneapolis (2001)
6. Rehrl, J., Weisserth, H.-B. (eds.): Handbook on CSDP. Federal Ministry of Defence and Sports
of the Republic of Austria, Vienna (2007)
7. European Council: A Secure Europe in a Better World—The European Security Strategy.
European Council, Brussels, 12/13 December (2003)
266 A. P. Brandão
8. European Council: 2008. Report on the Implementation of the European Security Strate-
gy—Providing Security in a Changing World. European Council, Brussels (11/12) (2008);
European Council: Internal Security Strategy for the European Union: Towards a European
Security Model (2010)
9. Council of the EU: Foreign Affairs Council (2015)
10. Council of the EU: CMPD Food for Thought Paper “From Strengthening Ties Between
CSDP/FSJ Actors Towards More Security in Europe” (2016)
11. Council of the EU: Strengthening Ties Between CSDP and FSJ—Elements of a Draft Road
Map (15562/11) (2011)
12. European Commission and HR: Strengthening Ties Between CSDP and FSJ Actors—Proposals
for a Way Ahead (SEC/2011/560) (2011)
13. Tardy, T.: Operation Sophia Tackling the Refugee Crisis with Military Means. EUISS Brief
(September). EUISS, Paris (2015)
14. Priconi, M.: EU military Operation Sophia: analysing the shortfalls. Sci. Bull. 2(42), 122–127
(2016); Ventrella, M.: The impact of Operation Sophia on the exercise of criminal jurisdiction
against migrant smugglers and human traffickers. Quest. Int. Law 30, 3–18 (2016)
15. Rehrl, J.: Migration and CSDP. In: Handbook on CSDP, vol. 1, 3rd edn, pp. 104–113. Vienna
(2017)
16. EEAS: EUNAVFOR MED—Operation SOPHIA—Six Monthly Report: 1 Jan–31 Oct 2016
(EEAS/2016/1587) (2016)
17. EEAS (European External Action Service): Common Security and Defence Policy of the
European Union: Missions and Operations Annual Report 2016 (2017)
18. Council of the EU: Council Decision (CFSP) 2015/778 of 18 May 2015 on a European Union
military operation in the Southern Central Mediterranean (EUNAVFOR MED). Off. J. Eur.
Union L 122, 31–35 (2015)
19. EEAS: EUNAVFOR MED Operation Factsheet (2017)
20. EDA (European Defence Agency): Operation Sophia to stop human trafficking across the
Mediterranean. Defence Matters 9, 30–31 (2015)
21. European Parliament: Ban Ki-moon on migration: “Saving lives should be the top priority”.
EP News (2015)
22. Wosolsobe in UK (United Kingdom), House of Lords: Operation Sophia, the EU’s naval mission
in the Mediterranean: an impossible challenge. European Union Committee—14th Report of
Session 2015–16. HL Paper (144) (2016)
23. UK (United Kingdom), House of Lords: Operation Sophia, the EU’s naval mission in the
Mediterranean: an impossible challenge. European Union Committee—14th Report of Session
2015–16. HL Paper (144) (2016)
24. Bevilacqua, G.: Exploring the ambiguity of Operation Sophia between military and search
and rescue activities. In: Andreone, G. (ed.) The Future of the Law of the Sea Bridging Gaps
Between National, Individual and Common Interests, pp. 165–189. Springer, Cham (2017).
https://doi.org/10.1007/978-3-319-51274-7_9
25. UK, House of Lords: Operation Sophia: a failed mission. European Union Committee—2nd
Report of Session 2017–19. HL Paper (5) (2017)
26. See also critics from: Amnesty International on human rights violations (Amnesty International:
European Policies Leaving Migrant Lives Adrift in the Mediterranean (2016)); spokesman
of the Libyan Navy, “the first beneficiaries of this operation are not Europe or Libya, but
rather the traffickers” (Euronews: The first beneficiaries of Operation Sophia are the traffickers.
Insiders (21/12/2016)); Parliament of UK (UK 2016) and Operation Commander on intelligence
gathering; Deputy Director of Global Initiative against Transnational Organized Crime on
lack of full transparency (in Mathari, A.: “Mission impossible” for Operation Sophia. Global
Spotlight (02 June) (2017))
27. European Commission: Communication from the Commission to the European Parliament, the
Council, the European Economic and Social Committee and the Committee of the Regions—A
European Agenda on Migration (COM/2015/240). Brussels (2015)
The Internal–External Security Nexus: EU Operation Sophia … 267
28. Council of the EU: European Union Maritime Security Strategy (2014)
29. Council of the EU: Regulation (EU) No. 656/2014. Off. J. EU L (89) (2014)
30. Kostarakos in: EDA: Interview military capabilities: “Europe still lacks strategic enablers”.
Defence Matters 11, 36–38 (2016)
31. Credendino in: EEAS: EUNAVFOR MED—Operation SOPHIA—Six Monthly Report: 1
Jan–31 Oct 2016 (EEAS/2016/1587) (2016)
The Evolution of EU’s Maritime Security
Thinking
1 Introduction
J. A. Silveira (B)
Department of Political Studies, Faculty of Social Sciences and Humanities—New University of
Lisbon (FCSH-UNL), Avenida de Berna 26C 1069-061, Lisbon, Portugal
e-mail: joaosilveira@campus.fcsh.unl.pt
Gradually, the EU started to play a greater role in maritime affairs and in its pro-
tection. Since the early 2000s, it adopted over 40 maritime related documents that
covered a myriad of aspects, including, among others, safety and security, environ-
ment, blue economy, governance, and scientific and technological advancements.
Such interest resulted from the perception that the size and complexity of sea mat-
ters are better served by a collective European response, rather than through national
policies. The Union attempted to potentiate the exploitation of seas for sustainable
socioeconomic development, in respect of the environment. As the maritime interests
of the EU grew, it became necessary to protect maritime assets [6–9].
This article explores the dynamic process by which the Union became engaged
with maritime security. More, it tracks the evolution of the EU’s maritime security
strategic thinking, in order to mark strategic shifts and/or enlargements of the concept.
It considers as time period the years between 2000 and 2018. It approaches the topic
through the rhetorical analysis of EU official communications.
The article follows a sequential process. First, it explores the early elements of EU
engagement with maritime matters that explain the added importance of the domain
to the Union after 2000. Second, it outlines the main security concerns that gave
rise to the adoption of a maritime security strategy. Third, it outlines the maritime
security thinking of the Union. Fourth, it explains the instrumentalization of maritime
security to the achievement of the global objectives of the Union. And fifth, it pays
attention to attempts to turn maritime security into a mainstream policy.
The departing question for this article is: How did the EU’s maritime security strategic
thinking evolves between 2000 and 2018? To answer this question, this article uses the
securitization framework, a constructivist framework, whose objective is to analyze
the ascendant or descendant process of topics within political security agendas [10].
The objective is to mark and analyze the several moments of inclusion of maritime
security within the EU political speech.
To that end, the article makes the rhetorical analysis of official maritime and non-
maritime strategies of the EU. When appropriate, it also makes use of secondary
literature to the better frame or explains the content of the official documents.
There are two main concepts in this article: maritime security and strategy. Regard-
ing maritime security, there is no consensual definition [11–13]; thus, for the purpose
of this article maritime security is understood as a broad concept that includes matters
of national security (seapower), marine safety, blue economy, and human security
[3]. Regarding strategy, this article pays attention to the grand strategy of the EU,
and not just strategy. Thereby, it considers all instruments of possible political use,
and not just the link between policy and military power. In doing so, it considers the
aspects related to economy, finance, technology, military, and others [14, 15].
The Evolution of EU’s Maritime Security Thinking 271
3 Economic–Environmental–Social Triangle
At the core of the IMP are economic development concerns. The IMP is funda-
mentally an instrument to promote the growth of the maritime industry [21]. As an
overarching policy, the IMP provides an holistic and integrated approach to sea mat-
ters, by including areas such as maritime transport; maritime research, surveillance,
and spatial planning; improvement of national policies; resilience against climate
change; reduction of CO2 emissions and ship pollution; maritime labor law; unsus-
tainable fisheries practices; and development of an European network of maritime
clusters [7].
Each of these areas was further developed in sectoral and regional strategies. For
example, the EU approved strategies to guide an ecosystem-based approach to human
activities at sea [22]; to improve marine research, data availability and accessibility,
and general knowledge over the maritime domain [23–25]; to prevent, deter, and
eliminate illegal, unreported, and unregulated (IUU) fishing [26, 27]; to improve
maritime spatial planning [28]; to promote safe and efficient maritime transport
[29]; to improve safety standards [30]; and to address the idiosyncrasies of European
basins, such as the Atlantic, Arctic, Mediterranean, Baltic, or Black sea [31–35].
Alike the IMP, economic aspects are central to these strategies. In terms of eco-
nomic activities, the 2012 Blue Growth Strategy clarified that the EU was especially
interested in five value chains: (i) blue energy; (ii) aquaculture; (iii) maritime coastal
and cruise tourism; (iv) maritime mineral resources; and (v) blue biotechnology.
Improvements in these areas were deemed possible due to advancements in the
fields of robotics, submersible machinery, and other technologies. Blue economy
industries were perceived as a way to generate growth, innovation, and employment
[36].
5 Security Concerns
The EU anchored its sea power on economic aspects. It was, thus, necessary to engage
in maritime security, for there is no economic development without security [2].
Indeed, even if sparse and, at times, in a neglectable matter, several strategies iden-
tified risks and threats to EU interest. Because most maritime strategies addressed
the European space, which was a safe space, most threats related to the matters of
pollution, environmental risks, and IUU fishing [7, 23, 26, 31–35, 37]. Nonethe-
less, the several regional strategies included a greater array of security concerns,
namely: criminality (including trafficking), illegal migrations, marine accidents, need
for more effective law enforcement activities, piracy, legal disputes, among others
[31–35, 37].
Maritime security concerns found echo also in non-maritime strategies, such as
the Counter-Terrorism Strategy of 2005 that called for higher standards on maritime
and ports security [38] and the 2010 EU Internal Security Strategy (ISS) that called
for improvements on EU maritime borders vis-à-vis illegal trafficking [39].
In strategies that covered imminently international and global sectors such as
the strategy for maritime transport, the most pronounced security concerns included
The Evolution of EU’s Maritime Security Thinking 273
terrorism, piracy and armed robbery at sea, trafficking, stowaways, and smuggling.
From these, piracy was regarded as “the most urgent priority.” In 2009, the year of
approval of the maritime transport policy, the effects of piracy off the Somalia coast
were already pronounced, and the strategy recognized the grave danger of piracy to
seafarers, fishermen, and passengers [29].
In 2003, the European Security Strategy (ESS) had already included piracy as a
potential threat to EU interest. At the time, it was flagged as a threat that could merit
further attention in the future [40]. Events off the coasts of Somalia in 2007 proved
right the inclusion of piracy in the ESS. An upsurge of piracy from 2007 onward
caused harm to Euro-Asian seaborne trade flows and to EU fishing interests in the
region. Furthermore, the instability caused by piracy had consequences on land (e.g.,
impossibility of deliverance of humanitarian assistance). This event demonstrated
that sea insecurity had negative effects to the EU, which prompted action [1, 41–44].
Under the avail of United Nations Security Council (UNSC), the EU launched
operation Atalanta in the region in order to restore stability [45] and protect EU
economic, diplomatic, and humanitarian interests [44]. With operation Atalanta,
the first EU maritime operation within the Common Security and Defence Policy
(CSDP), it became clear that piracy and maritime instability were real threats to the
EU. Consequently, the 2008 report on the implementation of the ESS increased the
attention of the EU to maritime security developments. Besides piracy, the report
also recognized the possible emergence of disputes over trade routes and maritime
territories [46].
The analysis of the above-mentioned strategies suggests that during the 2000s,
the maritime security agenda progressively penetrated through EU policy documents.
Such introduction was motivated by traumatic events as the Erika and Prestige sunk
and by the upsurge of piracy off the Somalia coast. These events forced the EU
to think and engage in maritime security in its proximity and in the wider world.
Maritime security was framed in a dual capacity of an element necessary for the
protection and enhancement of economic, social, and environmental interests. This
perception, aligned with the sprout of European activities at and from the sea, leads
to the adoption of the EU Maritime Security Strategy (EUMSS) in 2014.
The strategy consolidated the security risks and threats to EU maritime interest,
namely: interstate conflicts; proliferation; sea denial or sea obstruction; transnational
criminality; terrorism; environmental threats (natural or man-made events) [8].
To tackle maritime security challenges, the EUMSS formulated a comprehensive
and cross-sectoral approach leading to higher levels of internal–external coherence
of the EU. EU actions were to be executed in compliance with the law (national,
EU, and international), in a cost-efficient manner, and bridging military and civilian
authorities and actors,1 local, national and EU agencies, and the maritime industry
[8].
While calling for greater autonomy of EU actions, the strategy asserted the full
respect for the functional integrity of member states competencies, rights, and inter-
ests. Furthermore, the autonomy of action did not equate to isolationism. Instead,
the EUMSS directed toward a multilateral approach, anchored on the strengthening
and support of regional responses [8]. Autonomously, but next to partners,2 the EU
aspired to engage in maritime capacity building, in areas such as maritime gover-
nance and the rule of law; development of the port and maritime transport standards;
borders management; and combat of IUU fishing [8].
In view to the implementation of the EUMSS, the Union approved in December
2014 the EU Maritime Security Strategy Action Plan (EUMSSAP); a holistic plan to
prompt the comprehensive and cross-sectoral approach of the EU. The actions were
divided across five workstrands that addressed specific but intertwined aspects:
Workstrand 1—External Action. Addressed matters of external coordination
between the EU and other international partners. It sought to increase the visibil-
ity of the EU; to foster capacity building in third countries, the peaceful settlement
of disputes, and the international law; to pursued force development for contingency
operations; and to articulate measures to increase the preparedness of EU and mem-
bers states to engage in maritime security contingency operations [47].
Workstrand 2—Maritime Awareness, Surveillance and Information Sharing. Pur-
sued the implementation of the Common Information Sharing Environment (CISE)
to further cross-sectoral cooperation and interoperability at national and EU level. It
addressed cross-border cooperation and information exchange to optimize surveil-
lance; and supported the coordination of the several EU surveillance initiatives [47].
Workstrand 3—Capability Development. Fostered technological development,
harmonization of instruments to favor interoperability, and standardization and certi-
fication in the maritime domain. It was interested in exploring dual-use and multipur-
pose capabilities (e.g., civil–military capacities, integration of cyber dimension into
the maritime domain) and in promoting the sharing of best practices, risks analysis,
and threat information [47].
1 E.g., law enforcement, border control, customs and fisheries inspection, environmental authorities,
maritime administration, research and innovation, navies or other maritime forces, coast guards,
intelligence agencies [8].
2 E.g., North Atlantic Treaty Organization (NATO), the United Nations (UN), the African Union
In 2016, the International Ocean Governance Agenda (IOG) continued the pursuit of
ensuring EU’s coherence, by bridging several features of maritime security. On the
document, the EU presented itself as the global champion of oceans sustainability
and protection. To build its case, the EU anchored its thought on internal and external
progress and action it had developed thitherto [48].
On the internal front, it deferred to the developments within the IMP that con-
tributed to an overall increase of oceans sustainability. Furthermore, it placed great
focus on the environmental aspects of its policies. On the external front, the EU’s
contribution to international maritime security was the main argument. It notably
called attention to EU’s action in thwarting piracy in the Horn of Africa and its
anti-smuggling activities in the Mediterranean Sea [48].
The agenda was built around the idea of the oceans as a common good. It mim-
icked the EUMSS comprehensive and multilevel approach to ocean governance and
sustainability by including several sectors of the maritime economy; by establish-
ing links with nonexclusive maritime aspects of security such as cyber security; by
making an effort to consolidate and advance the internal/external nexus of EU; and
by pushing cultural components into the agenda [48].
Overall, environmental features were very much embedded into the agenda, and it
established a close link between economic and environmental dimensions. It asserted
that only a sustainable use of maritime resources could lead to long-term growth.
According to the EU, the environmental and economic link is particularly relevant and
requires global and multilateral action [48]. This indicates that the ideas formulated
in the early 2000s made a school in EU’s maritime conceptualization.
Also in 2016, the Global Strategy for the European Union’s Foreign and Security
Policy integrated maritime security within the broader EU approach to its foreign
276 J. A. Silveira
and security policy. The document presented the EU as a global maritime security
provider. According to it, maritime global growth is linked with EU interests of
supporting an open and fair economic system; thus, it is necessary for the EU to take
an active role in its protection. The strategy reinforced a multilateral approach that
perceived maritime security as a matter of external cooperation (e.g., with NATO)
and that required building capacities in Europe and elsewhere [9].
Again, the support for an international order based on the rule of law was present,
with the defense of the law of the seas as an important instrument for the peaceful
settlement of disputes. Also in conceptualizing its relations with others regions, the
Union included maritime security as one of the topics for joint development [9].
In its path toward coherence, the strategy argued for greater coordination between
internal and external agencies and instruments, such as CSDP missions and opera-
tions, European Border and Coast Guard, and EU specialized agencies to enhance
border protection and maritime security, to save lives, fight cross-border crime, and
disrupt smuggling networks. To increase the EU’s preparedness and effectiveness,
the strategy called for the improvement of maritime security-related capabilities [9].
These two documents seem to portrait maritime security not just as a supporter
element of EU’s internal and external actorness, but also as a legitimizer of EU’s
action at home and abroad. Consequently, maritime security serves to protect and
enhance the economic, environmental, and social interests of the EU and to support
and legitimize the security and international actorness of the EU. Maritime security
is, thus, not just a strategic component of EU’s maritime actorness, but also an active
component of EU’s global strategy.
The global strategy of the EU of 2016 is the core document guiding the EU toward a
more coherent and coordinated action. It argued for a holistic approach of the Union to
which all policies and instruments should contribute. The document re-focused EU’s
attention to the European continent and to the internal adaptation to cope challenges
faced by the EU as, for instance, the Russian behavior that led to the annexation
Crimea in 2014 and the effects of the migration crisis in the Mediterranean [9].
In 2017, the Council Conclusion on Global Maritime Security incorporated
such re-focusing. Overall, the conclusions reaffirmed the objectives, interests, and
approach of the EUMSS, yet it established as areas of particular attention the Mediter-
ranean Sea, the Baltic Sea, the Black Sea, and the Arctic region [49].
Regarding the Mediterranean, the document pushed for increasing levels of coor-
dination between EU instruments such (e.g., EUNAVFORMED Operation Sophia,
Frontex, European Fisheries Control Agency, EMSA) and between EU instruments
and other actors operating in the Mediterranean in order to increase security levels,
namely, to respond to the migration influxes from North Africa [49].
Oddly, however, the effects of the Russian annexation of Crimea to the maritime
security of the EU were not addressed, and the document only refers to regional
The Evolution of EU’s Maritime Security Thinking 277
cooperation in its approach to the Baltic and the Black Sea basins [49]. Considering
that the annexation of Crimea considerably changed the security spectrum of Europe
and that the existent strategies for those basins predate the annexation, it is a consid-
erable gap the absence of further strategic guidance to address the changing regional
order.
Despite the European re-focus, the strategy also considered relevant to engage
in confidence-building measures in the South China Sea, which the EU regards as
an area of potential regional conflicts. Furthermore, the document also demonstrates
attention to the situation in the Gulf of Guinea. In both cases, the EU’s approach is
based on supporting local ownership and regional institutions [49].
In 2018, the action plan for the EUMSS was updated. The principles of cross-
sectoral approach (civil–civil, civil–military, and military–military cooperation),
functional integrity, respect for rules and principles, and maritime multilateralism
of the EUMSS were maintained, as well as the defined approach to maritime secu-
rity [50].
The document presented a total of 90 actions. Those were divided between the
horizontal issues (56 actions) and regional and global affairs (34 actions).
The section horizontal issues devises the actions to the fulfillment of the EUMSS
and is subdivided in six main areas:
– Awareness raising. Promotes awareness regarding the EUMSS.
– International cooperation. Promotes the mainstream of maritime security in the
EU’s foreign action. The objective is to enhance cooperation with other parties
(e.g., organization, third parties, private sector), to promote international law, to
foster capability building in regions that require, and to bridge internal and external
components of the EU in order to increase its the internal–external coherence.
– Maritime awareness. Promotes the increase of maritime awareness through the bet-
ter use and sharing of information produced by several EU agencies, programmes,
activities, and policies (e.g., MARSUR, SatCen, CISE, EMSA, ESA).
– Capabilities development, research, and innovation. Promotes research and devel-
opment of capabilities and technologies of both the civilian and military sectors,
through synergies and multiple EU-funded grants. The objective is to reduce the
fragmentation of EU security demand. There is a great tonic in the development
of dual-use technologies for multipurpose use. In this regard, the enhancement of
maritime data is deemed crucial.
– Risk awareness and management. Promotes a comprehensive approach to risk
management and common analysis. The objective is to increase the resilience of
maritime infrastructures.
– Education and training. Promotes training and education initiatives to increase the
readiness of operations in tackling maritime issues. The objective is to standardize
procedures within the EU, and if possible, integrate external partners.
Regional and global affairs address specific needs of maritime areas in Europe
and in the world. From the 34 actions defined only nine address areas outside the
European geography: Gulf of Guinea, the Indian Ocean, and Indian and Pacific Ocean
[50]. This division appears to confirm the EU’s geographic re-centering to Europe.
278 J. A. Silveira
The actions defined for regional and global maritime affairs pursuit six funda-
mental objectives: mainstream maritime security in EU sea basins policies (existent
and future); increase cooperation and coordination among EU agencies, projects,
and instruments, and between these and actors outside the EU; develop capabilities
in third countries; develop EU capabilities and encourage research and development
projects; increase awareness of maritime security; and support regional development,
both in the EU and in the wider world [50].
Overall, the Council Conclusion on Global Maritime Security and the new action
plan for the EUMSS do not significantly alter the EU’s maritime security strategy.
These documents do re-center the attention to Europe, but maintain an international
take, and the objective of asserting the EU at the global stage. Maritime security
remains an important piece of EU’s conceptualization, for it “is an essential precondi-
tion for development, job creation, research in the maritime and marine environment
and global oceans governance” [49].
The more inward approach that these documents seem to convey appears to be a
maneuver to strengthen the EU at home, so that the EU can project a stronger and
more coherent image abroad.
9 Conclusion
References
1. Behr, T., Brattberg, E., Kallio, J. et al.: The Maritime Dimension Of CSDP: Geostrategic
Maritime Challenges and Their Implications for the European Union. European Parliament,
Directorate-General for External Policies of the Union, Directorate B, Policy Department
(2013)
2. Germond, B.: The Maritime Dimension of European Security: seapower and the European
Union. Palgrave Macmillan, Houndmills, Basingstoke, Hampshire (2015)
3. Bueger, C., Edmund, T. (2017). Beyond Seablindness: a New Agenda For Maritime Security
Studies. Int. Aff. 0, 1–19
4. Noone, K., Sumaıla, R., Díaz, R. J.: Valuing the Ocean. Extended Executive Summary. SEI -
Stockholm Environment Institute, Stockholm (2012)
5. Figueres, J.M., Lamy, P., Podesta, J.D.: The Fight for Ocean Health. In: Project Syn-
dicate https://www.project-syndicate.org/commentary/un-sdg-14-ocean-regeneration-by-jose-
maria-figueres-et-al-2017-02(2017). Accessed 28 Feb 2017
6. European Commission: Maritime Safety, Erika I Package (2000)
7. European Commission: An Integrated Maritime Policy For The European Union. Office for
Official Publications of the European Communities, Luxembourg (2008)
8. European Commission: European Union Maritime Security Strategy (2014)
9. High Representative: Shared Vision, Common Action: a Stronger Europe – A Global Strategy
for the European Union’s Foreign and Security Policy (2016)
10. Buzan, B., Waever, O.: Regions and Powers. The Structure of International Security. Cambridge
University Press, Cambridge (2003)
11. Chapsos, I.: Introduction: Strengthening Maritime Security Through Cooperation. NATO Sci.
Peace Secur. Ser. E. Hum. Soc. Dyn. pp. 1–7. https://doi.org/10.3233/978-1-61499-536-4-
1(2015)
12. Bueger, C.: What is maritime security? Mar. Policy 53, 159–164 (2015). https://doi.org/10.
1016/j.marpol.2014.12.005
13. Chapsos, I., Malcolm, J.A.: Maritime security In Indonesia: towards a comprehensive agenda?
Mar. Policy 76, 178–184 (2017). https://doi.org/10.1016/j.marpol.2016.11.033
14. Gray, C.: Strategy and History. Essays on Theory and Practice. Routledge, New York (2006)
15. Berindan, I.: Not another ‘Grand Strategy’: what prospects for the future European security
strategy? Eur. Secur. 22, 395–412 (2013). https://doi.org/10.1080/09662839.2013.808189
16. European Commission: Maritime Safety, Erika II Package (2000)
17. European Parliament, Council of the EU: Directive 2002/84/EC of the European Parliament
and of the Council of 5 November 2002 Amending the Directives on maritime Safety and the
Prevention of Pollution from Ships (2002)
18. European Council: Copenhagen European Council 12 and 13 December 2002. Presidency
Conclusions (2002)
19. European Commission: European Neighborhood Policy - Strategy paper (2004)
20. European Commission: Thematic Strategy on the Protection and Conservation of the Marine
Environment (2005)
21. Germond, B.: The EU’s security and the sea: defining a maritime security strategy. Eur. Secur.
20, 563–584 (2011). https://doi.org/10.1080/09662839.2011.635648
22. European Parliament Council of the EU: Directive 2008/56/EC Of The European Parliament
and of the Council of 17 June 2008 Establishing A Framework For Community Action in the
Field of Marine Environmental Policy (Marine Strategy Framework Directive) (2008)
23. European Commission: A European Strategy for Marine and Maritime Research (2008)
24. European Commission: Marine Knowledge 2020 Marine Data and Observation For Smart and
Sustainable Growth (2010)
25. Council of the EU: Council Conclusions on Integration of Maritime Surveillance. Towards The
Integration of Maritime Surveillance: a Common Information Sharing Environment for the EU
Maritime Domain (2011)
280 J. A. Silveira
26. Council of the EU: Council Regulation (EC) No 1005/2008 of 29 September 2008 Establishing
a Community System to Prevent, Deter and Eliminate Illegal, Unreported and Unregulated
Fishing, Amending Regulations (EEC) No 2847/93, (EC) No 1936/2001 and (EC) No 601/2004
and repealing Regulations (EC) No 1093/94 and (EC) No 1447/1999 (2008)
27. European Commission: Commission Regulation (EC) No 1010/2009 of 22 October 2009 lay-
ing down detailed rules for the implementation of Council Regulation (EC) No 1005/2008
Establishing a Community System to Prevent, Deter and Eliminate Illegal, Unreported and
Unregulated Fishing (2009)
28. European Commission: Roadmap for Maritime Spatial Planning: achieving Common Princi-
ples in the EU (2008)
29. European Commission: Strategic Goals and Recommendations For The EU’s Maritime Trans-
port Policy Until 2018 (2009)
30. European Parliament, Council of the EU: Directive 2009/18/Ec Of The European Parliament
and Of The Council of 23 April 2009 Establishing The Fundamental Principles Governing The
Investigation of Accidents in the Maritime Transport Sector and Amending Council Directive
1999/35/EC and Directive 2002/59/EC of the European Parliament and of the Council (2009)
31. European Commission: Black Sea Synergy - A New Regional Cooperation Initiative (2007)
32. European Commission: European Union Strategy for the Baltic Sea Region (2009)
33. European Commission: Towards an Integrated Maritime Policy For Better Governance in the
Mediterranean (2009)
34. European Commission: Developing a Maritime Strategy for the Atlantic Ocean Area (2011)
35. European Commission: An Integrated European Union Policy For The Arctic (2016)
36. European Commission: Blue Growth: opportunities For Marine and Maritime Sustainable
Growth (2012)
37. European Commission: Action Plan For A Maritime Strategy In The Atlantic Area. Delivering
Smart, Sustainable and Inclusive Growth (2013)
38. Council of the EU: The European Union Counter-Terrorism Strategy (2005)
39. European Commission: The EU Internal Security Strategy in Action: Five Steps Towards a
more Secure Europe (2010)
40. European Council: A Secure Europe in a Better World. European Security Strategy (2003)
41. Weber, A.: EU Naval Operation in the Gulf of Aden (EU NAVFOR Atalanta): Problem
Unsolved, Piracy Increasing, Causes Remain. In: The EU as a Strategic Actor in the Realm of
Security and Defence? pp 70–83. SWP, German Institute for International and Security Affairs,
Berlim (2009)
42. Larik, J.: Europe’s Fight Against Piracy: from the Barbary Coast to Operation Atalanta. Fon-
dation Pierre du Bois (2013)
43. Silveira, J.: EUNAVFOR Atalanta: O Compromisso da União Europeia com a Segurança
Global. Universidade do Minho (2015)
44. Silveira, J.: European Union Security: the Threat of Piracy. In: VIII Congress APCP (Portuguese
Association of Political Science). Faculdade de Ciências Sociais – New University of Lisbon,
Lisbon, Portugal (2016)
45. Council of the EU: Council Joint action 2008/851/CFSP of 10 November 2008 on a European
Union military operation to contribute to the deterrence, prevention and repression of acts of
piracy and armed robbery off the Somali coast (2008)
46. European Council: Report on the Implementation of the European Security Strategy. Providing
Security in a Changing World (2008)
47. Council of the EU: EU Maritime Security Strategy Action Plan (2014)
48. European Commission: International Ocean Governance: an Agenda For The Future of Our
Oceans (2016)
49. Council of the EU: Council Conclusions on Global Maritime Security (2017)
50. Council of the EU: Council Conclusions on the Revision of the European Union Maritime
Security Strategy (EUMSS) Action Plan, 26 June 2018
The Obstacles Women Face in Gaining
Access to Special Operations Forces
Abstract The aim of this article is to provide exploratory insights regarding women
integration in the special operations forces. The methodological approach is qualita-
tive and employs a case study research in the Portuguese Army. It includes multiple
sources of data collection for corroboration purposes, namely semi-structured inter-
views, direct observation and official documents. Although it has been considered a
hot-topic in the Portuguese armed forces, and as the Portuguese Republic establishes
the legal means to integrate women in all professional areas, reality shows that up to
the present days no women have been part of the special operations forces. In light
with the above, we evidence some obstacles that women are facing in gaining access
to the Portuguese special operations forces, and we present Portugal in comparative
perspective with two successful case studies.
J. Reis (B)
Department of Military Science, Military Academy, GOVCOPP, Lisbon, Portugal
e-mail: joao.reis@academiamilitar.pt
R. Gonçalves
Department of Military Science, Military Academy, Lisbon, Portugal
e-mail: goncalves.inf@gmail.com
S. Menezes
Department of Management and Leadership, CINAMIL, Lisbon, Portugal
e-mail: sofia.menezes@academiamilitar.pt
M. Kaczynska
Tadeusz Kościuszko Land Forces Military University, Polish Land Forces Military University,
Wrocław, Poland
e-mail: manuelakaczynska@gmail.com
1 Introduction
Special operations forces have become increasingly central to the wars of the twenty-
first century [1]. Every country has military units composed of personnel specially
trained and equipped, with higher level of readiness than general military units and
typically regarded as elite—these forces are collectively known as special operations
forces [2].
Despite consistent downsizing, over the past two decades the armed forces of
the industrial democracies have seen extensive growth in special operations forces
(SOF). By means of increasing numbers of personnel and of more frequent deploy-
ments, SOF units have wielded considerable influence in conflicts around the world
[3]. The remarkable growth of SOF is part of the military organizations and has
had to dramatically adapt to their diversity and changing external and internal envi-
ronments [4]. As Shamir and Ben-Ari [4] argue, SOF are unique in that they are
specialized generalists, local-level integrators that link between the tactical opera-
tional and strategical levels of actions, therefore being hybrid forms of organizational
response to environmental pressures.
In Portugal, women are not precluded from serving in any military unit by law;
however, the reality is that up to the present days no women have been part of
the Portuguese SOF. The reasons are yet to be determined, since all the statistics
prove the commitment of women to combat—“in approximately 10 years of combat
operations in Iraq and Afghanistan, over 283 thousand female members have been
deployed, over 800 have been wounded and over 130 have died” [5, p. 1]. Burrelli
[5] reinforces that, on numerous occasions, women have been recognized for their
heroism, two of which earning US Silver Star medals.
We have conducted a research of the literature and we have detected the existence
of similar articles. What is the novelty brought by our article? Most gender studies
on special operations forces are from the United States (US) Army, mainly after the
congress mandated that US SOF adopted gender-neutral occupational performance
standards by 2016. After that year, females were no longer barred from applying to
SOF rigorous pipeline, and as shown in operations in Afghanistan and Iraq, female
enablers made significant, unique contributions to ground combat and SOF missions
[6]. Gasca et al. [6] even went further, by arguing that many of these unique con-
tributions, such as the ability to interact with indigenous children and female adults
(forbidden by local customs or religious beliefs from interacting with male service
members), were critical to mission success. Moreover, women have been employed
successively in SOF units worldwide, though some Western countries still subsist to
that trend. It is to that extent that our article provides differentiating contribution, as
it analyses the reasons that led a Western European Army to not embrace women in
their ranks.
This article is organized as follows: in the next sections, we review the litera-
ture and discuss the gender concept on the military forces. Then, we describe the
methodological approach, the study sample and the data analysis.
The Obstacles Women Face in Gaining Access to Special … 283
The following sections discuss the empirical results, by providing statements from
the respondents. Finally, we present the academic and practical insights, limitations
and guidelines for future research.
2 Literature Review
The issue of women in the military has always been, and is likely to remain, one
of the most controversial issues in the study of military institutions [7]. Therefore,
the issue of women’s empowerment and gender equality is at the top of agendas
across the world, as gender inequality is widespread in all cultures [8]. By the begin-
ning of the twenty-first century, most Western democratic countries had admitted
and increased the number of women in their armed forces; although restrictions
persisted, many were lifted: women were progressively allowed to enter military
academies and given access to a wide variety of positions and functions [9]. As the
global momentum towards the acceptance of women in ground close combat (GCC)
continues to increase, the USA decided, in December 2015, to open all GCC role
to women without exception—a controversial and, some say, politically motivated
decision [10]. The number of women service in the military and deployed to active
duty is unprecedented in the history of developed economies—in the US Armed Ser-
vices, women constitutes approximately 14.5% of the 1.4 million active component
and 18% of the 850,000 reserve component [11]. Yet, little attention has been paid
to women integration on military life. Thus, the history of women’s military partic-
ipation shows that they have systematically been excluded from warfare as warriors
or have participated only in exceptional circumstances [7].
In the USA, between 2003 and 2013, women were technically banned from direct
assignment to ground combat units; however, the US military deployed all-female
counterinsurgent teams in Iraq and Afghanistan [10, 12]. Greenburg [12] also argues
that in various forms, these teams searched Iraqi women at checkpoints and in home
raids, provided medical assistance to Afghan women and children. Adding to this,
women participated in highly combative special operations missions alongside Army
Rangers and Green Berets in Afghanistan. Although this empirical evidence has been
demonstrated, women are still being marginalized in several military institutions
around the world.
The gender theme has raised attention all over the world, and it is not just about the
USA. In 2016, the Canadian Armed Forces (CAF) launched a recruitment campaign
aimed specifically at women, in which the military’s—and society’s—ambivalence
towards female participation was palpable—one of the goals of the campaign was
to recruit sufficient women so as to change the CAF’s violent, sexist and sexualized
culture [13]. The stereotype has made women’s integration in the armed forces chal-
lenging and supports a gender binary “that characterizes men as active, women as
passive” and is damaging their credibility as combat soldiers [13]. The reality is that
many nations still do not allow women to serve in combat roles or in submarines
[14]. Still, a greater number of combat-support and possibly service-support roles
284 J. Reis et al.
performed by women will increasingly mean they will find themselves in combat
zones [10].
Szayna et al. [15] have recently conducted a survey about women integration in
SOF and concluded an opposition to opening SOF specialties to women in both deep
and wide, with high levels of opposition across all SOF elements. Those authors’
analysis of responses to open-ended questions suggests that this opposition also is
deep-seated and intensely felt. Szayna et al. [15] concluded that principal sources
of this opposition are the belief among SOF personnel that women do not have the
physical capabilities and other to meet the demands of the specialties; however, the
lower level of opposition to women in SOF units than specialties, as well as the
fact that about four in ten of our respondents agreed that women might be helpful
in conducting sensitive operations and communicating with local populations might
present additional opportunities for the participation of women in SOF. Sunde and
Kristiansen [16] argue in the same direction, stating that women in certain urban spe-
cial reconnaissance (SR) roles will increase the SR capacity in small states NATO
SOF. As the authors studied the Norwegian Special Operations Forces (NORSOF)
case, the found that conducting SR in urban areas often involves indirect or direct
human contact. Female SR operators will tear up the stereotypical signature of male
operators, and thereby provide operational flexibility and will enable a SOF unit
to handle a broader range of SR missions, consequently increasing the strategic and
political value of that unit [16]. Meanwhile, Knarr et al. [17] conducted a survey with
Retired SOF Senior Leaders who agreed that any chance of success requires no com-
promise in the assessment and selection standards across the SOF enterprise (e.g. “Do
not lower the standards for physical and mental endurance”, “Keep the standard!”),
this followed a focus group concerned with the ability of mixed-gender teams to
effectively perform direct action missions, perceived to require the highest level of
physical capabilities. From a NATO SOF integration, Kristiansen [18] suggests to
analyse the different roles and to produce a selection and education programme that
suits the standards for these specific roles, instead of forcing women through the
SOF selection and education programmes that already exists. In Kristiansen’s [18]
view, the physical standards for women NATO SOF need to be adapted, based on
potential relevant roles for female operators, such as the level of risk in NATO SOF
is expected to be handled in order to accomplish high-risk missions.
3 Methodology
This research is qualitative and exploratory, trying to explain a phenomenon for which
little or no empirical data exist [19]. To that end, we have conducted a case study to
enable the research to acquire in-depth and holistic understanding of multiple aspects
of the phenomenon, as well as the interrelationships between different aspects [20].
We have built this study on multiple sources of data collection, for triangula-
tion and corroboration purposes. Those sources of data collection consist on semi-
structured interviews, direct observations and institutional documents. A case study
The Obstacles Women Face in Gaining Access to Special … 285
that relies on multiple sources prevents the exclusive reliance on a single data col-
lection method, thus aiding to neutralize any bias inherent to a particular data source
[21].
The participants for the interviews were selected according to the following char-
acteristics: six servicemen with the army special operations course and six service-
women from the Portuguese Army. The researchers made use of their personal net-
work in the army to identify the best respondents. The selected respondents were
chosen according to their different functional areas and different levels of responsi-
bility in the military organization. Thus, the study was carried out from operational
to administrative areas, and the respondents’ ranks ranged from master sergeant to
colonel. The direct observations involved systematically seeing and listening [22] and
mainly consisted in informal interviews and notes that were collected into a research
diary. Those notes contained the respondents’ reactions and expressions to certain
type of questions, while the informal interviews had mainly served to deepen the
knowledge that otherwise would not possible to ascertain during the formal inter-
views. The analysis of institution documents served essentially to understand the
Portuguese concept of special operations forces, their main missions and to under-
stand into what extent the training/course can be an obstacle to women integration.
Similar to other studies, before proceeding, we took the following details in con-
sideration: first, the women in SOF survey dealt with a highly politicized issue in
Portugal as respondents might have viewed the survey as an influence to policy,
rather than an opportunity to identify the potential challenges and opportunities for
smoothing implementation and to change mentalities [15]. Therefore, we believe
some respondents might not have answered in an overt way—to mitigate a possible
disruption, we have cross-checked these answers with secondary sources of data col-
lection. In order to enhance the reliability and validity of the case study research, we
have followed a research protocol (Appendix) and the transcriptions were double-
checked by the participants to avoid misinterpretations.
After we collected the data, all the text was analysed according to the technique of
content analysis [23]. We had preliminary categorized textual data into categories, to
identify consistent patterns and relationships between variables in a way of reducing
data and making sense of them [21]. The study was resorted to the use of qualitative
data analysis software known as NVivo, which allowed to code in order to build
and hierarchize categories and subcategories to identify the main stream and/or new
ideas.
4 Findings
This section presents the results of the case study research. In addition, we also
provide an insightful contribution, by comparing two European realities, Portuguese
and Polish, from military point of view of the authors. Finally, we present an inspiring
case, witnessed from a military mission in Afghanistan.
286 J. Reis et al.
The special operations forces have a complex organization, a diverse set of capa-
bilities and a broad range of officially assigned missions, all of which can make it
difficult to understand exactly who special operation forces are and how they should
be used [24]. In Portugal, the army special operation forces are especially assigned to
conduct operations of special reconnaissance, direct actions and military assistance.
Moreover, the directive nº 90 from the Chief of Staff of the Portuguese Army (CSPA)
states that, due to SOF unique characteristics, they act within the spectrum of crisis
response operations, combat operations for search and rescue and counterterrorism
operations [25, pp. 2–4].
The respondents have supported the ideal of combat-support and service-support
roles to be performed by women in the special operations forces. At the same time ser-
vicewomen argued that women might be helpful in conducting sensitive operations
with local population, they have also claimed that if women gather enough physi-
cal and psychological robustness, they should be included in SOF combat missions.
In addition, informal interviews have revealed that until very recently the physical
component of SOF in Portugal was highly valued; this information is also corrobo-
rated with internal documents. However, this paradigm has been changing, while the
technical and intellectual component is highly appreciated, e.g. in order to perform
complex missions that involves modern military technologies [26]. Although some
scholars and SOF servicemen make a distinction about different physical capabilities,
there are no scientific evidence concerning technical and intellectual discrepancies
between men and women. Furthermore, a survey in Portugal shows that currently
the number of women attending higher education in Portugal surpasses that of men
[27].
One of the possible solutions to integrate women into the Portuguese special oper-
ations forces is what servicewomen call “pioneers”, that is, a group of women being
able to successfully undertake a special operations course and combat operations
alongside with men. Demystifying the subject, thrust and inspiration may be the
formula that women need to undertake a life in SOF units. The interviewed service-
women are well informed about the progress made until the present days in both US
and Afghan SOF. If women are willing to attend and complete a special operations
course, they will encourage and inspire others to move forward as they have proven
that this opportunity is within the reach of every person. This opportunity is getting
closer, because although official documents show that the special operations course
is still very demanding from the physical point of view, it is increasingly becoming
more technical, whereas the adaptability, the complex technical and tactical capa-
bilities of SOF students are pushed to limit. Nevertheless, direct observations have
pointed out that some servicewomen are reluctant about the robustness level that
would be imparted to them during the SOF course, when compared with their male
counterparts, in order to make them give up. Apparently, the idea of SOF operators
is that integration of women into the special operations forces might be identified
The Obstacles Women Face in Gaining Access to Special … 287
Currently, Poland employs women in close combat roles [31]. Nowadays, women that
complete 5 years of university assume military posts [32]. According to Cawkill et al.
[32], from 2003 to 2008 the Polish armed forces made outstanding progresses, as they
achieved 1153 servicewomen in the army; moreover, females platoon commanders
have been deployed to Polish military contingents in Iraq and Afghanistan. Although
the Polish Army is given as an example, several European countries integrate women
into combat operations—Denmark, Finland, France, Germany, Netherlands, Norway,
Romania, Spain and Sweden [31]. Moreover, recent studies argue that female sol-
diers’ experiences refute their male colleagues’ assumptions, regarding their ability
to serve in combat units [33].
Polish Special Forces comprise five service operation units. The Polish Grupa
Reagowania Operacyjino Mobilnego (GROM) is a special operations force unit that
has already gained an excellent reputation within the world’s special forces commu-
nities, while the GROM training is made as realistic as possible as all the training is
mainly carried out using live ammunition [34]. Their training is based on three main
areas: black tactics that are focused on counterterrorism operations on the ground,
green tactics-special operations in enemy’s rear and activities associated to the releas-
ing of prisoners of war and blue tactics which involves counterterrorism operations
on the sea. Polish Jednostka Wojskowa Komandosów (JWK) is specialized in special
288 J. Reis et al.
One of the co-authors of this article has served in the NATO Special Operations
Component Command-Afghanistan (NSOCC-A). During his duties, as advisor of
the Ministry of Interior, he followed the commitment of the North Atlantic Treaty
Organization (NATO) gender advisors while accomplishing their duties (train, advise
and assist) in order to increase women’s representation at all levels of the Afghan
National Defence Security Forces (ANDSF). Women operating in the Afghan special
security forces (ASSF) may integrate the General Command of Police Special Units
under the Ministry of Interior (MoI) or service with the Afghan National Army
Special Operations Command under the Ministry of Defence (MoD). Recruiting
women to ASSF is clearly a higher challenge when compared with most of the
Western countries. Despite this fact, gender discrimination remains an issue within
the ANDSF; our belief is that, being pushed by NATO advisors, the Afghan leaders
are progressively changing their minds and accepting females’ integration into police
and army special forces. The sacrifices made by the Afghan women in the line of
duty might be seen as an inspiration to developed countries that have not yet been
able to successfully integrate women in their SOF.
5 Concluding Remarks
In this article, it is concluded that although the physical component of the SOF in
Portugal is highly valuable, this paradigm has been changing. Due to some changes,
motivated by the use of military technologies, the technical and intellectual compo-
nent is now appreciated in the Portuguese SOF. Although SOF operators defend a
distinction concerning different physical capabilities between men and women, there
is no scientific evidence concerning the technical and intellectual discrepancies. It is
The Obstacles Women Face in Gaining Access to Special … 289
with the aforementioned arguments that we support the integration of women into
the Portuguese SOF; in addition, existing examples have shown not only the feasi-
bility of their integration, but also new acting opportunities in all types of military
operations.
This article is not free of limitations: due to confidentiality reasons, we have
not provided any information about key informants and the respective military unit
they serve. It is also limited because of its exploratory nature, but we hope that we
can encourage future investigations as it may also be relevant to fill a gap in the
literature. However, case studies are difficult to generalize. Thus, the same study in
other countries may carry the risk of obtaining contradictory findings. This issue
should not be considered a problem itself. To mitigate the generalization aspect, we
suggest to adapt our results to each SOF’s and country realities.
We instigate academics and practitioners to provide new and insightful contribu-
tions to this emergent topic as it represents a fertile opportunity for future research.
Future research may focus on the role and impact of women in the Portuguese para-
troopers. In addition, we also suggest the role and impact of women in the modern
Afghan Armed Forces.
Acknowledgements This project was started under the sponsorship of Erasmus+ programme,
which allowed students from different European countries to cooperate. We would like to thank
the Portuguese and Polish Army, for their outstanding contribution. Lastly, but not least, we would
also like to thank the participation of the anonymous respondents, which greatly contributed to the
production of the final results.
Appendix
1. Introduction
2. Generic information
3. Generic questions
• What do you think about the integration of women in the Special Operations
Forces?
• If you agree to it, in what branches? Why that branch?
• Should women perform tactical/combat operations?
• If not, why?
3.1. Specific questions
– Do you know any international model of integration of women in the
special operations forces?
– If so, can you give some examples?
– Which model do you consider the most appropriate and why?
– As you know, there are no women in the Portuguese special operations.
In your opinion what is the reason?
– What can be done, so that the integration of women in this type of
forces would be successful?
– In your opinion, what is the greatest contribution that women can bring
to the special operations forces?
4. Closing comments
References
1. Long, A.: NATO special operations: promise and problem. Orbis 58(4), 540–551 (2014)
2. Kirby, S., Harrell, M., Sloan, J.: Why don’t minorities join special operations forces? Armed
Forces Soc. 26(4), 523–545 (2000)
3. Turnley, J., Michael, K., Ben-Ari, E.: Special Operations Forces in the 21st Century: Perspec-
tives from the Social Sciences. Routledge (2017)
4. Shamir, E., Ben-Ari, E.: The rise of special operations forces: generalized specialization, bound-
ary spanning and military autonomy. J. Strateg. Stud. 41(3), 335–371 (2018)
5. Burrelli, D.: Women in combat: issues for congress. In: Library of Congress Washington DC
Congressional Research Service, pp. 1–17 (2013)
6. Gasca, F., Voneida, R., Goedecke, K.: Unique capabilities of women in special operations
forces. Spec. Oper. J. 1(2), 105–111 (2015)
7. Carreiras, H.: Gender and The Military: Women in the Armed Forces of Western Democracies.
Routledge (2006)
8. Bayeh, E.: The role of empowering women and achieving gender equality to the sustainable
development of Ethiopia. Pac. Sci. Rev. B Humanit. Soc. Sci. 2(1), 37–42 (2016)
9. Carreiras, H.: Gender relations in the armed forces: does the draft make a difference? Sicherh.
Frieden (S+F)/Secur. Peace, 19–24 (2012)
10. Fitriani, Cooper, R., Matthews, R.: Women in ground close combat. RUSI J. 161(1), 14–24
(2016)
The Obstacles Women Face in Gaining Access to Special … 291
11. Boyd, M., Bradshaw, W., Robinson, M.: Mental health issues of women deployed to Iraq and
Afghanistan. Arch. Psychiatr. Nurs. 27(1), 10–22 (2013)
12. Greenburg, J.: New military femininities: humanitarian violence and the gendered work of war
among US servicewomen. Gender Place Cult. 24(8), 1107–1126 (2017)
13. Lane, A.: Special men: the gendered militarization of the Canadian armed forces. Int. J. 72(4),
463–483 (2017)
14. Pinch, F., MacIntyre, A., Browne, P., Okros, A.: Challenge and Change in the Military: Gender
and Diversity Issues. Wing Publishing Office (2004)
15. Szayna, T., Larson, E., O’Mahony, A., Robson, S., Schaefer, A., Matthews, M., Polich, M.,
Ayer, L., Eaton, D., Marcellino, W., Miyashiro, L., Posard, M., Syme, J., Winkelman, Z.,
Wright, C., Zander-Cotugno, M., Welser, W.: Considerations for Integrating Women into Closed
Occupations in US Special Operations Forces. Rand Corporation (2016)
16. Sunde, F., Kristiansen, M.: Defying stereotypes: the untapped potential of integrating female
reconnaissance operators into small state NATO SOF. Small Wars J. (2018)
17. Knarr, W., Turnley, J., Stewart, D., Rubright, R., Quirin, J.: Special operations forces mixed-
gender elite teams (SOFMET): examining socio-cultural dynamics of SOFMET. Joint Special
Operations University, Centre for Special Operations Studies and Research, 1–117 (2014)
18. Kristiansen, M.: Women: a NATO special operations forces force multiplier. Small Wars J.
(2017)
19. Yin, R.: Case Study Research: Design and Methods. Sage, Thousand Oaks (2003)
20. Gummesson, E.: Qualitative Research in Management. Qualitative Methods in Management
Research. Sage, London (1991)
21. Given, L.: The SAGE Encyclopaedia of Qualitative Research Methods, vol. 1–2. Sage, Thou-
sand Oaks (2008)
22. Taylor-Powell, E., Steele, E.: Collecting Evaluation Data: Direct Observations. University of
Wisconsin, Madison (1996)
23. Mills, A., Durepos, G., Wiebe, E.: Encyclopedia of Case Study Research. Sage, California
(2010)
24. Robinson, L.: The future of US special operations forces. Counc. Foreign Relat. 66, 1–39
(2013)
25. Chief of Staff of the Portuguese Army (CSPA): Âmbito de atuação, missões e tarefas das
unidades de tropas especiais. Divisão de Planeamento de Forças, diretiva nº 90 do Chefe de
Estado-Maior do Exército Português (2007)
26. Knie, J.: Special Forces Skills: Are they Special Enough? U.S. Army War College, Carlisle
Barracks PA. (2002)
27. Pordata: Students enrolled in higher education: total and by sex. Statistical database. https://
www.pordata.pt/en/Search/students%20in%20Portugal,%20sex (2018)
28. Torrão, S.: Anjos na Guerra. Oficinas do Livro, 1–168 (2013)
29. Carreiras, H.: Women in the Portuguese armed forces: from visibility to eclipse. Curr. Sociol.
50(5), 687–714 (2002)
30. Grão, L.: Enfermeiras pára-quedistas 1961–2002. Prefácio (2006)
31. Haring, E.: What Women Bring to the Fight. Army War College Carlisle Barracks PA. (2013)
32. Cawkill, P., Rogers, A., Knight, S., Spear, L.: Women in Ground Close Combat Roles: The
Experiences of Other Nations and a Review of the Academic Literature. Defense Science and
Technology Labroratory, Porton Down (2009)
33. Doan, A., Portillo, S.: Not a woman, but a soldier: exploring identity through translocational
positionality. Sex Roles 76(3–4), 236–249 (2017)
34. Ryan, M.: The Operators: Inside the World’s Special Forces. Skyhorse Publishing Inc. (2008)
35. MNDRP, Ministry of National Defence Republic of Poland—Military service. http://
archiwalny.mon.gov.pl/en/strona/333/LG_260_261 (2018). Accessed 31 Oct 2018
The Transformation of the Defense
and Security Sector to the New Logistics
4.0: Public–Private Cooperation
as a Necessary Catalyst Strategy
Abstract The logistical needs to develop and maintain both military and police
weapon systems and support material are being met to respond to a set of certain
risks, which now imply the invasion of the territory as well as other threats, such as
international terrorism, cyberattacks, corruption, drug and arms trafficking, global
organized crime, or the trafficking of human beings. The strategic support that will
guide the new operative concepts and together with the acquisition of new military
and police capabilities is based nowadays, and will be increasingly in the future, on
technology and logistics capacity. In this sense, the concepts of the new logistics
have experienced a great catalyze with the digital transformation, which requires a
complete organizational, cultural, and strategic reinvention of both the armed and
police forces and the defense and security industry. The qualitative research con-
ducted has detected a gap in the reactive adaptation of the armed and police forces
to the new logistics 4.0, in relation to its proactive implementation by the main
companies of this sector. The implementation of public–private cooperation models,
which in addition to involving advantages in the improvement of military and police
efficiency as well as business development for the industrial sector, will involve the
permanent and bidirectional transfer of knowledge among the structures implicated,
including the adaptation and permanent dynamic adjustment to the great changes
that the exponential digital evolution will imply.
1 Introduction
The vast changes that have taken place in this decade have made it necessary and
evident for the armed and police forces of the international community, to understand
the nature and current factors of the global environment that condition their internal
activity. The risks and threats in our days and, therefore, the problems of defense and
security are much broader than those of other times as a result of their global impact,
the characteristics and possibilities of the new digital technologies applied, as well
as of the “intelligent” armament used [6].
Accordingly, the current logistic needs regarding the development and mainte-
nance of weapons systems and their military and police support material are being
covered by realistic and adjusted public budgets to give sufficient response to a set
of certain risks, that within the framework of the New World Order, moderately
implies the usual threat of invasion of the territory, and a significant presence of a
new and diverse set of threats, such as international terrorism, cyberattacks, corrup-
tion, drug trafficking and trafficking of international arms, global organized crime,
or the trafficking of human beings, which are supported by anonymous groups will-
ing to achieve their objectives at the expense of insecurity and international social
destabilization [8].
The strategic support that will guide the development of new operational con-
cepts and the acquisition of new military and police capabilities is based on three
key premises. Firstly, that the present and future strategic environment is uncertain,
complex and conflictive; secondly, that no crisis can be resolved satisfactorily with
isolated military and police employment, which must be combined and integrated
with other initiatives of a civil, political, economic, humanitarian, or informational
nature; and finally, that the military and police forces must have a balanced and an
adequate catalog of capabilities both for the conventional conflicts and for irreg-
ular and hybrid combat, whose source of “military and police advantage” will be
technology and logistics capabilities [10].
All of this has involved, since the end of the previous decade and the beginnings
of the present one, a transformation of the defense and security sector, which has
been largely driven by the development and implementation of the so-called new
logistics in its adaptation to the global world. However, the new technological sce-
nario represented by digital transformation, and in its scope, the implementation of
the concepts of Industry 4.0 and logistics 4.0 in this sector [15], both in its public and
private sphere, requires a complete organizational, cultural, and strategic reinvention
both the armed and police forces and the international industrial sector of defense
and security, thus providing the international community and each of the countries
with a dynamic redesign capability that can respond to the needs arising from the
processes of exponential technological evolution, that this new paradigm carries with
it.
The Transformation of the Defense and Security Sector … 295
In recent years, logistics has been acquiring a growing importance in the strategy
of companies and has become an essential factor for improving their competitive-
ness in a constantly changing global market. Thus, the application of improvements
in the performance of methodologies and technologies in the logistics field, which
have developed exponentially with the Internet, implicitly leads to obtaining com-
petitive advantages. These advantages are based not only on increasing efficiency
and effectiveness in logistics management, but also on increasing the value provided
to customers and global sustainability.
The new logistics is based on a conceptual transition from a “push” approach to a
“pull” approach, developing new logistic models that are more efficient, sustainable,
intelligent, agile, adaptable, scalable, and resilient. The following figure summarizes
the main aspects of traditional logistics and its evolution to the new logistics [9]
(Fig. 1).
On the other hand, the sustainability of global logistics [3–5] and of supply-chain
management represents a strategy of transparent integration of the social, environ-
mental, and economic objectives of the organization, within the system of coordi-
nation of the main inter-organizational business processes, in order to improve the
long-term economic results of each company and its supply chains [1].
The development prospective of the new logistics with a long-term projection has
shaped the theory of Physical Internet [14]; a vision that has been adopted both in
the USA and in the European Union as the conceptual goal of logistics for 2050. It
involves achieving an open global logistic system, based on a physical, digital and
operational interconnectivity, through encapsulation, interfaces and protocol design,
in order to move, store, perform, provide, and use physical objects throughout the
world in an economically, environmentally, and in a socially efficient and sustainable
way. The aim is to eliminate inefficiencies in global transport and waste management
of logistics networks, in a similar way to what the Internet raised worldwide for
information flows [13] (Fig. 2).
It will be necessary to create an open market for the transport of goods, with shared,
open and adaptable distribution chains, in which the products will be transported in
modular, standardized, and intelligent containers, allowing each unit to be followed
and controlled.
For this, it will be necessary to achieve a full level of global collaboration, redefin-
ing the competitive space, taking it out of the logistics processes, and taking it only
to the points of sale in which customers define the market share of each product.
The Transformation of the Defense and Security Sector … 297
The viability of the Physical Internet will obviously require the implementation of
existing digital-enabling technologies, such as the Internet of things, cyberphysical
systems, collaborative robotics, e-commerce, blockchain, virtual reality, augmented
reality, additive manufacturing and 3D printing, artificial intelligence, big data, data
analytics, predictive maintenance, simulation, collaborative economics, cloud com-
puting, cybersecurity, and machine learning, but above all, the incorporation of other
more advanced and complex innovations resulting from the exponential technologi-
cal evolution that are being developed now and in the future.
authentic centered networks in the clients. In this way, the environment appears to
be changing, hybrid, competitive, global, connected, and interdependent.
The result of all this will allow us to achieve immediate answers in decision-
making based on the information captured in real time, through intelligent systems
and processes, without variability or errors, with full traceability in the process chains
and total sustainability. All of this leads us to a new situation that will affect the way
of producing and controlling processes, applying logistic models, and developing
marketing and commercialization strategies.
In this way and totally linked to the concept of Industry 4.0, the concept of logis-
tics 4.0, which develops and assumes the concepts of the new logistics, transcends
and emerges due to its importance. That is that logistics, as a key element of the
industrial sector, cannot be kept aside. The Smart Factory implicitly assumes that
manufacturing plants, facing a traditional centralization derived from the search for
economies of scale by volume, now consider an intelligent relocation by factors of
specialization and synergies, giving rise to the creation of different and immense
networks distant from interconnected production units, which will imply that the
raw materials, components, and semi-finished products require greater mobility, be
perfectly synchronized and guaranteed, participating in global supply networks and
intra-industry trade. On the other hand, the life cycles of products in international
markets tend to be continuously reduced and variations in their demands are increas-
ingly difficult to estimate, so it is crucial to have greater connectivity and integration
between the final and initial links of the global supply chains, as well as a greater
capacity for the aggregation of data and automatic estimation, rigorous and real-time
estimation of the different demands, with expert systems and artificial intelligence
that assist the decision-making processes [9]. For all this, the new logistics 4.0 will
involve the optimization and full connection of all elements and processes of the sup-
ply chain, which should generate improvements in the efficiency and effectiveness
of the management of orders and shipments, a production oriented to the individ-
ual customer which increasingly demands more personalized offers, the geolocation
of customers, the simultaneous multimodal omnichannel, and the optimization of
global routes, a full capacity for adaptation, the total international traceability of
merchandise, the reduction of stock and space necessary for storage, automation
of payments, etc. Smart logistics will not only better meet new demands, but will
also more accurately locate and thoroughly know current and potential customers
through the processing and interpretation of the data collected and the optimization
of processes. Integration, holistic vision, coherence, innovation, and flexibility are
the key concepts to support the development of the new logistics 4.0.
Finally, it is considered necessary to emphasize that the digital transformation
and the emergence of Industry 4.0 and logistics 4.0, beyond the technological devel-
opments and their deployment, and the reinvention of strategy, organization and
corporate culture, requires, on the one hand, the development of a new holistic style
of a humanitarian leadership, but also, on the other, the availability of a permanent
digital leadership capacity that achieves the most critical element for the success of
the analyzed evolution to be collaborate and be fully involved: This is the human
factor.
The Transformation of the Defense and Security Sector … 299
In order to know the state of involvement and development regarding the digital
transformation in the companies of the defense and security industry in Spain, a
qualitative research has been carried out to the main ones that accounted for approx-
imately 85% of sales in 2016 of this sector (according to the Industrial of Defense
Report of the Spanish MoD), all of them with European implantation and global pro-
jection (Airbus Defense and Space, Airbus Military, Indra Systems, Navantia, ITP
Turboprop Industry, Expal Systems, Airbus Helicopters Spain, Cepsa, Iveco Spain,
Santa Bárbara Sistemas, Naval Constructions P. Freire, Spanish Company of Aero-
nautical Systems, ARPA, etc.). The study has been complemented with the vision
of the two associations that bring together most of the companies of the sector in
Spain: the Spanish Association of Technology Companies of Defense, Aeronautics
and Space (TEDAE), and the Association of Companies that contracting with the
Public Sector and especially with the Armed and Security Forces (AESMIDE).
The results show that almost all companies consider that digital disruption implies
opportunities for improvement in the efficiency, quality, and flexibility of processes,
which will produce the potential increase in operating profits. The defense and secu-
rity industry is facing a new global context that poses major strategic and structural
challenges, against which practically all have proactively raised lines of action.
However, the analysis as to the levels of initiative and implementation of these
lines of action, in regard to the armed forces and police forces which are customers
of these companies, both nationally and internationally, denotes a reactive attitude.
They are aware of the implications that the digital transformation will have on their
operation levels and sustainability of their systems, but this has not translated into
decided and effective action plans, possibly due to the lack of funding to address
them.
In short, the probable existence of a gap in the reactive adaptation in the armed
and police forces to the new logistics 4.0 is detected in relation to its proactive
implementation by the main companies of the defense and security industry, with a
delay and desynchronization that predictably will tend to grow due to the exponential
technological evolution.
300 M. A. Fernández-Villacañas Marín
a different way, through a new frontier of relationship between the public sector and
the private sector. The trend toward its use has been generalized in recent years as a
management model for large projects, particularly in the innovation and high tech-
nology sectors, in internationalization initiatives and, in general, in all those in which
it is necessary to guarantee high levels of competitiveness in advance. It is concep-
tualized as an economic-organizational model of dynamic and plural relationship,
which groups a wide range of figures that maintain a link in time between two or more
public and private organizations. It signifies a new conception by means of which
a transition of a relationship between administration and industry of competitive
character which is generated to another one of collaborative character.
On the other hand, the application of public–private cooperation in the defense and
security sector entails a change of philosophy and mentality in the bodies involved
in the public administration that will go on to manage certain essential services
through a strategic partnership with private companies, assuming these shared risks
and responsibilities with the armed forces and police forces. The advantages for both
parties of the application of these models of public–private cooperation are clear.
It can mean higher levels of rationalization and efficiency for the armed forces and
police forces, as well as important savings via, among other factors, the reduction
of military and police personnel and the technical assistance involved, as well as
the reduction of costs of investment in facilities and equipment (avoiding duplicated
expenses, heavy investments in spare parts stocks that must be maintained during
long life cycles of the systems, reducing the costs of continuous training, technical
documentation and its corresponding update, etc.). On the other, the defense and
security industry can obtain a new field of business development induced by the
greater investment capacity derived from public savings, addressing the development
of new defense and security systems that will make the strengthening of the industrial
base and technology of that sector feasible.
Moreover, and perhaps most significantly, the functioning of the public–private co-
management models implies the permanent and bidirectional transfer of knowledge
between the public and private sectors, as well as the adaptation and the dynamic
and permanent adjustment to major changes, that the exponential digital evolution
will imply that “unique entity” formed by the agencies involved in the armed and
police forces with the companies participating in the defense and security industry,
in a contemporary way.
As a development of these models, the Spanish Air Force carried out the FENIX
Project at the end of the previous decade. It was a series of applied research stud-
ies to improve the operational efficiency and profitability of surplus capacities of
its Aerospace Maintenance Centers MRO (Maestranzas Aéreas) through the imple-
mentation of public–private cooperation models with the aerospace industry. The aim
was to achieve improvements in the level of generation of air support services, with
the lowest possible cost and risk. Previously, an international benchmarking study
of the solutions applied by the air forces of the USA, the UK, France, Germany, and
Italy was carried out [6, 7].
302 M. A. Fernández-Villacañas Marín
5 Conclusions
The work carried out in this paper has first of all analyzed the logistical needs of
development and maintenance regarding weapon systems and support material for
both the military and police. Nowadays, they are based on technology and logis-
tics capacity. In this sense, the new logistics have experienced a great catalyze with
the digital transformation, which requires a complete organizational, cultural, and
strategic reinvention of both the armed and police forces and the defense and secu-
rity industry. Secondly, the qualitative research conducted has detected a gap in the
reactive adaptation of the armed and police forces to the new logistics 4.0, in relation
to its proactive implementation by the main companies of this sector. In order to
reduce this gap, the implementation of public–private cooperation models, in addi-
tion to involving advantages in the improvement of military and police efficiency,
and business development for the industrial sector, will involve the permanent and
bidirectional transfer of knowledge among the structures involved, as well as the
adaptation and permanent dynamic adjustment to the vast changes that the exponen-
tial digital evolution will imply.
References
1. Carter, C.R., Rogers, D.S.: A framework of sustainable chain management: moving toward
new theory. Int. J. Phys. Distrib. Logist. Manag. 38(5) (Emerald Group Publishing Limited)
(2008)
2. Fernández-Villacañas, M.A.: Externalización del Sostenimiento, Revista de Aeronáutica y
Astronáutica. Spanish Air Force, Madrid (2007)
3. Fernández-Villacañas, M.A.: Externalización estratégica Vs. Externalización operativa: Desar-
rollos potenciales del modelo de Partenariado Público-Privado (PPP) para el sostenimiento de
Armamento y Material de las Fuerzas Armadas. Universidad Comercial de Deusto, Bilbao,
Spain, 28th and 29th Feb 2008
4. Fernández-Villacañas, M.A.: El outsourcing estratégico como modelo de integración de las
cadenas de suministro para una logística sustentable. V Fórum Mundial de Logística, Monter-
rey, México, 6th and 7th Mar 2008
5. Fernández-Villacañas, M.A.: Reflexiones en torno al logro de una Logística Global Sostenible.
V Congreso Internacional ACOLOG - Asociación Colombiana de Logística, Bogotá, Colom-
bia, 28–30 Aug 2008
6. Fernández-Villacañas, M.A.: Modelos de cooperación industrial para el sostenimiento de arma-
mento y material: El Partenariado público-privado y la rentabilización de capacidades exce-
dentes. In: Different authors (eds.) Gobierno en la Industria de Defensa, Aula Abierta y Foro
de Estudios de Seguridad y Defensa, Universidad Politécnica de Cartagena, Cartagena, Spain
(2009)
7. Fernández-Villacañas, M.A.: Cooperación industrial público-privada para el sostenimiento
profundo de las aeronaves del Ejército del Aire y la rentabilización de capacidades excedentes.
5º Congreso Español de Mantenimiento y 16º Congreso Iberoamericano de Mantenimiento,
Asociación Española de Mantenimiento, Barcelona, Spain, 15–17 Nov 2011
8. Fernández-Villacañas, M.A.: La Nueva Economía de la Defensa en un Nuevo Orden Mundial.
Revista de Aeronáutica y Astronáutica. Spanish Air Force, Madrid, Spain (2017)
9. Fernández-Villacañas, M.A.: Las plataformas logística 4.0 y la mejora del comercio global:
Creando ventaja competitiva logística y desarrollo sostenible. VI Simposio Internacional Online
The Transformation of the Defense and Security Sector … 303
de Logística y Competitividad, High Logistics Simposios, Medellín, Colombia, 3rd and 4th
Oct 2018
10. García Arnaiz, J: Discurso de Inauguración del Jefe de Estado Mayor de las Jornadas Aeroes-
paciales de Economía de la Defensa del Ejército del Aire “La Nueva Economía de la Defensa
en un Nuevo Orden Mundial”. ACGEA y UNED, Madrid, Spain, 7–9 Mar 2017
11. Gidrón, G.: Nuevos modelos de gestión empresarial: El outsourcing de procesos de negocios.
Círculo de Empresarios, Madrid, Spain (1998)
12. Más Sabaté, J.: Gestión privada de servicios públicos. La externalización (outsourcing) en la
Administración Pública. V Congreso Internacional del CLAD sobre la reforma del Estado y
de la Administración Pública, Dominican Republic, 24–27 Oct 2000
13. Montreuil, B., Meller, R.D., Ballot, E.: Towards a physical internet: the impact on logistics
facilities and material handling systems design and innovation. In: Gue, K. (ed.) Progress in
Material Handling Research. Material Handling Industry of America, USA (2010)
14. Montreuil, B.: Toward a physical internet: meeting the global logistics sustainability grand
challenge. Logist. Res. 3(2–3), 71–87 (2011)
15. Romero Garat, F.P.: Adaptación de la Defensa y las Fuerzas Armadas al concepto industria
4.0 (1 y 2). Infodefensa.com homepage, http://www.infodefensa.com/es/2018/01/29/opinion-
adaptacion-defensa-fuerzas-armadas-concepto-industria.php, http://www.infodefensa.com/
es/2018/02/01/opinion-adaptacion-defensa-fuerzas-armadas-concepto-industria.php. Last
accessed 27 Dec 2018
Part IX
Safety and Maritime Protection
An Autonomous Airship Swarm
for Maritime Patrol
Constantino G. Ribeiro, Luciano Santos Constantin Raptopoulos
and Max Suell Dutra
Abstract The studies of swarm of unmanned aerial vehicles (UAVs) have been
increasing, and swarm of UAVs can become part of many daily tasks. But, as mat-
ter of fact, even the use of a UAV does not mean the decreasing of operational
complexities and, consequently, the costs of performing its tasks, because of high
costs of trained operators and remote control facilities to operate state-of-the-art
UAVs. So, in order to support the operation of swarm, this work proposes a paral-
lel/distributed framework to control mission of each UAV. These unmanned crafts
will less dependent on remote control facilities. Embedding the mission control run-
ning in an embedded parallel/distributed computer system will be able to carry on
basic mission control tasks. In order to prove this concept, the following items were
developed: (i) a prototype of an embedded parallel/distributed computer cluster using
low-cost components; (ii) new procedures to resolve navigation and collision evasion
issues; and (iii) a parallel/distributed path discover program. The tests carried out in
the embedded parallel/distributed computer cluster prototype and with new evasion
procedures proved the viability of proposed framework.
C. G. Ribeiro (B)
CEFET-RJ, UnED Itaguaí, Rodovia Mário Covas, lote J2, quadra J, CEP: 23810-000, Distrito
Industrial de Itaguaí, Rio de Janeiro, Brazil
e-mail: constantino.ribeiro@cefet-rj.br
L. S. C. Raptopoulos
UnED Nova Iguaçu, Estrada de Adrianópolis, 1317, CEP: 26041-271, Nova Iguaçu, Rio de
Janeiro, Brazil
e-mail: luciano.raptopoulos@cefet-rj.br
M. S. Dutra
COPPE - UFRJ, Centro de Tecnologia, bloco G, salas 202/203/204, Universidade Federal do Rio
de Janeiro, Cidade Universitária - Ilha do Fundão, Caixa Postal 68.503, CEP: 21945-970, Rio de
Janeiro, Brazil
e-mail: max@mecanica.coppe.ufrj.br
1 Introduction
There is a set of long-range aircrafts tasks, many of them performed over in sensitive
geographic places, that demand specialized equipment and well-trained crew. The
examples of these tasks are surveillance [1], patrol [2], data collection, search, and
rescue. These tasks are being substituted by drones, which eliminate crew fatigue and
improve performance. Although there have been many improvements in electronics,
robotics, and computing, the costs of using the so-called drones, especially in defense
and surveillance, have increased a lot as stated in Table 1.
The cost of using drones is high because they need a staff working in remote control
station. So, motivated by a scenario of new applications for autonomous unmanned
aerial vehicles (UAV), especially using airships, this work proposes a swarm of
UAVs (airships) to perform maritime surveillance/patrol. In this propose, a new UAV
mission control framework was developed. This framework is composed of a low-cost
embedded computer cluster; a new autonomous collision evasion system; a new on fly
parallel/distributed mission route generating system; and a set of instruments/sensors
for UAV orientation (GPS, electronic compass, accelerometers, among others).
2 Related Work
Vehicles path planning is one of the most studied subjects. It is considered a com-
putational complex problem or with exponential time for their resolution. In this
section, the most relevant and related works to this subject will be briefly described.
Reference [3] proposes an infinity or achievable horizon optimization method
to unknown environments. The work is based on a finite optimization time and is
dependent on computational performance of the used equipment. It uses a finite state
model of the movement of a mini robotic helicopter vehicle. The proposed work uses
cost function called tail discharge or path horizon.
mental disturbance; with wind and weak environmental disturbance; and with wind
and strong environmental disturbance.
Airships were extensively used during World War II by the US Navy in coastal
patrol operations and escort of sea trains [11]. These operations were carried out
satisfactorily for escort of sea trains by Goodyear type K airship. Goodyear built 170
type K airships which served on four continents, escorting 89,000 ships. None of the
escorted ships were lost in combat [11] (Fig. 1).
Today, there is a set of applications that demand long periods of use, stealth ability,
low cost, and reliability of the platform to be used. A good example of these tasks is
anti-submarine warfare (Fig. 2).
η = [ p, θ ]T (1)
= [ p, q, r ]T (6)
τ = [ f, m]T (7)
f = [X, Y, Z ]T (8)
m = [K , M, N ]T (9)
The airship position is described in relation to inertial coordinates and its speed by
a body fixed referential. The η vector (1) has the referential coordinates in a specific
referential and v vector (4) the speed related to inertial referential. So, the relation
among variables of each referential where one referential is passed to each other [10]
can be described by:
ṗ = R(θ )V (10)
where R(θ ) is the transformation matrix with rotations and translations to right refer-
ential. And after the appropriated transformations, you can use the Jacobean matrix
notation (11) and (12) to describe the UAV kinematics.
ṗ R(θ ) 03×3 V
η̇ = J (n)v (11) ↔ = (12)
θ̇ 03×3 T (θ )
The blimp dynamics, described in [15, 16, 17, 14], takes into account many data
about the effects of aerodynamics, structural issues, actuators, and propulsions. Using
Newton and Lagrange laws (forces and momentum applied to rigid bodies) [18]:
where
M = M RB + M A rigid body system inertia matrix (with added masses).
C(v) = C RB + C A (v) coriolis force matrix and centripetal force matrix (with added
masses).
D(v) aerodynamic dumping matrix.
g(η) gravitational forces and momentum and static sustentation
vector.
τ control data vector.
The complete development of proposed airship (with dimensions, mass, and other
parameters) can be found in [15], as well the specific control system using computed
torque.
The Beowulf-based computer cluster [19, 16] is a reliable and easy way to construct
a high-performance computer facility. It can provide a lot of benefits as, for example,
free parallel/distributed programing environment and high-performance programing
tools. This work proposes an embedded computer cluster made from low cost and
market (high-performance multicore board used in last generation cellular phones).
These boards are connected by a switch, and cluster main node will be connected
with Arduino [17] or similar interface to control airship movements and to radio
link connect the cluster to the mission supervision center (see basic computer cluster
layout in Fig. 3).
The speed of route calculations on fly is crucial to make the framework reliable
and effective. A brand-new platform is used as cluster nodes: four ODROID-x2 open
development platform, based on Exynos 4412 Prime 1.7 GHz ARM Cortex-A9 Quad
Core with 2 GB memory and two and 2 e ODROID-C1 [14, 20, 21, 22]. The cluster
will supply the airship with enough computer power to generate its routes on fly as
it needs, and it will run a new, vivid, and specific obstacle collision detection and
avoidance system. The main path generator task must have performed by a graph
path discover program. The Traveler Salesman (TS) algorithm was chosen to perform
it. A version of TS program was modified to be executed in a parallel/distributed
programing environment; using message passing interface (MPI) library, it can be
executed in the proposed embedded computer cluster. The parallel/distributed TS
314 C. G. Ribeiro et al.
The path mission control system (PMCS) uses a set of pre-selected coordinates
to be reached by the proposed autonomous managed blimp. The set is used by
the parallel/distributed TS module of the PMCS to establish an optimal route to
complete the mission. During the execution of planned route, the laser detection and
ranging (LIDAR) [23, 24] and normal radar are used to scan possible unpredicted
and unexpected obstacles. As soon as an obstacle is detected, it is analyzed and the
proper avoidance procedures are taken. Figure 4 shows the flowchart of path mission
control system.
An Autonomous Airship Swarm for Maritime Patrol 315
The evasion of fixed obstacles uses fallow the wall procedure [25] using LIDAR
data to decide which side to turn and contour the fixed obstacle as a wall. A new
and innovative procedure to detect mobile obstacles is proposed using data from
LIDAR and COLREGS 72 (Convention on the International Regulations for Pre-
venting Collisions at Sea) [26] navigation rules for cross routes to avoid possible
collision situations. The reason to use navigation rules is because the airship has
similar behavior (dynamic forces) of a ship, and as COLREGS 72 rules are widely
used and tested in control ship and their movements and routes, they must work well
with the path control of blimps. Figure 5 shows the flowchart of new procedure to
detect mobile obstacles.
A basic set of sensors is necessary to support airship autonomous operation. The basic
sensors are electronic compass, speed sensor, wind speed sensor, accelerometer,
altimeter, frontal radar, LIDAR with 10 km of range and 90° of aperture, GPS,
An Autonomous Airship Swarm for Maritime Patrol 317
Fig. 6 Prototype of
embedded computer cluster
electronic gyroscopic, six ultrasonic close-range sensors, and four digital cameras.
These should be basic and always present sensors that will supply data for airship
navigation and attitude procedures. Depending on the kind of mission, some extra and
specific equipment will be necessary such as night vision high-resolution cameras,
electronic surveillance devices for law and enforcement and patrolling tasks.
The embedded computer cluster is the core of this propose, so a proof of concept
was carried on. A prototype of an embedded computer cluster with six nodes (see
Fig. 6) was constructed, and performance and fault tolerance were conducted using
prototype parallel/distributed programs.
The basic speed up test was to execute a sequential version of TS program (devel-
oped in C language) for: 8, 16, 32, 64, and 128 targets and then to execute a paral-
lel/distributed version of TS program (developed in C language with message passag-
ing interface—MPI—library) for the same set of targets and compare the execution
time (see Fig. 7).
In these tests, all prototype programs for mission control were executed. During the
execution of all mission control programs, the processor parameters (CPU, memory,
318 C. G. Ribeiro et al.
network usage) of a single processor environment and the same parameters for the
embedded computer cluster were compared (see Figs. 8 and 9).
Another test was a fault tolerance test where the parameters (CPU, memory,
network usage) were compared for the complete cluster (with six nodes—left side of
An Autonomous Airship Swarm for Maritime Patrol 319
the figure) and a damaged cluster with less one node (with three nodes—right side
of the figure) (see Fig. 10).
6 Conclusions
References
1. Defense Industry Daily staff: JLENS: Coordinating Cruise Missile Defense – And More,
30 December 2012. http://www.defenseindustrydaily.com/jlens-coordinating-cruise-missile-
defense-and-more-02921/ (2012)
2. Corporation, A.P.: Aerial Products, 28 December 2012. http://www.aerialproducts.com/
surveillance-systems/aerial-surveillance.html (2008)
3. Dadkhah, N., Korukanti, V.R., Kong, Z., Mettler, B.: Experimental demonstration of an online
trajectory optimization scheme using approximate spatial value functions. In: Proceedings of
the 48th IEEE Conference on Decision and Control, pp. 2978–2983 (2009)
4. Saiki, H., Fukao, T., Urakubo, T., Khno, T.: Hovering control of outdoor blimp robots based
on path following. In: 2010 IEEE International Conference on Control Applications (CCA),
pp. 2124–2129 (2010)
5. Mettler, B., Kong, Z.: Receding horizon trajectory optimization with a finite-state value function
approximation. In: Proceeding of 2008 American Control Conference, Seattle, Washington,
pp. 3810–3816 (2008)
6. González, P., Burgard, W., Sanz, R., Fernadez, J.L.: Developing a low-cost autonomous indoor
blimp. J. Phys. Agents 3(1), 43–51 (2009)
7. Fukao, T., et al.: Inverse optimal velocity field control of an outdoor blimp robot. In: Proceedings
of the 17th World Congress the International Federation of Automatic Control, Seoul, Korea,
pp. 4374–4379 (2008)
8. Rottmann, A., Plagemann, C., Hilgers, P., Burgard, W.: Autonomous blimp control using model-
free reinforcement learning in a continuous state and action space. In: Proceeding of Interna-
tional Conference on Intelligent Robots and Systems, IROS 2007, pp. 1895–1900 (2007)
9. Gammon, S.M., Fryr, M.T., Qian, C.: The mathematical model of the tri-turbofan airship for
autonomous formation control research. In: IEEE Region 5 Technical, Professional, and Student
Conference, San Antonio, Texas (2006)
320 C. G. Ribeiro et al.
10. Azinheira, J.R., et al.: Visual servo control for the hovering of an outdoor robotic airship. In:
Proceedings of the 2002 IEEE International Conference on Robotics & Automation, Washing-
ton, DC, pp. 2787–2792 (2002)
11. Machry, C.R.: As Potencialidades de Emprego dos Dirigíveis no Transporte de Carga. Reista
da UNIFA (2003)
12. Navarro, I., Matía, F.: An introduction to swarm robotics. ISRN Robot. 2013, Article ID 608164.
http://dx.doi.org/10.5402/2013/608164 (2013)
13. Fossen, T.I.: Guidance and Control of Ocean Vehicles. Wiley, West Susses, England (1994)
14. Hardkernel Co., Ltd.: Products, 24 January 2013. http://www.hardkernel.com/renewal_2011/
products/prdt_info.php (2013)
15. Ribeiro, C.G., et al.: A platform for autonomous path control of unmanned airship. J. Braz.
Soc. Mech. Sci. Eng. (2017). https://doi.org/10.1007/s40430-017-0891-9. ISSN 1678-5878,
Rio de Janeiro, Brazil
16. Becker, D.J., Sterling, T.: Beowulf: a parallel workstation for scientific computation. In: Pro-
ceedings of the International Conference on Parallel Processing (1995)
17. ARDUINO: Arduino, 25 March 2013. http://www.arduino.cc/ (2013)
18. Fossen, T.I.: Marine control systems, guidance, navigation, and control of ships, rigs and
underwater vehicles. In: Marine Cybernetics, Trondheim, Norway (2002). ISBN 82-92356-
00-2
19. Reschke, C., Sterling, T., Ridge, D.: A design study of alternative network topologies for the
Beowulf parallel workstations. In: Proceedings of the IEEE International Symposium on High
Performance Distributed Computing (1996)
20. Ralph, N.: Odroid-x development board brings quad-core Exynos 4 Quad processor to budding
Android hackers for $129, 24 January 2013. http://www.theverge.com/2012/7/13/3156032/
odroid-x-development-board-exynos-4412-quad (2012)
21. Larabel, M.: Quad-Core ODROID-X Battles NVIDIA Tegra 3, 24 January 2013. http://www.
phoronix.com/scan.php?page=article&item=samsung_odroidx&num=1 (2012)
22. redOrbit Staff & Wire Reports - Your Universe Online: Miniature Quad-Core Computer
For Under $130, 24 January 2013. http://www.redorbit.com/news/technology/1112656695/
miniature-quad-core-computer-for-under-130/ (2012)
23. Lidar USA 3D Documentation and Beyond: Lidar USA 3D Documentation and Beyond. http://
www.lidarusa.com/page.php?cat=3, 7 July 2013 (15 de December de 2013)
24. Texas Instruments: LIDAR System Design for Automotive/Industrial/Military Applications,
SIGNAL PATH designer SM. Tips, tricks, and techniques from the analog signal-path experts
Texas Instruments, Literature Number: SNAA 123 (2013)
25. i Badia, S.B., Pyk, P., Verschure, P.F.: A biologically inspired flight control system for a
blimp-based UAV. In: Proceedings of the 2005 IEEE International Conference on Robotics
and Automation, pp. 3053–3059 (2005)
26. U.S. Department of Homeland Security: NAVIGATION RULES ONLINE, 24 January 2013.
http://www.navcen.uscg.gov/?pageName=navRulesContent (2013)
Assessing the Location of Search
and Rescue Stations on the Portuguese
Coast
1 Introduction
The ocean is a development factor that makes possible different traditional and emerg-
ing economic activities, such as fishing, shipping transportation, tourism, and recre-
ative sailing, among others. Accidents caused by maritime activities result in heavy
losses of human lives every year; hence, the need to effectively prevent and respond
to emergencies at sea. Following a maritime accident, response time is critical, as the
delay of a rescue is often a factor that makes the difference between life and death
[1].
The first edition of the SOLAS Convention, in 1914, established a set of responsi-
bilities related to safety at sea, with an emphasis on safety standards and obligations
of shipowners and crews. Later, when many coastal countries already had services
for the rescue of castaways, the Convention on the High Seas, in 1958 at Geneva,
assigned greater responsibility to coastal countries on safety of ships crossing waters
under their jurisdiction, especially near the coastal line, due to the higher propensity
to the occurrence of maritime accidents and, not infrequently, given the greater dif-
ficulty usually found to give help. Therefore, more maritime safety responsibilities
have been assigned to maritime countries, in particular on safeguard human life at
sea.
Nowadays, more than one hundred countries have ratified the Search and Rescue
(SAR) Convention of 1979, in particular, almost all coastal countries, accepted their
responsibilities regarding the international maritime community. However, it was the
SAR Convention, established since 1985, which structured the international organi-
zation for maritime search and rescue. As a result of the convention, the oceans were
divided into regions (Search and Rescue Regions—SRR). For the coastal countries,
new responsibilities were assigned regarding the coordination of maritime safety
actions in their waters (see Fig. 1a). This responsibility entails the existence of emer-
gency service at sea, with immediate readiness (24 h a day), able to respond to all
kinds of accidents related to the endanger of human life at sea. The size of the regions
was defined according to the capacity of response of coastal countries to distress calls.
Portugal is a country on the periphery of Europe with an extensive maritime area,
resulting from the continental coastlines and the archipelagos of Madeira and the
Azores. The maritime space under sovereignty or jurisdiction of the country includes
regions with responsibility for maritime search and rescue (see Fig. 1b), which are
crossed by intense maritime, commercial, and recreative traffic (see Fig. 1c).
As one of the signatories of the SAR Convention, Portugal has an accident
response system at sea to assist ships in distress in the maritime areas of the con-
tinent and the North Atlantic. The execution of this mission is carried out by a
national maritime search and rescue service, responsible for responding to the emer-
gency from ships or vessels, in the areas of national responsibility. The search and
rescue actions are addressed to one of the two centers responsible for coordinating
the two Portuguese SRR: (1) the Maritime Rescue Coordination Center (MRCC)
Lisbon—supported by the Maritime Rescue Sub-Center (MRSC) Funchal, respon-
sible for SRR Lisbon, which covers the coast of the continent and the archipelago of
Assessing the Location of Search and Rescue Stations … 323
Fig. 1 a SRRs around the world (Source IMO); b Portuguese SRRs superimposed on maritime
spaces under Portuguese sovereignty or jurisdiction; and c heat map of maritime traffic density in
Portuguese SRRs in the year 2017 (Source Marine Traffic)
Madeira and (2) the MRCC Delgada, which has under its jurisdiction the SRR Santa
Maria, in the North Atlantic.
Important infrastructures, to support of SAR actions, are life-saving stations
(LSS), located along the coast. These means carry out annually numerous actions of
maritime search and rescue and relief to castaways, as happened in 2017, the year in
which there were recorded 164 accidents with vessels into the two Portuguese SRR.
The proper location of these resources of the national maritime search and rescue
system is, therefore, an important factor in the effectiveness of SAR missions.
The objective of the present work is to assess the adequacy of the configuration
of the life-saving stations on the Portuguese coast, given the historical occurrence
of maritime accidents in the SRRs under Portuguese responsibility. The article was
developed in five sections. In this section, the motivation of study was presented. The
second section presents a literature survey on maritime SAR studies. The third section
characterizes the profile of the maritime accidents and the maritime rescue stations
on the Portuguese coast. The assessment of the location adequacy of the set of LSS,
compared to the registry of marine accidents, is carried out in the fourth section, as
well as the elicitation of the requirements for a decision support system for maritime
SAR activity, to be developed. In the last section, we present the conclusions of the
work carried out, as well as the future work.
324 A. Correia et al.
2 Literature Review
Plenty of location studies regarding maritime SAR have been carried out to determine
or optimize the location of infrastructures or resources of the emergency services.
Basdemir conducted a study, in 2004, for the Turkish Air Force [2] with the pur-
pose of distributing new SAR facilities across the Western Mediterranean region and
the Aegean Sea. With this purpose, he used the Maximal Coverage Location Prob-
lem (MCLP) model to define the locations for the required number of SAR stations,
in order to obtain full coverage of the accident zones considering the operational
capabilities of SAR units, in this case, helicopters.
In another work, Afshartous et al., studied the best location for United States
Coast Guard air stations (USCG), in Miami, to respond more adequately to emer-
gency calls [1]. A simulation/optimization methodology was used which, based on
real emergency call data, simulated the variation of the location and occurrence of
emergency calls, in space and time. Later on, by using the pUncapacitaded Facility
Location Problem (p-UFLP), the pMedian Problem (p-MP) and the Uncapacitaded
Facility Location Problem (UFLP), they achieved the best location for the stations be
able to respond to emergency calls from an uncertain location. However, the model
was a simplification that considered only few criteria in the analysis.
In the 1990s, a study from Brown et al. resulted in the mixed Integer Linear Pro-
gramming (ILP) model used for plan the assignment of patrol missions to vessels, of
United States Coast Guard (USCG), in several districts [3]. The study was intended
to meet the needs of the patrol, considering the weekly maintenance schedule of
the vessels, while reducing, at the same time, the related costs. Azofra et al. pro-
posed a tool to objectively distribute the resources assigned to the maritime SAR [4].
To achieve this aim, they developed a methodology based on gravitational models.
Firstly, they applied the Zonal Distribution Model (ZDM), to determine the areas
with the highest concentration of accidents from the registry of marine accidents in
the area. Each zone was represented by a super-accident centroid. Later they defined
an Individual Distribution Model (IDM), which were able to provide the distribution
of individualized resources to the maritime rescue actions, directing those resources
to the locations of the accident, taking in account the distance to the super accident
and their range of action.
Radovilsky and Koermer built another ILP model to optimize the distribution
of small USCG vessels through existing stations in the Pacific area [5]. The main
objective of this model was to provide the best distribution of the vessels, minimiz-
ing the shortage or overload on stations’ capability, and simultaneously reduce the
operational costs. Later, Wagner and Radovilsky improved the previous work by
developing the ILP model called the Boat Allocation Tool (BAT) model, considering
as the main variable the total of annual hours available for each vessel, i.e., the hours
available until each vessel needed maintenance, instead of the number of vessels
only [6]. They also introduced risk management, considering a possible shortage of
vessels, as well as, the uncertainty in the future needs of the stations. The model also
Assessing the Location of Search and Rescue Stations … 325
considered some logistic restrictions of the USCG, such as the number and type of
vessels available per station.
Another interesting research, developed by Pelot el al., was a location study for
the Canadian Coast Guard Search and Rescue vessels in the Atlantic region in order
to ensure maximum coverage of the accidents possible to occur in the area [7].
Based on the Maximal Coverage Location Problem (MCLP), they proposed three
extensions: (1) the MCLP model, which assigned weights to different classes of
maritime accidents in order to compute the best location of the vessels to provide
the maximum coverage for the required areas; (2) the MCLP that computes the best
location of the vessels in order to allow maximum coverage by equally distributing
the workload through the stations; and (3) the MCLP which considers the uncertainty
on vessels availability. The objective of this model was to maximize the coverage
considering the probability of boats’ absent, as happens when, for example, they are
on maintenance period.
More recently, some studies with new perspectives of the localization problem
regarding the maritime SAR domain have been presented. They considered simul-
taneously multiple aspects of the problem. In this context, Razi and Karatas [8]
developed the Incident Based-Boat Allocation Model (IB-BAM), a multi-objective
model to assign vessels to maritime SAR activities in Turkey [8]. In this model,
the Analytical Hierarchy Process (AHP) was used to assign different weights to
each type of maritime incident in the area of interest. Subsequently, a ZDM was
used to determine highest probability zones for occurrence of maritime incidents.
Finally, the Multi-Objective Mixed Integer Program (moMIP) was applied to pro-
vide low response times to maritime incidents, while operating costs minimization
is imposed, as well as the compatibility between workload and available hours for
operations.
In 2017, Akbari et al. presented a couple of studies focused on the develop-
ment of structures to carry out analyzes considering multiple criteria in the location
and distribution of resources. The studies targeted the Canadian Coast Guard SAR
operations in the Atlantic region, aiming the improvement of quality service and
operational costs reduction. In the first study, they presented a multi-criteria analysis
on the performance of solutions provided by two well-known models, the MCLP and
p-Median Problem (p-MP), for the case of maritime SAR location [9]. The optimal
solution of the two models was obtained based on five decision criteria relevant for
CCG: (1) access time—criterion that evaluates the average time that the nearest ship
takes to arrive at the incident local (time spent in transit); (2) primary—criterion
that measures the percentage of incidents that must be covered within a given access
time by, at least, one vessel; (3) backup coverage—criterion that expresses the per-
centage of incidents that are within a given coverage region of at least two vessels;
(4) Gini index—criterion that is measured by the level of deviation of access time to
all accidents; and (5) Maximum access time. To model the problem, they considered
the characteristics of vessels types, the existing SAR stations, and, based on the his-
tory of maritime incidents in the area, they forecast the areas where future maritime
incidents could occur, in order to anticipate future SAR needs. Subsequently, Akbari
et al. developed a Goal Programming Multi-Objective model to optimize the location
326 A. Correia et al.
(a) (b)
(c)
Fig. 2 Distribution of the number of accidents (2011–2016): a per year, b per month, and c by
type of vessel
Fig. 3 Distribution of marine accidents between 2011 and 2016 (#791): a overall; b with fishing
boats; c with recreational boats; and d SAR actions between 2015 and 2017
328 A. Correia et al.
Fig. 4 Distribution of maritime rescue stations in the Azores, Madeira, and the Continent in 2017
Fig. 5 a Heat map of major density areas of maritime accidents, compared with the location of
life-saving stations b Maximum coverage of the lifeboats in each LSS, compared with locations of
maritime accidents
as well as the lifeboats coverage were depicted in maps (see Fig. 5), using a geographic
information system (QGIS) [12]. The produced maps were built to help perform the
spatial analysis in order to assess the current locations and the coverage of the rescue
means assigned to the life-saving stations.
The analysis of the heat map of Fig. 5a allows to conclude that most of the zones
with greater density of accidents have a life-saving station assigned. The exception
is the extreme north of the continent (Caminha), where it would be pertinent the
implantation of a life-saving station, given the difficult existing traffic in the waters
of the Minho’s river mouth. The remaining life-saving stations are located at enough
proximity of areas of higher accident density to access them in emergency situations.
In Fig. 5b, one can observe the depiction of the sea area covered by the rescue means
currently available in the life-saving stations. The depicted buffer from each one of
the life-saving station show the limits of intervention (i.e., autonomy) of the means
assigned for each LSS, which are enough to ensure the coverage of the distances for
the zones of greater density of accidents.
This work also sought for the requirements elicitation for future development of
a decision support system for maritime rescue and management of the life-saving
stations. The overall objectives, considered relevant for the system were: (a) maxi-
mization of the quality of service (measured in response time) of rescue means; (b)
minimization of operating costs; (c) minimization of the transit time/distance trav-
eled by the rescue means; and (d) minimization of the number of life-saving stations,
without compromise the fulfillment of the search and rescue mission.
In addition to the criteria currently used for stations’ location assignment, referred
at the beginning of this section, it was considered of paramount importance that the
decision support system should always prioritize the rescue of people when allocat-
ing the means for rescue. Furthermore, were also considered as requirements for the
system, the following: (a) classification of historical data on maritime accidents by
areas, envisioning future occurrence of accidents, considering assignment of weights
based on, inter alia, the type of vessels, the location, and severity of previous acci-
330 A. Correia et al.
dents; (b) counseling on the assignment of existing marine rescue means, given their
maximum speed, maximum range with maximum load, as well as operational limits
based on the sea turbulence at the rescue area; (c) minimization of the average time
to respond to an accident (considering the sum of the time elapsed from the dis-
tress call for the life-saving station, the time spent in transit and the time needed for
on-the-spot searches); (d) incorporation of meteo-oceanographic conditions at the
location and time of the accident and subsequent evolution in the search and rescue
zone; (e) real-time monitoring of risky areas for the occurrence of accidents due
to the existence of fishing communities and greater density of maritime traffic; (f)
consideration of constraints on the availability of life-saving stations means due, for
instance, to vacation period of staff, maintenance of the lifeboats or their occupancy
in another rescue mission; and (g) incorporation of seasonal factors in the analysis.
5 Conclusion
The readiness of the maritime search and rescue system, on the Portuguese coast,
is based on a set of life-saving stations of different types located and equipped
with rescue means with different capabilities. Using geospatial information, it was
assessed the degree of adequacy of the rescue stations locations regarding the actual
needs, given the history of accidents in recent years in Portuguese waters. From the
work carried out, it was concluded that the current arrangement of life-saving stations
is generally adjusted for the location of previous registered maritime accidents. There
is, however, one adjustment that must be considered, which involves the setup of an
LSS at the north of the continent, where there is a significant fishing and recreational
local community and also a significant number of accidents the sea.
The work also led to the elicitation of requirements for the development of a
decision support system to advise on how to use existing rescue means by applying
predictive techniques to the historical data collected, taking into account the technical
characteristics of the rescue means, the typology of accidents, as well as, meteo-
oceanographic conditions in the risk zones.
Acknowledgements The work was funded by the Portuguese Ministry of Defense and by the
Portuguese Navy/CINAV.
References
1. Afshartous, D., Guan, Y., Mehrotra, A.: US Coast Guard air station location with respect to
distress calls: a spatial statistics and optimization based methodology. Eur. J. Oper. Res. 196(3),
1086–1096 (2009)
2. Basdemir, M.: Locating search and rescue stations in the Aegean and Western Mediterranean
Regions of Turkey. J. Aeronauti. Space Technol. 1(3), 63–76 (2004)
Assessing the Location of Search and Rescue Stations … 331
3. Brown, G.G., Dell, R.F., Farmer, R.A.: Scheduling coast guard district cutters. Interfaces 26(2),
59–72 (1996). https://doi.org/10.1287/inte.26.2.59
4. Azofra, M., Pérez-Labajos, C.A., Blanco, B., Achútegui, J.: Optimum placement of sea rescue
resources. Saf. Sci. 45(9), 941–951 (2007)
5. Radovilsky, Z., Koermer, T.: Allocation of US Coast Guard boats utilizing integer programming.
J. Academy Business Econ. 7(2), 130–135 (2007)
6. Wagner, M.R., Radovilsky, Z.: Optimizing boat resources at the US Coast Guard: deterministic
and stochastic models. Oper. Res. 60(5), 1035–1049 (2012)
7. Pelot, R., Akbari, A., Li, L.: Vessel location modeling for maritime search and rescue. In:
Eiselt, H.A. Marianov, V. (eds). Applications of Location Analysis (2015)
8. Razi, N., Karatas, M.: A multi-objective model for locating search and rescue boats. Eur. J.
Oper. Res. 254(1), 279–293 (2016)
9. Akbari, A., Eiselt, H.A., Pelot, R.: A maritime search and rescue location analysis considering
multiple criteria, with simulated demand. INFOR: Info. Syst. Oper. Res. 56(1), 92–114 (2017).
https://doi.org/10.1080/03155986.2017.1334322
10. Akbari, A., Pelot, R., Eiselt, H.A.: A modular capacitated multi-objective model for locating
maritime search and rescue vessels. Ann. Oper. Res. 1–26 (2017)
11. PostgreSQL.: https://www.postgresql.org/. Accessed on Dec 2018
12. QGIS.: https://www.qgis.org/. Accessed on Dec 2018
Operational Scenarios Identification
and Prioritization in Systems of Systems:
A Method and an Experience Report
in the Defense Domain
Abstract Military systems play a crucial role in the defense of a country. They
are often interconnected to monitor the frontiers, increase the national sovereignty,
and interoperate to offer a unified control of the entire territory. These alliances
of systems are currently known as systems of systems (SoS). During the last years,
software has been increasingly embedded in those systems to increase their precision.
Besides, multiple cyber-physical systems have also been associated to interoperate
in the context of SoS, bringing novel challenges related to the conception of those
systems, in particular (i) how to elicit systems’ requirements and make them coexist
in the same large-scale system, (ii) how to coexist competing requirements, (iii) how
to support the distributed development of constituent systems and interoperability
links, (iv) how to capture their conceptual operation in a unified document to exploit
their functionalities in a fruitful manner, and (v) how to make the SoS cohesive,
exploiting their functionalities and creating emergent behaviors to foster the national
security. Given those gaps and challenges, this paper reports an experience of a real
project carried out in a real Department of Defense, particularly in the navy’s context,
besides externalizing a method called OSW to support the ConOps documents in SoS
engineering projects. We report the conception of a SoS for defense and maritime
surveillance, focusing on the concept of operations (ConOps) of that systems, the
challenges faced, and the method established. We claim that this report contributes
to the engineering of defense SoS since it provides a panorama of SoS conception,
besides presenting solutions that can be replicated in other projects to be carried out
worldwide, contributing thus for the advance of SoS research in that domain.
1 Introduction
1 For sake of simplicity, D-SoS and SoS will be herein used interchangeably to express both singular
and plural forms of SoS and to denote military and non-military SoS.
Operational Scenarios Identification and Prioritization … 335
2 Background
SoS result from multiple operationally and managerially independent systems (called
constituents) that work together to reach common goals. Each constituent performs
its individual mission contributing to the success of the global missions [7]. Each
different architectural arrangement that results from different combinations of con-
stituent systems is named a coalition [8]. SoS have been distinguished from single
systems by a set of characteristics, as follows [9]: (i) operational independence of
the constituent systems, since constituent systems share their resources to contribute
to the accomplishment of goals at SoS level, but also hold their local activities being
performed; (ii) managerial independence of the constituent systems, which are man-
aged by independent organizations and stakeholders (examples include army, navy,
and aeronautics managing constituents of a same D-SoS); (iii) evolutionary develop-
ment of the SoS, since the SoS evolve as a consequence of the individual evolution
of its constituents, their functions, and purposes; (iv) distribution, since constituents
interoperability is necessarily supported by a communication technology; and (v)
emergent behavior, which comprises novel functionalities obtained from the coop-
eration among constituent systems that could not be offered by a single constituent,
and that raises as a result of a coordinated interoperability among them. In particular,
missions are also an important concept, especially in D-SoS domain.
SoS are often developed under the umbrella of systems engineering (SE), an
interdisciplinary approach to enable the realization of successful system under a
broad meaning of the word [3]. Several SE processes have been proposed and adapted
by different international standard organizations for construction of SoS, including
(i) those evolved from the DoD [10], proposed in the 1970s by the US Department of
Defense, (ii) other standard systems engineering processes proposed by industry in
the 1980s, and (iii) those based on the ISO/IEC 15288 standard, which was adopted
by International Council on Systems Engineering (INCOSE) and the IEEE to form
the basis of the system-engineering handbook [11, 12]. Most of these standards and
systems engineering process are widely used in the technology industry, aerospace
and defense departments of several countries.
One of the important artifacts developed during the early phases of the systems
engineering process is SoS operational concept (ConOps). The ConOps document
describes how functionalities will be employed in an operational coalition to achieve
the missions established for SoS [13]. It is developed in parallel with the capability
objectives. Capability objectives are a statement of top-level objectives for the SoS.
They describe the capabilities needed by the user, ideally based on some definitive
or authoritative materials. The capability objectives provide a basis for translating
operational needs into high-level requirements, assessing performance to capability
objectives, and developing an architecture and solution options [13]. As the capability
objectives evolve, the ConOps should evolve in detail, as well. ConOps is used to
define the SoS requirements space to identify aspects of systems that can affect
the SoS architecture and to select performance metrics and test environments [14].
However, SE guides do not recommend which techniques should be used or adopted
336 C. E. de Barros Paes and V. V. G. Neto
to support the ConOps document in the context of SoS projects. Since (i) the scope of
SoS can cover the entire territory of a country, (ii) the teams are distributed, and (iii)
involve multiple actors, it is necessary to use a technique to identify the operational
scenarios of each set of stakeholders of each constituent involved or impacted by the
SoS. Section 4 details the technique proposed for SoS context. Next section brings
an overview of the SoS engineering project used as input to conceive and apply the
method to support the elaboration of the ConOps document for a real military SoS.
3 SisGAAz Overview
The Brazilian Navy has developed a system called SisGAAz to meet the guide-
lines of the National Defense Strategy for managing an important maritime area that
surrounds the territory and corresponds to the international areas of responsibility
for the search and rescue operations (SAR—search and rescue) and areas of spe-
cific interest that go beyond the Brazilian Jurisdictional Waters (BJW) and the SAR
area [5, 6]. SisGAAz supports navy’s activities in its constitutional allocations and
subsidiaries’ assignments, such as protecting the national frontiers and ensuring the
sovereignty. The project involves a diverse team with several professional roles such
as telecommunication engineers, systems engineering, software engineers, domain
experts, project managers, quality managers, and infrastructure technicians, totaliz-
ing around 30 people involved.
SisGAAz mission is monitoring and controlling, in an interoperable way, the
national maritime area (waters under the Brazil jurisdiction), international areas of
responsibility for the search and rescue operations, and areas of specific interest that
go beyond the previous ones, in order to contribute to the strategic mobility, repre-
sented by the ability to respond promptly to any threat, emergency, aggression, or
illegality. SisGAAz’s main purposes are: (i) information sharing and interoperabil-
ity among the institutions with interest in the sea (national and international, public
and private) and (ii) supporting network-centric operations and providing decision
support by a shared virtual environment.
SisGAAz development was partitioned into two phases: conceptualization and
development. The conceptualization phase involved the system specification and
design (operational concept and requirements), elaboration of project management
plans, and architecture design. This phase was completed in two years and it was
developed in the following four tasks: (i) project management planning; (ii) elabora-
tion of concepts of operations (ConOps); (iii) elicitation, analysis, and documentation
of system requirements; and (iv) conception and design of SoS architecture.
The development of SisGAAz follows an evolutionary approach (iterative and
incremental). Initially, a small core of functionalities is already implemented and
deployed. Subsequently, the implementation activities are performed in a way that
new functionalities are added to constituents according to the local demands of an
operational area. For example, one of the navy districts is in State 1 (the operational
area) and another one in State 2. State 1 district hosts the first constituents imple-
Operational Scenarios Identification and Prioritization … 337
mented according to the local demands. After that, the implementation will take place
in State 2. The new constituents developed there match their specific demands, and
after developed, they are joined to the first ones to form the preliminary body of the
SoS. Next, this work is iteratively carried out in other regions of the Brazil, creating
new constituents, connecting them to the others, realizing the SoS, and expanding
the SisGAAz SoS progressively.
The proposed SoS has five types of constituents, each one responsible for one of
the following assignments: logistics support, cybersecurity, intelligence, command
and control (C2), communications, and remote sensing. Logistics constituent aims to
provide support to logistics operations regarding navy’s equipment, such as acquisi-
tion and transport of material to national oceans supervision. Cybernetics constituent
provides capabilities related to SisGAAz safety and security aspects, supporting (i)
availability and assurance of confidentiality of information and services, (ii) defense
and protection of networks (internal and external), (iii) monitoring the full spec-
trum of cyber warfare operations, and (iv) safety and protection of services and
constituents that form the SisGAAz. The command and control (C2) constituents
are military systems that provide features to support planning of command opera-
tions and control of constituents in the accomplishment of the mission, playing a
type of central authority role. The communications constituents provide the techno-
logical infrastructure to integrate the various military organizations and SisGAAz
constituents. The intelligence constituent aims to support planning and execution of
operations, according to the ConOps. Finally, the remote sensing constituent pro-
vides functionality for collecting, processing, and distributing data from a variety
of sensors, new or legacy, which make up the SisGAAz and data received through
cooperation with other organizations. Each Brazilian geographic area can host a sub-
set of those types of constituents that are linked together to form the national-scale
SoS known as SisGAAz. Figure 1 illustrates the scenarios of interoperability among
Brazilian Navy’s constituents in the context of SisGAAz.
applied to drive the information collection in order to elaborate ConOps [6]. This
approach consisted in the identification of threats, critical activities and areas, and
a merging of these three sets to define priorities. That was fundamental and helped
to design the operational scenarios to which SisGAAz should respond. Based on
these operational scenarios, ConOps was specified following the IEEE standard for
information technology, the IEEE 1362 [15]. As a result, the Operational Concept
Validation Plan was produced, containing instructions to validate the ConOps. The
OSW method was structured in the following steps:
Step 1. SoS Operational Scenarios Identification and Prioritization: This step
consists in the establishment of the interactions between the critical activities
of the SoS and the threats considering the areas of action of each constituent.
Step 2. Identification of SoS Critical Activities: This step involves the identi-
fication of the activities of interest of each constituent and the targets of
monitoring and protection fulfilled by the SoS.
Step 3. Identification of threats and emergencies: This step comprises the iden-
tification of the threats in which critical activities need to be preserved by
the SoS. In addition, the main emergencies that may occur and that need to
be addressed by SoS are also identified.
Step 4. Constituent area identification: In this step, the geographical areas of
each SoS constituent are elicited. This information is important for the
elaboration of the scenarios, since it allows to identify the critical activities
carried out in each area and their respective threats and emergencies that
need to be considered.
Step 5. SoS critical activities confronting: This activity comprised the confronta-
tion of the identified critical activities with the perceived threats and emer-
Operational Scenarios Identification and Prioritization … 339
Operational scenarios were established to optimize the use of monitoring and protec-
tion resources available in the Brazilian Navy. They were elaborated by interactions
between critical activities and threats in each maritime area of interest. We present
how the OSW method steps were used to support the elaboration of the ConOps of
the SisGAAz, as follows:
Step 1. Operational scenarios identification and prioritization. During the work-
shop sessions in the SisGAAz, the SE team used an approach to identify
the operational scenarios for each naval district (ND) area. The activities
proposed by the approach allowed to delimit the operational scenarios of
each naval command. As a result, the compatible response was properly
delineated in the SisGAAz to meet the operational processes of each SoS
operational area. This approach consisted of the following four steps: (i)
identification of SoS critical activities; (ii) identification of threats and
emergencies; (iii) constituent area identification; (iv) SoS critical activ-
ities confronting; and (v) SoS operational scenario prioritization. The
combination of the previously considered elements was used to form the
scenarios of interest of each ND.
Step 2. Identification of SoS critical activities (CA). This step consisted of enu-
merating the critical activities, i.e., activities of interest in the area of
jurisdiction of the 1st ND that need monitoring and protection: (i) explo-
ration and exploitation of the oil basins (CA1); (ii) exploitation of living
resources (fishing areas) (CA2); (iii) LCM protection and security (CA3);
(iv) preservation of the environment (CA4); (v) safeguarding human life
at sea (CA5); (vi) protection of genetic heritage (CA6); (vii) protection
of scientific knowledge (CA7); (viii) protection of the submerged assets,
including the protection and inspection of the research, removal, demoli-
tion, or exploitation of buried goods belonging to third parties or to the
340 C. E. de Barros Paes and V. V. G. Neto
The conception of SoS in the defense area is a major technological challenge, not
only because of the complexity of the constituents and equipment that will be part
of it, but also because of the complexity of the environment in which it will operate.
During the systems engineering of the SisGAAz, the identification and prioritization
of the operational scenarios were of extreme importance. The task of SoS conception
that can deal with a diverse reality and its many constituents would not be possible
without first identifying the scenarios in which these constituents would be inserted.
All operational scenarios identified during the OSW were also registered in the
Operational Scenarios Report (OSR). The final version of OSR has approximately
100 pages and considers the scenarios from nine naval districts. During the design
of the SisGAAz, only the operational scenarios of the internal actors of the Brazilian
Navy were considered. These scenarios were analyzed during the elaboration of the
operational concept and helped to identify the necessary capabilities for the SisGAAz.
342 C. E. de Barros Paes and V. V. G. Neto
The operational scenarios served to establish the situations in which the SisGAAz will
act to fulfill the established mission in the operating concept document of the system.
The SisGAAz center of gravity resides in areas of concern where critical activities
occur that must be protected from threats or where there may be emergencies.
During the OSW in the SisGAAz was observed that most of the information
obtained becomes repetitive, with only a few important variations, which make up
the nuances that distinguish one operating command from another. The critical activ-
ities identification evidenced differences between the regions involved, which were
adherent with the economic vocations of each of them. However, despite this differ-
entiation, a high degree of convergence was observed regarding the understanding
of the concepts and definitions used. Regarding threats, it can be observed that most
of them were identified in a common way in all the places visited, demonstrating a
convergence of understandings on this subject. In contrast to the information about
the activities and threats, which showed a convergence between the collected data,
the comparison between the information on the areas of interest obtained from the
various operational commands was more dispersed. This heterogeneity between the
commands can be attributed to the differences between the nature and intensity of
the maritime activities developed in each region. Each operational command, with
its regional characteristics, has a more intense group of activities, concentrated in a
given area, justifying differences in the data collected.
In addition to the scenario definition information, the OSW was also used to obtain
additional information needed by the SisGAAz. This information consisted of four
groups of data: the stakeholders, the SoS requirements, the publications and legal
standards employed, and the SoS needs and characteristics identified by the users.
Finally, it is important to point out that the operational scenarios of a SoS represent
a specific conjuncture of a defined moment, that is, the operational scenarios raised
refer to a given period. If there is a very long time between scenario-gathering and
the deployment of SoS, the reality will have undergone changes that, if relevant,
could invalidate SoS operational concepts, claiming for a new application of OSW
method. Next section brings final remarks.
7 Final Remarks
This paper presented OSW, a method specially tailored to support the ConOps docu-
ments for SoS projects. Among several challenges brought by SoS to the SE projects,
the ConOps is one of them, given the distributed nature of the teams, the conflicting
requirements, the multiple constituents, institutions, and stakeholders involved, and
the operational and managerial independence of the constituents. OSW method was
applied to a real project in the context of the navy of a given country. The contribution
of this paper is twofold: One contribution comprises the OSW method itself, which
can be replicated in any SoS project developed by distributed teams, certainly adopt-
able for defense domain, but potentially extensible for application in SE projects
for SoS of other domains; the another contribution consists of the experience report
Operational Scenarios Identification and Prioritization … 343
presented according to the steps prescribed by OSW method, which provides a proof
of concept for the method (since it has been applied to a real project), and a report
that can be valuable for other teams that also intend to adopt the method.
Future work includes the application of OSW method in other SoS development
projects and its adaptation for reevaluation of SisGAAz. We expect that OSW method
can broaden the state of the art and practice in SoS engineering, consolidating the
SoS body of knowledge, enriching the collection of available techniques to be sys-
tematically applied in the development of SoS, increasing the quality of the delivered
product, and ensuring the correct operation of the system, resulting in a guarantee
of national security and sovereignty as a result of emergent behaviors obtained from
the SoS operation in the defense domain. We also hope these techniques can be
evaluated and incorporated as novel practices and approaches to SoS engineering in
forthcoming SoS development projects around the world.
References
13. Dahmann, J., Rebovich, G., Lane, J.A., Lowry, R.: System engineering artifacts for SoS. In:
2010 IEEE International Systems Conference, pp. 13–17. IEEE (2010)
14. Dahmann, J.S., Baldwin, K.J.: Understanding the current state of US defense systems of systems
and the implications for systems engineering. In: 2008 2nd Annual IEEE Systems Conference,
pp. 1–7. IEEE (2008)
15. IEEE Computer Society. Software Engineering Standards Committee., Institute of Electrical
and Electronics Engineers., IEEE-SA Standards Board.: IEEE guide for information technolo-
gy– : system definition– concept of operations (ConOps) document. Institute of Electrical and
Electronics Engineers (1998)
Science Diplomacy: Strategic Initiative
to Create a Buffer Zone in the Caribbean
Colombian Marine Protected Area
Seaflower
1 Introduction
of science, technology, and innovation policies in the foreign policy of the states.
It links the participation of scientific advisors and considers the value of scientific
evidence in international relations for informed decision-making by the state.
This study is an exploratory investigation originated from the analytical review
of the available literature on Marine Protected Areas (MPAs), and a proposal for
some governance and spatial management mechanisms in the Colombian Caribbean
Sea (2016), particularly in the Marine Protected Area (hereafter MPA) Seaflower.
Currently, this proposal is linked to the scientific diplomacy research project for the
protection of the marine environment as a contribution to the development strategy
for the archipelago of San Andrés and Providencia led by the Republic of Colombia
Navy. The purpose is to develop a strategic initiative to create a buffer zone in the
boundary of the MPA Seaflower considering the borders of the Seaflower biosphere
reserve.
The Seaflower MPA is recognized as possessing one of the highest levels of
marine biodiversity in the Caribbean region. Actually, over 72% of all-regional Cen-
tral and South American transshipments move through the southwestern Caribbean
area—wherein the Seaflower is located, a high amount of cargo, being containers
and petroleum products, the principal commodities moved through the area. These
factors are threatening the surrounding ecosystems by ship-source pollution. In con-
sequence, the Seaflower MPA requires a buffer zone to protect one of the highest
levels of marine biodiversity in the Caribbean region.
This study proposes as a research question, how science diplomacy can contribute
to create a buffer zone in the Caribbean Colombian MPA Seaflower? To answer this
question, the article is structured into five parts. The first part gives a brief introduc-
tion; the second part defines the science diplomacy and identifies its dimensions; the
third part describes international and regional scenarios that promote the sustainable
development and care of the MPAs within the framework of the United Nations Sus-
tainable Development Programme (UNEP) and the regional programs implemented
in the Wider Caribbean. As a fourth part, we describe the geographical aspects of
the MPA Seaflower highlighting the importance that this MPA represents the Wider
Caribbean Region and the threats that loom over it. The fifth part describes the three
dimensions of the SC and its possible contribution to the strategic initiative to create
a buffer zone in the Caribbean Colombian Marine Protected Area Seaflower.
2 Science Diplomacy
initiated by state and non-state actors. The result of this conjugation of efforts results
in a practice that can be called “science diplomacy” (SD) [1].
The SD is a fundamental tool for international relations; it promotes science, tech-
nology, and innovative knowledge, which includes the deployment of scientific and
career diplomatic personnel, and the insertion of these topics in the development of
the foreign policy and the new global agenda. The SC demands new contributions
and primary expertise in international relations associated with science and scien-
tific and technological development. This discipline is a response to the new global
challenges imposed by the effects of climate change, energy efficiency, biodiversity
loss, food security, the impacts of pollution, and the conservation of water resources,
among others [2].
Considering this scenario, the exercise of the foreign policy requires tools, tech-
niques, and tactics adaptable to a world that is increasingly complex in technical and
scientific terms. This has created a new role for science in the field of policy formu-
lation and diplomacy. But nevertheless, how science can contribute to foreign policy
objectives? This question had a wide debate during a two-day meeting on “New
Frontiers in Science Diplomacy,” which was hosted by the Royal Society from June
1 to 2, 2009, in partnership with the American Association for the Advancement of
Science (AAAS). The result identified three dimensions in which science diplomacy
can contribute to policy objectives as well [3]:
• Science in diplomacy: Science providing advice to inform and support foreign
policy objectives.
• Diplomacy for science: Diplomacy facilitating international scientific cooperation.
• Science for diplomacy: Scientific cooperation improving international relations.
These three dimensions can contribute to the strategic initiative to create a buffer
zone for the MPA Seaflower. The structure and programs to implement these actions
are based on the following regional structure.
At the regional level, the UN system recognizes the Caribbean Sea as one of the
most unique and complex areas of the world. Its extension is over 2.5 million km2
[4]. It is geographically and politically diverse as it embraces 44 states and territories
with over 100 maritime boundaries [5–7]. For that reason, to manage this vast area,
several initiatives have been developed. There are only two biggest environmental
protection programs concerning the entire area that today will be discussed. The first
one is the Caribbean Environment Programme (CEP), and the other is Caribbean
Large Marine Environment (CLME) project. For the purposes of this initiative, the
following section will focus on the CEP.
348 F. Ramírez-Cabrales and S. I. R. Forero
The CEP was the second UNEP established in 1982 with all its institutional com-
ponents (convention, action plan, funds, and coordination unit), building one of the
most valuable programs of the UN system. In addition to this, the CEP is recog-
nized by the countries in the region for its high commitment to the development of
environmental management initiatives [8].
The UNEP’s main goal is to reduce and tackle the degradation of environments
by marine pollution [8]. In that sense, the Caribbean is considered the second most
complex marine route worldwide. This is a consequence of the traffic through the
Panama Canal, and the increase of seaborne trade in many nearby ports in the area
due to its economic attractiveness.
Ship-source pollution is the factor that is threatening the surrounding ecosystems,
including the issue of invasive species [9]. Likewise, tourism and fisheries are the
main activities in the zone and are also sources of marine pollution. Furthermore, the
Caribbean faces several political conflicts and presents diverse economies in terms
of development, with significant influence of developed countries exerting colonial
powers and hosting many different languages [8–10].
To address all the above issues and challenges, in 1982, countries unanimously
decided to work for the adoption of a cooperative and integrated approach through a
convention for the protection and sustainable development of the Caribbean region
[6].
The Wider Caribbean Action Plan was the first step taken by CEP and countries to
start developing a binding agreement. As a result and through the commitment of the
countries involved, it was possible to move forward to the adoption of the convention
for the Wider Caribbean, which was agreed in Cartagena de Indias, Colombia, in 1983
(hereafter the Cartagena Convention). This regional treaty entered into force in 1986.
To date, 25 states have ratified it [6, 11].
The Cartagena Convention is the current binding regional environmental agree-
ment serving as an essential reference for both managers and policy-makers when
protection measures and management development of coastal and marine resources
are in place, either individually or jointly. Nevertheless, due to developing economies
surrounding the area, many issues are facing the Caribbean region. For that reason,
one of the main targets is the establishment of MPAs as a mechanism to ensure the
conservation of biodiversity, pollution reduction, education, and capacity building.
Following the adoption of the convention in 1983, two legal instruments were
subsequently adopted. The first one was the Protocol Concerning Cooperation in
Science Diplomacy: Strategic Initiative to Create a Buffer … 349
Combating Oil Spills in the Wider Caribbean Region (Oil Spills Protocol). This
protocol and the convention itself were convened simultaneously. The second is
the Protocol Concerning Specially Protected Areas and Wildlife (SPAW Protocol),
which was adopted in the early 1990s and entered into force in 2000. The latter was
the third program driven by UNEP with the aim of preserving and improving the
marine ecosystem in the region [5, 6, 11].
Currently, the SPAW Protocol has been ratified by only 16 states, including Colom-
bia. The aim is “to take necessary measures to protect, preserve and manage, in a
sustainable way, zones that require protection to safeguard their particular value and
that threaten or endanger species of flora and fauna” (Art. 3) [6, pág. 40].
To date, nine coastal states in the Wider Caribbean encompass over 32 MPAs
under the SPAW Protocol and the CEP. The marine area covered is approximately
100,000 km2 corresponding to only 4% of the all-regional sea (CAR-SPAW-RAC
2018).
Although the number of MPAs is relatively small, in 2014, the Caribbean Regional
Programme (CRP), under the umbrella of the SPAW Protocol, established the
Caribbean Challenge Project [5]. The objective is to enlarge regional MPAs up to
20% by 2020 through a sustainable governance mechanism based on cooperation
between countries for the protection of the ecosystem in the larger Caribbean [7].
Colombia is the depository country for the convention and one of the first to ratify
it. Therefore, it is making efforts to fulfill the agreement. Currently, around nine
percent of its maritime jurisdiction is protected through MPAs [12]; one of 30 the
largest in the region is the Seaflower MPA [5, 13].
4.1 Background
Colombia set, through the National Law 99/93 [21], overall targets for the MPAs
in the territory, based on the global IUCN objectives [11, 22, 23].
Moreover, the Seaflower MPA has defined its objectives with the participation of
islander communities and stakeholders based on the concept of community-based
management ([13]; De Pourcq et al. 2015) to ensure effective governance and protec-
tion of the ecosystems in the zone. Moreover, to succeed in achieving the activities
within the MPA, five core objectives were defined [24]:
1. Preservation, recovery, and long-term maintenance of species, biodiversity, ecosystems,
and other natural values including special habitats; 2. Promotion of sound management
practices to ensure long-term sustainable use of coastal and marine resources; 3. Equitable
distribution of economic and social benefits to enhance local development; 4. Protection of
rights concerning historical use; and 5. Education to promote stewardship and community
involvement in planning, and management.
Based on these, and using the EBM approach [7, 25], both the community and
authorities designed the zones within the MPA to ensure the protection of ecologi-
cally relevant areas. The zoning criteria took into consideration the ecological criteria
(Roberts et al. 2003), seeking an easy demarcation based on representativeness and
connectivity of key habitats (i.e., coral reefs, seagrass beds, algal beds, and man-
groves).
352 F. Ramírez-Cabrales and S. I. R. Forero
The MPA is divided into three administrative sections, established through Accords
021 and 025 [24], seeking a better implementation of the biosphere reserve. There-
fore, the areas are: northern (37,522 km2 ), central (12,716 km2 ), and southern
(14,780 km2 ) (Figs. 3 and 4).
Moreover, within the administrative divisions, there are five zone types for in situ
conservation and sustainable use [13, 18]:
1. No-entry (116 km2 ), preservation zones restricted only for research and monitoring activi-
ties; 2. No-take (2,214 km2 ), conservation zones that incorporate and allowing non extractive
uses; 3. Recovering and sustainable use of marine resources (2,015 km2 ), allows traditional
artisanal fishing activities, and artisanal sport fishing and all the activities allowed in the
special use, no-entry and no-take zones; 4. Special use (68 km2 ), shipping related, leisure,
and waters sports; 5. General use (60,587 km2 ), minimal restrictions apply, seeking and
maintaining the MPA objectives to promote marine conservation.
Vallega [26], UNEP [7, 20], Lopez and Krauss [27], Fanning et al. [25], Biggs
[28], and Morris [29] have described the threats and issues concerning the marine
ecosystems in the Caribbean region, and thus, they are not different for this MPA.
Moreover, today, new challenges concerning shipping activities have emerged as
acidification [37, 38], affecting the coral reefs in the Wider Caribbean Area, and
those within the Seaflower MPA.
5 Strategic Initiative
The SPAW Protocol establishes in its Article 8 that state parties may, as necessary,
“strengthen the protection of a protected area by establishing, within areas in which it
exercises sovereignty, or sovereign rights or jurisdiction, one or more buffer zones.”
For this, it sets the following guidelines:
1. If a Party intends to establish a protected area or a buffer zone contiguous to the frontier
or to the limits of the zone of national jurisdiction of another Party, the two Parties shall
consult each other with a view to reaching agreement on the measures to be taken and
shall, inter alia, examine the possibility of the establishment by the other Party of a
corresponding contiguous protected area or buffer zone or the adoption by it of any other
appropriate measures including co-operative management programmes.
2. If a Party intends to establish a protected area or a buffer zone contiguous to the frontier
or to the limits of the zone of national jurisdiction of a State that is not a Party to this
Protocol, the Party shall endeavour to work together with the competent authorities of
that State with a view to holding the consultations referred to in paragraph 1.
In this regard, countries such as Costa Rica, Jamaica, Haiti, Honduras, and
Nicaragua share the border with the Republic of Colombia, but none of them is a state
party to the SPAW Protocol. Besides, in late 2001, Nicaragua instituted proceedings
against Colombia at the International Court of Justice (ICJ), claiming rights to the
islands and maritime waters [39]. Also, Nicaragua requested to the Seabed Authority
an extension of their continental shelf with the pretension of granted in concession the
area claimed for exploration and exploitation of oil and gas, jeopardizing the marine
biodiversity, in particular, the coral reef areas. The ICJ ruled, based on customary
law, that Colombia has the sovereignty over the islands in question. However, the
ICJ decision is a disaster for the pristine marine ecosystems, dividing the integrity of
the Seaflower MPA and the biosphere reserve declared by UNESCO in early 2000
[13] and backed by many international environmental organizations such as UNEP
and GEF [40]. In consequence, political constraints and economic interest are affect-
ing and jeopardizing the protection of the marine ecosystems within the Seaflower
Biosphere Reserve and thus the MPA.
In that sense, to establish a buffer zone contiguous to the frontier of the zone
of national jurisdiction of a state that is not a party, it will be necessary to apply
science for diplomacy. This dimension can be driven by the scientific community.
The scientific community focuses on common problems beyond national borders.
Likewise, this facet is flexible and promotes the emergence of new forms of diplomacy
that require non-traditional alliances between states, sectors, and non-governmental
Science Diplomacy: Strategic Initiative to Create a Buffer … 355
Currently, the Republic of Colombia has been planning and executing scientific
research cruises in the MPA Seaflower for almost four decades since before its dec-
laration as a Biosphere Reserve (BR). These actions are part of the integral strategy
for the exercise of sovereignty in the archipelago of San Andrés and Providencia and
Santa Catalina, led from the presidency of the Republic of Colombia to strengthen the
management and conservation of the Seaflower Biosphere Reserve through knowl-
edge management and scientific evidence (contributions to Seaflower knowledge).
356 F. Ramírez-Cabrales and S. I. R. Forero
During the last four years, Colombia has made four scientific expeditions in the
BR Seaflower: Cayos de Roncador Island 2015; Cayos de Serrana Island 2016; Cayos
de Serranilla Island 2017; and Cayo Alburquerque Island. The objective is to specify
a 2015–2023 monitoring plan and standardize sampling protocols. In addition, the
objective of scientific expeditions to the BR Seaflower is to demonstrate on a scientific
basis the importance of the Seaflower Biosphere Reserve for Colombia and as a
common heritage of humanity.
This national initiative has had an impact on the epistemic community, however,
and taking into account [42] it is necessary that the foreign policy of the Colom-
bian state “…should place greater emphasis on science within their strategies, and
draw more extensively on scientific advice in the formation and delivery of policy
objectives.” Particularly issues related with the RB Sea-flower.
6 Conclusions
The MPA Seaflower is facing several threats mostly due to shipping activities as
well as political conflicts. The zoning of this large area is not enough to protect these
pristine ecosystems located there. Due to its geographical location in the southwestern
Caribbean region, surrounding the San Andres Archipelago and within the borders of
the BR Seaflower, the outer limit of this MPA links maritime borders with countries
such as Honduras, Nicaragua, Costa Rica, and Jamaica. Nevertheless, none of these
countries is a state party of the SPAW Protocol. Thus, using the SPAW Protocol as a
tool to engage these countries to protect and to preserve the marine ecosystems within
the MPA it allows the interested party to initiate a broad process of consultations with
the authorities of the adjacent countries to the maritime borders to continue protecting
this large area considered as a human heritage site.
To this end, Colombia can use and promote the three dimensions of science
diplomacy. Each of these dimensions has to be institutionalized as a guideline for the
foreign policy. This action will allow a stronger regional projection supported by the
instruments and mechanisms of the SPAW Protocol. One of the main targets is the
Scientific and Technical Advisory Committee (STAC). This is a key actor to assist
the implementation of the SPAW Protocol. Through STAC, Colombia can influence
and provide advice to the parties on the scientific and technical aspects of MPA
Seaflower. Also, Colombia can promote this kind of initiatives for the conservation
of marine biodiversity and lead the coordination at the regional level.
To achieve this goal, Colombia must establish a multidisciplinary national sci-
entific committee to integrate each of the STAC Subcommittees, particularly the
Subcommittee on Regulatory and Legal Matters for the development of laws and/or
model guides for the implementation of SPAW obligations.
In terms of strategic alliance, Panama can play an important role given its status
as a state party because its political and economic influence on shipping represents
an important neighborhood to support this initiative. Particularly, because Panama
Science Diplomacy: Strategic Initiative to Create a Buffer … 357
is one of the pioneer countries in Latin America that promotes Science Diplomacy
as a tool for the development of its foreign policy.
It is concluded that Colombian foreign policy requires more science to integrate
the value of scientific evidence in international relations that will allow to implement
this strategic initiative through SD.
References
1. Langenhove, L.V.: Global science diplomacy for multilaterlism 2.0. Sci. Diplomacy (2016)
2. Gorgone, H.R.: La Diplomacia Científico Tecnológica Como Herramienta De Internacional-
ización. Retrieved June 2017, from Repósitorio Institucional UFSC (2013, November 29):
https://repositorio.ufsc.br/handle/123456789/116162
3. The Royal Society.: New Frontiers in Science Diplomacy. Retrieved June 2018, from royalso-
ciety.org (2010): https://royalsociety.org/topics-policy/publications/
4. “The Caribbean Sea”: The Columbia Encyclopedia, 6th edn. Retrieved 11 Feb 2016, from
Encyclopedia.com: (2015) http://www.encyclopedia.com/doc/1E1-Caribbea.html
5. CEP.: The Caribbean Environment Programme—about Cartagena Convention. Retrieved 11
Feb 2016, from The Caribbean Environment Programme (2015): http://www.cep.unep.org/
6. UNEP: Convention for the Protection and Development of the Marine Environment of the
Wider Caribbean Region and its Protocols, 2nd edn. UNEP, Kingston, Jamaica (2012)
7. UNEP.: Setting a Course for Regional Seas. Retrieved 13 Mar 2016, from UNEP—Re-
gional Seas Programme (2014a): http://apps.unep.org/publications/index.php?option=com_
pub&task=download&file=011736_en
8. UNEP.: Measuring Success: Indicators for the Regional Seas Convention and Action Plans.
Retrieved 13 Mar 2016, from UNEP (2014b): http://apps.unep.org/publications/index.php?
option=com_pub&task=download&file=011400_en
9. Patrick, S., Storm, B.: Council on foreign relations. In: Brown, K., Thaler, F.F.
(eds.) Producers, & Media Strom. Retrieved 23 Jan 2016, from Global Governance
Monitor/oceans: http://www.cfr.org/global-governance/global-governance-monitor/p18985#!/
oceans?gclid=CN_QxJjLwMoCFSTecgodjDoHAw#Issue-Brief
10. Van Tatenhove, J.P.: How to turn the tide: developing legitimate marine governance arrange-
ments at the level of the regional seas. Ocean and Coastal Manage. J 71, 296–304.
Retrieved 23 Jan 2016, from (2013, January) http://www.sciencedirect.com/science/article/
pii/S0964569112003171: http://doi.org/10.1016/j.ocecoaman.2012.11.004
11. Lausche, B.: Guidelines for Protected Areas Legislation, vol. 26. IUCN, Gland, Switzerland
(2011)
12. PNNC-RUNAP.: Unique National Registry of Protected Areas—RUNAP. Retrieved 05 June
2016, from National Natural Parks of Colombia (2016): http://www.parquesnacionales.gov.
co/portal/es/sistema-nacional-de-areas-protegidas-sinap/registro-unico-nacional-de-areas-
protegias/
13. Howard, M.W.: Evaluation Report Seaflower Biosphere Reserve Implementation: The First
Five Years 2000–2005. Retrieved 2 Nov 2015, from UNESCO: http://www.unesco.org/csi/
smis/siv/Caribbean/San_actEnvEd_Seaflower2000-2005%20.pdf
14. Minambiente.: National Policy for the Integral Management of Biodiversity and its Ecosystemic
services (NPIMBES). (J. Weiskopf, Trans.) Bogotá, Colombia. Retrieved 10 Apr 2016, from
cbd.int (2011): https://www.cbd.int/doc/world/co/co-nbsap-v2-en.pdf
358 F. Ramírez-Cabrales and S. I. R. Forero
15. Minambiente.: Resolución número 107 (27 de Enero de 2005) Por el cual se declara un área
marina protegida y se dictan otras disposiciones. Retrieved 22 Nov 2015, from Ministerio
de Medio Ambiente y Desarrollo Sostenible (2005, January 27): http://www.coralina.gov.
co/coralina/rendiciondecuentas/monitoreo-plan-accion/normatividad-1/normatividad-por-
temas/areas-protegidas/238-resolucion-107-de-2005-por-la-cual-se-declara-un-area-marina-
protegida
16. Coralina-Invemar.: Atlas de la Reserva de Biósfera Seaflower. Archipiélago de San Andrés,
Providencia y Santa Catalina, vol. 28. In: Gómez-López, D., Segura-Quintero, C., Sierra-
Correa P., Garay-Tinoco, J. (eds.) Santa Marta, Colombia: Instituto de Investigaciones Marinas
y Costeras “José Benito Vives De Andréis”- INVEMAR- y Corporación para el Desarrollo
Sostenible del Archipiélago de San Andrés, Providencia y Santa Catalina –CORALINA (2012)
17. UNEP.: Seaflower Marine Protected Area—Colombia. Proposed areas for inclusion in the
SPAW list. Retrieved 11 Feb 2016, from Unite Nations Environment Program—Caribbean
Environment Program (2010, October 5): http://www.spaw-palisting.org/uploads/reports/
Report_31.pdf
18. Taylor, E., Baine, M., Killmer, A., Howard, M.: Seaflower marine protected area: governance
for sustainable development. Marine Policy 41, 57–64 (2013, January 23)
19. Murillo, I., Ortiz, R.: Analisis de los metadatos sobre proyectos de investigación científica
marina desarrollada en el area de la reserva de biosfera Seaflower. Secretaria Ejecutiva de la
Comision Colombiana del Océano- Area Asuntos Marinos y Costeros, Bogotá D.C (2013)
20. UNEP.: Wider Caribbean Region Profile. Retrieved 11 Feb 2016, from UNEP (2005): http://
www.unep.org/regionalseas/programmes/unpro/caribbean/instruments/r_profile_car.pdf
21. Alonso, D., Barbosa, H., Duque, M., Gil, I., Morales, M., Navarrete, S., … Vasquez, J.: Con-
ceptualización del Subsistema de Áreas Marinas Protegidas en Colombia. Documento de Tra-
bajo (Versión 1.0). Proyecto COL75241 Diseño e implementación de un Subsistema Nacional
de Áreas Marinas Protegidas (SAMP) en Colombia. Retrieved 06 June 2016, from INVE-
MAR (2015): http://www.invemar.org.co/documents/10182/14479/cartilla-conceptualizacion-
final-web.pdf
22. Jones, P.J.: Governing Marine Protected Areas: Resilience through Diversity. Taylor and Fran-
cis, New York (2014)
23. Speed, J.R., Levine, A.: What makes a “successful” marine protected area? The unique context
of Hawaii’s fish replenishment areas (Elsevier, Ed.) Mar. Policy 44, 196–203 (2014, September
12)
24. Coralina: Acuerdos 021 y 025 de 2005 Por medio del cual se delimita internamente el Área
Marina Protegida de la Reserva de la Biosfera Seaflower y se dictan otras disposiciones.
Retrieved 18 Feb 2016, from Registro Unico Nacional de Areas Protegidas (2005): http://
runap.parquesnacionales.gov.co/reportes/generardocadminzip/aid/838
25. Fanning, L., Mahon, R., McConney, P., Angulo, J., Burrows, F., Chakalall, B., … Toro, C.: A
large marine ecosystem governance framework. Marine Policy, 31(34), 434–443. Retrieved 19
Mar 2016, from Marine Policy (2007, July): http://www.sciencedirect.com/science/article/pii/
S0308597X07000097
26. Vallega, A.: The regional approach to the ocean, the ocean regions, and ocean regionalisation—a
post-modern dilemma. Ocean Coast. Manag. 45, 721–760 (2002)
27. Lopez, V., Krauss, U.: National and Regional Capacities and Experiences on Marine Inva-
sive Species, Including Ballast Waters, Management Programmes in the Wider Caribbean
Region—A Compilation of Current Information. United Nations Environment Programme.
CAB International Caribbean and Latin America Regional Centre (CLARC), Trinidad &
Tobago (2006)
28. Biggs, C.: Indo-Pacific Red Lionfish: Pterois Volitans, Invasion of the Western
Atlantic and Caribbean Oceans. Retrieved 23 Aug 2015, from http://www.washington.
edu (2009): http://depts.washington.edu/oldenlab/wordpress/wp-content/uploads/2013/03/
Pterois-Volitans_Biggs.pdf
Science Diplomacy: Strategic Initiative to Create a Buffer … 359
29. Morris, J.J.: Invasive Lionfish: A Guide to Control and Management, vol. 1. Gulf and Caribbean
Fisheries Institute Special Publication. Marathon, Florida, USA (2012)
30. IMO: International shipping facts and figures—information resources on trade, safety, secu-
rity, environment. Retrieved 10 July 2016, from IMO-Knowledge Centre section: Ships and
Shipping—Facts and Figures (2012 March 5): http://www.imo.org/en/KnowledgeCentre/
ShipsAndShippingFactsAndFigures/TheRoleandImportanceofInternationalShipping/
Documents/International%20Shipping%20-%20Facts%20and%20Figures.pdf
31. AGCS: Panama Canal 100 Shipping safety and future risk. Retrieved 17 Jan 2016, from
Allianz Global Corporate & Specialty (2014): http://www.agcs.allianz.com/assets/PDFs/risk%
20bulletins/Panama-Canal-100_low-res.pdf
32. UNCTAD.: Review of Maritime Transport 2015. Retrieved 10 July 2016, from UNCTAD/RMT
(2015): http://unctad.org/en/PublicationsLibrary/rmt2015_en.pdf
33. The World Bank.: Panama Canal expansion: A smart route for boosting infras-
tructure in Latin America. Retrieved 30 July 2016, from The World Bank(2016,
May 07): http://blogs.worldbank.org/voices/panama-canal-expansion-smart-route-boosting-
infrastructure-latin-america
34. Rodrigue, J.-P., Ashar, A.: Transshipment hubs in the New Panamax Era: The role of the
Caribbean. J. Transp. Geogr. 10 (2015 October 2)
35. US Department of Transportation.: Panama Canal Expansion Study_Phase I Report.
Retrieved 17 Jan 2015, from U.S. DEPARTMENT OF TRANSPORTATION MARITIME
ADMINISTRATION (2013, November 20): http://www.marad.dot.gov/wp-content/uploads/
pdf/Panama_Canal_Phase_I_Report_-_20Nov2013.pdf
36. Webster, M.: Redrawing Global Shipping Routes: The Panama Canal Gets an Upgrade.
Retrieved 17 Jan 2016, from Brown Brothers Harriman (2015, December): https://www.
bbh.com/blob/10958/f7d1d1c2fd63c146c469fb0d384b1c75/redrawing-global-shipping-
routes–the-panama-canal-gets-an-upgrade-pdf-data.pdf
37. Harrould-Kolieb, E.R., Herr, D.: Ocean acidification and climate change: synergies and chal-
lenges of addressing both under the UNFCCC. Clim. Policy J. Retrieved 22 Oct 2015 (2012,
January): http://doi.org/10.1080/14693062.2012.620788
38. Hassellöv, I.-M., Turner, D.R., Lauer, A., Corbett, J.J.: Shipping contributes to ocean acidifi-
cation. Geophys. Res. Lett. Retrieved 22 Nov 2015, (2013, June 6): http://onlinelibrary.wiley.
com/doi/10.1002/grl.50521/epdf
39. Bekker, P.: The World Court Awards Sovereignty Over Several Islands in the Caribbean
Sea to Colombia and Fixes a Single Maritime Boundary between Colombia and Nicaragua.
Retrieved from The American Society of International Law (2013, Jan 15): http://www.
peacepalacelibrary.nl/ebooks/files/354062581.pdf
40. Gorricho, J.: Global Pacebuilding II: High Time for Environmental Diplomacy in the Caribbean.
Retrieved 7 July 2016, from Governance and Development (2012, November 28): http://www.
governanceanddevelopment.com/2012/11/global-peacebuilding-ii-high-time-for.html
41. Gual, S.M., Wang, T.C., Robinson, C.R.: Science Diplomacy. Retrieved June 2018, from science
diplomacy.org (2017, March): http://www.sciencediplomacy.org/article/2017/international-
collaboration-in-connecting-scientists-policy
42. Gluckman, P.D., Turekian, V., Grimes, R.W., Kishi, T.: Science Diplomacy: A Pragmatic Per-
spective from the Inside. Retrieved 20 June 2018, from Science & Diplomacy (2017, Decem-
ber): www.sciencediplomacy.org/article/2018/pragmatic-perspective
Part X
Wearable Technology and Assistance
Devices
Quantum Well Infrared Photodetector
for the SWIR Range
1 Introduction
Infrared photodetection was for a long time dominated by the Hgx Cd1 − x Te detec-
tors, which can be easily tuned to reach any operation wavelength in the mid-infrared
range (2–20 µm), by simply varying the alloy composition [1]. Since these devices
are based on band-to-band transitions, varying the Hg content in the alloy leads to
different band gap energies and, consequently, different threshold detection wave-
2 Experimental Details
with the quantum wells (QWs) and therefore the absorption itself. The responsivity
measurements were carried out using a calibrated blackbody source.
Calculations using the split-operator method were employed to design appropriate
SLIP structures. In the simulations, the Schrödinger equation is solved for the desired
potential obtaining the eigenstates and eigenvalues. As the energies involved are
comparable to the bandgap of the material, a nonparabolic approximation is used.
The correction of these effects is considered in the effective mass of the electron,
which becomes dependent on the electron energy, rendering the calculation self-
consistent.
The calculated band structure of the previously designed SLIP structure is depicted
on the left panel of Fig. 2 [8]. In blue are the probability densities of the even parity
states, while in green are the odd parity ones. In gray are the probability densities for
the miniband states. On the right are the absorption spectra for transitions starting at
the ground (blue) and first excited (green) states, showing the possibility of operation
within the forbidden gap with such structures, since absorption from the ground state
to the third excited state gives rise to a peak at 578 meV (2.14 µm). Photocurrent
spectra for different bias voltages have been detected at 77 K for such structure at
this energy, as reproduced in Fig. 3 [8], demonstrating that, in fact, a SLIP can detect
radiation in the band 7 of the SWIR (2.105–2.155 µm). A second photocurrent peak
around 300 meV (4 µm), attributed to the optical transition between the ground state
and the miniband states, in which case the current is produced by tunneling from one
period to the subsequent one, is also observed.
Even though it has already been demonstrated that SLIPs based on III-V semicon-
ductors can reach this important wavelength range [8], it is crucial to determine up to
366 P. Pereira et al.
Fig. 2 Left panel: probability densities for the first four localized states (blue for even and green for
odd parity states) and for the miniband states (gray) superimposed on the conduction band profile
on the growth direction. Right panel: absorption spectra for transitions with the ground state (blue)
and the first excited state (green) as the initial states for the best-fit structure thicknesses Adapted
from [8]
Wavelength (m)
108 6 4 2
100
80
Photocurrent (arb. u.)
60
40
20
Fig. 3 Photocurrent as a function of bias for the investigated SLIP structure Adapted from [8]
Quantum Well Infrared Photodetector for the SWIR Range 367
Fig. 4 Photocurrent as a
function of temperature
under a +2 V bias
which temperature the device can work and its figures of merit such as responsivity,
detectivity and BLIP temperature, temperature at which the current generated due to
the background radiation equals the dark current.
Figure 4 shows the photocurrent spectra for temperatures between 80 and 160 K
at +2 V bias. It is clear that the peak at 587 meV is detected up to 160 K with an
evident raise in noise as the temperature increases. The lower energy peak around
300 meV is only observed up to 120 K most likely because carriers excited to the
miniband have the additional possibility of being thermally excited to states out of the
miniband, which do not allow current propagation, reducing the tunneling current.
Figure 5 shows the dark current versus voltage curves (I × V ) for temperatures
between 80 and 300 K in black using a heat shield with steps of 20 K. At null bias, the
dark current is of the order of pA and for +2 V bias is below nA at 80 K, increasing
to mA at room temperature. In green is the current versus voltage curve generated by
incident background radiation. From this plot, we determine the BLIP temperature
to be 120 K. The activation energy of the dark current generation mechanism can
be determined from the I × V data, building an Arrhenius plot for each different
bias. The determined activation energies are shown in Fig. 6 for biases between +
5 and −5 V. The activation energy for null bias is 295 meV, which agrees with the
energy difference between the ground state and the first miniband, indicating that
the tunneling current through the minibands is the main mechanism for dark current
generation. In order to reduce the undesirable dark current, thicker barriers between
the different superlattice periods should be implemented.
368 P. Pereira et al.
The responsivity of the SLIP, current generated per incident radiation power, as
a function of bias is depicted in Fig. 7 for temperatures between 80 and 160 K. The
highest responsivity is obtained with a +4 V bias at 120 K and is equal to 2.1 mA/W.
At the highest operating temperature, 160 K, the device provides a 2.0 mA/W respon-
sivity when the applied bias is +2 V. The relatively low responsivity is somewhat
expected, since the oscillator strength for the optical transition between ground state
and third excited state is intrinsically low, as shown in the right panel of Fig. 2.
There one can clearly see that the absorption is more than two orders of magnitude
lower than the one from the ground state to the first excited state. Figure 8 shows the
detectivity as a function of bias of the SLIP, essentially responsivity divided by the
noise, for the same temperatures. The highest detectivity of 3 × 106 Jones is achieved
under three different conditions, namely temperatures 120, 140 and 160 K with +4,
+3 and +2 V biases, respectively. This occurs because as the bias voltage increases
not only the photocurrent increases, but also the dark current and, consequently, the
noise.
Quantum Well Infrared Photodetector for the SWIR Range 369
Fig. 7 Responsivity as a
function of bias for
temperatures between 80 and
160 K
Fig. 8 Detectivity as a
function of bias for
temperatures between 80 and
160 K
4 Conclusion
Acknowledgements This work was partially supported by FAPERJ, CNPq, FINEP, CAPES and
FAPESP.
References
1. Rogalski, A.: HgCdTe infrared detector material: history, status and outlook. Rep. Prog. Phys.
68(10), 2267 (2005)
2. Shen, S.: Comparison and competition between MCT and QW structure material for use in IR
detectors. Microelectron. J. 25, 713–739 (1994)
3. Goldberg, A.C., Kennerly, S.W., Little, J.W., Shafer, T.A., Mears, C.L., Schaake, H.F., Winn,
M.L., Taylor, M., Uppal, P.N.: Comparison of HgCdTe and quantum-well infrared photodetector
dual-band focal plane arrays. Opt. Eng. 42, 30–47 (2003)
4. Downs, C., Vandervelde, T.: Progress in infrared photodetectors since 2000. Sensors 13,
5054–5098 (2013); Author, F., Author, S., Author, T.: Book title, 2nd edn. Publisher, Loca-
tion (1999)
5. Liu, H.C.: Quantum dot infrared photodetector. Optoelectron. Rev. 1, 1–6 (2003)
6. Rogalski, A.: Infrared detectors: an overview. Infrared Phys. Technol. 43, 187–210 (2002)
7. See www.landsat.usgs.gov or www.landsat.gsfc.nasa.gov
8. Guerra, L., Penello, G., Pires, M., Pinto, L., Jakomin, R., Mourão, R., Degani, M., Maialle,
M., Souza, P.: Detecting infrared radiation beyond the bandoffset with intersubband transitions.
IEEE Photonics Technol. Lett. 28, 1641–1644 (2016)
Independent Feeding of People Affected
with Osteoarthritis Through a Didactic
Robot and Visual Control
Abstract This chapter presents a work that will help in the consumption of the
food of people with osteoarthritis. In this way, the patient will avoid discomfort in
the joints of their hands. The system consists of an artificial vision algorithm and
independent feeding part. The vision algorithm allows the detection of the face,
localization, and tracking the person’s mouth. The independent feeding part consists
of a didactic robotic arm. The robotic arm takes the food from the dish. The vision
algorithm detects and tracks the face, then locates the position of the mouth. Finally,
the robotic arm delivers the food to the user. The program was developed in Python
using OpenCV and Dlib libraries. The face alignment method has an average of 94%
of effectiveness.
1 Introduction
environment so that this information can be used for its own control. An eyeinhand
system is a robot equipped with an autofocus camera.
There are many designs and constructions of self-feeding robots like Handy1,
Winsford feeder, Neater Eater, My Spoon, Meal Buddy, and Mealtime Partner Dining
System [1]. Meal Buddy [2] has three degrees of freedom in robotic arm and three
bowls. After the system scoops the food, the robotic arm scrapes the surplus food off
the spoon with the rod on the bowls. Handy1 [3] consists of a five degree of freedom
robot, a tray unit and a gripper. Handy1 allows a user to select food from any part of
the tray.
Some robots are for specific food like the design of feeding robot for Korean food
[4]. This robotic system consists of two robotic arms: One is a food transferring
robotic arm and one is a food grasping robotic arm. Moreover, some students build
robots to help with osteoarthritis in [15]. They utilized their robot models to educate
the public on osteoarthritis.
We propose a low-cost system to facilitate feeding to patients with osteoarthritis.
For this, the hardware part is represented by a robotic arm. The software part is
implemented in Python and image processing libraries.
2 Development
The Raspberry Pi 3 is a reduced-board computer. One of the great advantages is its free
use both educationally and privately. Its operating system offers an adapted version
of Debian, known as Rasbian [5]. A low-weight high-resolution camera is required
for the recognition and monitoring of the user’s mouth, so that the robotic arm has
no problems when it comes to mobilizing and being compatible with the Raspberry
Pi 3. The camera that meets the requirements of the system is the FACECAM 1000X
for its weight of 50 g, size (60 × 20 × 22 mm), resolution (1 MP, 1280 × 720, 640
× 480 pixels), and the sensor (CMOS HD 720p pixels) that make this alternative the
most convenient for this project.
The Haar Cascade function of the OpenCV library is used in face detection, which
uses pre-trained classifiers to identify faces. The front face classifier function is
used. The video input is loaded and it is transformed to grayscale mode for a better
processing of the image. Then the detection of the face is done by the detectMultiScale
function, the same as with a copy in scale of grays finds all the faces in each frame
[6].
It is not necessary to apply face detection in each frame in real-time videos. Instead,
tracking algorithms can be used because it is easier to track the face during the video.
When the person makes a movement, the detection algorithm has to return to zero
in order to detect the new position of the face; so a tracking algorithm is needed
to complement the detection algorithm. This not only improves the tracking speed
eliminating the need to redetect the face in each frame. The system also becomes
more robust for two reasons. First, it retains the facial characteristics after detecting
the face and second, it becomes more resistant to rotation and photometric changes
[7, 8].
This project is designed to track only one face (one user) because tracking more
than one face can generate errors in the control of the didactic robotic arm.
Dlib allows to track the position of an object as it moves frame by frame in a video
sequence [9].
374 A. Jiménez et al.
The Dlib correlation tracker is used to track the face. It extracts the characteristics
of the detected face, to subsequently track it. After that, a rectangle is drawn in the
area where the face has been detected (Fig. 2).
It is necessary to calculate the area of the rectangle that contains the face to know
if Haar Cascade has detected the face. If it is greater than zero, the detector works
well and initiates the tracker.
Dlib allows to track the position of an object as it moves frame by frame in a video
sequence. This correlation tracker has a bounding box to follow the object in the
video frame. Correlation trackers, as the name implies, work by correlating a set of
pixels from one frame to another [8].
The correlation tracker Dlib is used for face tracking. The same one that extracts the
characteristics of the detected face, to later track through the video sequence.
After face detection and tracking, an identifier of the geometric structure of the
face of the Dlib library is used. It is called shape_predictor_68_face_landmarks. It
is a standardized library to deliver the reference points of the face by through the
alignment in one millisecond [10]. The library delivers 68 facial points (Fig. 3),
which define the facial regions, such as the corners of the mouth, eyebrows, eyes,
nose, and mouth, using parts of a simple matrix in Python [11].
The facial alignment is performed by a set of regression trees, which consists of
taking an image in the form of a numpy matrix and returning a 68 × 2 matrix, each
row is conformed with the x, y coordinates of a common point of the facial feature in
Independent Feeding of People Affected with Osteoarthritis … 375
the input image, in other words, it contains coordinates for a particular facial feature.
In this project, points 49 through 68 are used because they contain all the information
in the mouth [12].
Y = Y − wrist Y (3)
Z = wrist Z + Z (4)
√ 2
AC = ((Y ) + (Z )2 ) (5)
tan(α) = Z /Y (6)
α = tan−1 Z /Y (7)
After we found β and γ , it is possible to determine the angles that the forearm
can turn based on Fig. 4.
The triangles ABC, CDE, and ACE are located to calculate ε. After that, ε is
determinate based on the complementary angles:
ε = 180◦ − β − γ (13)
Then ε is:
The angle of rotation of the base of the robot that allows the manipulator to locate
in the X, Y, Z plane is determined, and the angle between X and Y must be known to
obtain its spatial position [14].
The first image is the starting point to know the position of the mouth. A copy of
the original frame is made to guarantee a greater acceleration in the processing of
the image and further, resize with values of 320 × 240 pixels. The selected resolu-
tion makes the system more robust and tracking more efficient compared to larger
dimensions.
Basically, there is a delimiting area of the mouth; if the user moves outside the
area of the center of the image as shown in Fig. 5, then the robotic arm begins the
tracking process to be located within the center of the area. For example, if the user is
located in a sector with coordinates P(60, −100), through the serial communication
already established, the respective location characters will be sent to position the
robotic arm at the center of the image.
378 A. Jiménez et al.
Fig. 6 Screening and monitoring of the mouth using face alignment method and Haar Cascade
3 Experimental Results
3.1 Experiments
Figure 6 shows the robotic arm tests tracking user’s mouth in face alignment method
and Haar Cascade’s.
The precision and speed of the system are considered to determine the best method
for the recognition and tracking of the mouth. If the recognition of the mouth is not
exact, the robotic arm would produce failures when feeding the user.
Independent Feeding of People Affected with Osteoarthritis … 379
3.2 Results
The tests were performed on five users, inside a house, with different light settings
and in different distances. The test distance is from 5 to 50 cm. It is based on the
reach of the robotic arm. Once the user’s face is located, a green rectangle is drawn
around him and his mouth (Fig. 7).
Figure 8 shows the percentage of effectiveness of each method at different dis-
tances up to 50 cm.
The alignment method of the face of Dlib has a higher percentage of effective-
ness than the Haar Cascade method of OpenCV. The face alignment method has a
maximum percentage of 98% and a minimum of 90, 94% in average. Haar Cascade
has a maximum percentage of 70% and a minimum of 40%. These percentages were
obtained from the average effectiveness of tracking of each user.
Fig. 7 Left: face alignment with Dlib. Right: face recognition image with Haar Cascade
The Haar Cascade method for mouth detection is less precise and its parameters
much more difficult to adjust, while alignment of the face is more precise with simpler
adjust parameters.
Both methods are executed in a speedy manner and do not require a very powerful
processor for their execution since can run from a Raspberry Pi 3 without problems.
Face alignment method can be adapted to any environment for detection and
tracking of the mouth. Haar Cascade needs to reset of its parameters every time the
environment changes.
4 Conclusions
Acknowledgements We are grateful to “Universidad de las Fuerzas Armadas ESPE” to carry out
the tireless duty of teaching.
References
1. Song, W.-K., Kim, J.: Novel assistive robot for self-feeding. En Robotic Systems-Applications,
Control and Programming. InTech (2012)
2. Sammons Preston http://www.sammonspreston.com/
3. Topping, M.: Handy 1, a robotic aid to independence for severely disabled people. In: 7th
International Conference on Rehabilitation Robotics, pp. 142–147 (2001)
4. Song, W.-K, et al.: Design of novel feeding robot for Korean food. In: International Conference
on Smart Homes and Health Telematics. Springer, Berlin, Heidelberg, pp. 152–159 (2010)
5. Aranda, D.: Electrónica: plataformas Arduino y Raspberry Pi. Dalaga, Buenos Aires (2014)
6. Lee, S., Lee, C.: Illumination normalization and skin color validation for robust. de IS&T
International Symposium on Electronic Imaging 2016, Seoul (2016)
7. Castrillón, M., Déniz, O., Hernández, D.: A comparison of face and facial feature detectors
based. Mach. Vision Appl. 22, 481–494 (2011)
8. Dollár, P., Appel, R., Belongie, S., Perona, P.: Fast feature pyramids for object detection. IEEE
Trans. Pattern Anal. Mach. Intell. 36(8), 1532–1545 (2014)
Independent Feeding of People Affected with Osteoarthritis … 381
9. Klare, B.F., Klein, B., Taborsky, E., Blanton, A., Cheney, J., Allen, K., Grother, P., Mah, A.
Jain, A.K.: Pushing the frontiers of unconstrained face detection and recognition: IARPA Janus
Benchmark A. In: de IEEE Conference on Computer Vision and Pattern Recognition (CVPR),
Boston (2015)
10. Liao, S., Jain, A.K., Li, A.Z.: A fast and accurate unconstrained. IEEE Trans. Pattern Anal.
Mach. Intell. 38(2), 211–223 (2015)
11. Cheney, J., Klein, B.: Unconstrained face detection: state of the art baseline and challenges.
In: International Conference on Biometrics (ICB), Phuket (2015)
12. Kazemi, V., Sullivan, J.: One millisecond face alignment with an ensemble of regression trees.
Estocolmo (2017)
13. Baki Koyuncu, A.M.G.: Software development for the kinematic. World Acad. Sci. Eng. Tech-
nol. 1(6), 1575–1580 (2007)
14. Cruz, A.B.: Cinemática inversa, de Fundamentos de robótica. McGraw-Hill, Madrid (2013)
Adjustable Structure in Height
for Assisted Feeding in Patients
with Osteoarthritis
Abstract This article presents the design and building of an adjustable height struc-
ture for the assisted feeding of people with osteoarthritis. The project will improve
the quality of life of these patients. The design is governed by the INEN (Ecuado-
rian Standardization Service) norm. The fundamental criteria in the document are
oriented to create and size a mechanical structure matching with the anthropometric
measurements of the users. The parameters include the feeding area, mechanism
materials, and the correctly defining a height adjustment.
1 Introduction
The osteoarthritis is the most common joint disease. According to international stud-
ies, more than 70% of adults older than 50 years of age present radiological signs of
osteoarthritis in any joint; women are the most appropriate. The osteoarthritis affects
joints like hands, hip, or knee [1]. Besides, osteoarthritis is one of the main causes of
disability in the retired militaries. It affects a greater proportion of retired militaries
than in comparison with civilians. The most frequent reasons are stress and injuries
caused by repetitive basic training and combat risks such as bomb explosions, which
directly affect the cartilage cells and soft tissues [2].
Currently, there are some structures to feed people with physical disabilities, such
as Obi, which is a simple minimalist structure that works with a robotic arm, two
push buttons and a plate divided into four compartments for different types of food
[3]. There are many designs and constructions of self-feeding robot like Handy1,
Winsford feeder, Neater Eater, My Spoon, Meal Buddy and Mealtime Partner Dining
System [4]. Handy1 [5] consists of a five degree of freedom robot, a tray unit, and a
gripper. Handy1 allows a user to select food from any part of the tray. Meal Buddy
[6] has three degrees of freedom in robotic arm and three bowls. After the system
scoops the food, the robotic arm scrapes the surplus food off the spoon with the rod
on the bowls.
The study presented below emphasizes the design of a height adjustable table for
patients with osteoarthritis. For this, it is necessary to determine technical criteria
to implement a structure with good space of operation according to the physical
characteristics of the user.
The structure will have a space for: a robotic assistance arm with a range of at least
520 mm and lightweight, food plates (soup, entrée, dessert), a drinking glass with a
straw, a spoon with its spoon holder, electronic and drive elements, a screen, and a
height adjustment mechanism.
The maximum feeding area is determined by the maximum reach of the robotic arm,
in this case 1040 mm2 . Within this space, the user can be fed, and Table 1 shows
the elements comprising it. Figure 1 shows the elements of the maximum feeding
area. Number one represents the prototype of robotic arm. Number two represents
the area of work or feeding area and number three represents the maximum robotic
arm reach.
The INEN norm 1641:1988 [7] determines nominal values of the free space for the
accommodation of legs as shown in Fig. 2. The table width (T ) has a minimum value
of 580 mm; it should be defined such as requirement for the implementation of the
Adjustable Structure in Height for Assisted Feeding in Patients … 385
Fig. 2 Free space for legs accommodation according to NTE INEN 1641:1988 standard
elements on the table with a value of 810 mm. In addition, the depth at the feet level is
determined by a minimum value (V ) of 600 mm. After adding a structure for driving
mechanism operated by patient’s feet on the back of the mechanical structure, its
height will be increased to 670 mm for user comfort.
The dimensions of the table are 810 mm × 670 mm for width and depth,
respectively.
The Pythagorean theorem is used to calculate the exact location radius of food
utensils. The right triangle is formed by the oscillation arm and the union of the arm
with the final wrist or effector (Fig. 3).
If bo is measurement of the oscillation arm, bm is arm measurement + wrist
measurement, and r T is measurement of the radius of location of food utensils, thus:
The optimum total radius of location of the food utensils is 300 mm with respect
to the initial point of location of the robotic arm. There are three food dishes in total,
386 K. Aroca et al.
Fig. 3 Triangle with real measurements used to calculate the radius of location of food utensils
with respect to the center of the robotic arm
and the location of each plate is required to calculate the separation length between
them in first place. The arc length formula is used assuming an angle of 36°, as shown
in Fig. 4.
If ∅ is the angle formed between radius, c is the length of separation between each
plate, thus,
c = 2r T2 sin(∅) (3)
The transmission of circular to continuous linear motion is used with the rack and
pinion elements in the mechanism of regulation of the height range.
hcodo = A + E (5)
The data for sizing the surface of the table height is shown in Table 1.
The minimum height of adjustment of the work surface is given by the height
hcodo:
The sitting position of adult women is taken as the minimum height of adjustment
of the work surface. In the same way, the popliteal height in the sitting position (30)
and the distance of the space from the chair to the elbow (37) are added, in order
to obtain the minimum height at which the support table should be fixed [10]. The
details are in Fig. 7.
The data for sizing the surface of the table height is shown in Table 2.
The minimum height of adjustment of the work surface is given by the height
hcodo, where:
Adjustable Structure in Height for Assisted Feeding in Patients … 389
In another study based on the INEN 1641: 2015 standard [7], a minimum height
value of 650 mm is established for fully adjustable tables, up to a height of 850 mm.
In this case, according to previous studies, a height of 550 mm is established, up
to a maximum of 670 mm, in other words, an interval of 120 mm, to satisfy the need
to regulate the height of all the elderly.
Due to the low cost and improvements in the mechanical properties, the plastic
materials have increased their utility within the industry. In the market, there is a
great variety of pinions with standard zips, mostly with pressure angle of 20° and
made of nylon [11], for applications of uniform shock, safe operation, low friction,
corrosion resistance, and good properties in how much to wear.
The rack and pinion elements must comply with certain design requirements to
avoid possible failures during the movement of the mechanism, mainly for plastic
gears are supporting the impact of the tip of the tooth and the bottomland or chamfer
of the tooth of the rack, which produces fracture in the material due as the failure by
fracture between plastic gears due to the impact of the tip of the tooth of the pinion
with the bottomland or chamfer of the tooth of the rack. This defines a minimum
number of teeth of the gear, due to the established pressure angle, not less than 18
teeth are used [12].
The material used is nylon. The allowable bending stress S at is 41 MPa. The
minimum reference space for pinion location DReference is 92 mm. The length of the
rectangular zip l is 120 mm. The number of teeth selected from the pinion zp is 21.
The geometry of the rack and pinion is defined by [13]. Thus, the pinion and rack
module is:
The diameter of the step DP is equal to the multiplication of pinion or rack module
m and number of teeth selected from the pinion zp :
The number of steps carried out (n°steps) is equal to a length of the rectangular
zip divided by diametral step of the pinion or rack:
The number of turns of the pinion n°turnsp is equal to the number of steps carried
out
(n°steps) divided by the number of teeth selected from the pinion zp :
The revolution per minute of the pinion np is equal to the number of turns of the
pinion divided by the thickness of the tooth t:
◦ turns n p = n ◦ turns p /t = (0.47Turns/1.8s) (2π rev/1Turns) (60s/1min) = 95 RPM
p
(13)
The dimensions of head a, root b, and spacing c are 4, 5, and 1 mm, respectively.
The external diameter Do is equal to a primitive diameter of the pinion Dp plus
double the head a:
Do = D p + 2a = 84 + 2 × 4 = 92 mm (15)
DRP = D P − 2b = 84 − 2 × 5 = 74 mm (16)
h t = a + b = 4 + 5 = 9 mm (17)
h k = a + a = 1 + 1 = 2 mm (18)
The critical load on a tooth will be generated when the load is at the highest point
of contact in a single tooth, so the force will have used the value of the mass that will
be lifted, this one, a tangential force will generate a tension momentum or maximum
bending at the base of the teeth of the rack and pinion. To solve this requirement was
used a design software, it is estimated an approximate value of the total mass to be
lifted of 36.16 kg which consists of the robotic assistance arm, the food plates, food
utensils, to screen, the table, the support profiles of the table, and the approximate
mass of the user’s arms.
The tangential force W t :
Wt = mass(gravity) = 36.16 Kg 9.81 m/s2 = 354.73 N (21)
Therefore, it is true that the maximum bending stress on the pinion σ tp is less than
the permissible bending stress S at :
If J p is geometry factor for the pinion and J r is geometry factor for the rack, the
factors in the flexural stress equation are the same for the rack except for the J value
of geometry so the effort in the rack can be calculated as follow:
Also, the maximum bending stress on the rack is less than the allowable bending
stress:
It is the maximum bending at the base of one of the teeth of the pinion giving a value
of 8.99 MPa using the von Mises deformation method, therefore:
The von Mises effort of the pinion is less than the allowable bending stress.
Figure 8 shows the stress through design software.
In the same way, the maximum bending at the base of one of the teeth of the rack
gives a value of 6.84 MPa, thus:
The von Mises effort of the rack is less than the allowable bending stress. Figure 9
shows the analysis of efforts through a design software.
Adjustable Structure in Height for Assisted Feeding in Patients … 393
3 Experimental Results
The feeding area has the dimensions 1040 × 1040 for width and depth, respectively.
The support table has the dimensions 810 × 670 for width and depth, respectively.
Then, the dimensions of the support table have lower values compared to the dimen-
sions of the feeding area allowing to take these dimensions as part of the design of the
mechanical structure. Table 3 shows the minimum height obtained through a study
of the INEN norms and an anthropometric registry study conducted in Mexico [10].
Based on Table 3, the minimum height required to adjust the adjustable support
table will be 550 mm, based on the anthropometric registry study of women aged
60–90 years in Mexico. Since these users are those of shorter stature, and the maxi-
mum height will be 670 mm, to allow the regulation of the height of the mechanical
structure for the other beneficiaries. The results obtained from the analysis of bending
stresses are in Table 4.
The stress measurements obtained by the AGMA standards and computer-aided
engineering are very similar; therefore, it guarantees the reliability of these calcu-
394 K. Aroca et al.
lation methods. Also, these values are lower than the permissible bending stress;
therefore, the material selected for the rack and pinion is nylon.
4 Conclusions
The variation in height in each elderly affected with osteoarthritis allows that the
design of the table adjustable in height offers greater ergonomics, comfort, and
effectiveness when feeding and also reduces risks or discomfort that the user may
have in certain positions, improving their quality of life.
Among the technical criteria implemented in the research is the area of power
the one that limits the dimensions of width and depth of the mechanical structure in
order to avoid shocks and discomfort with the elements that make up protecting the
user from being hurt.
The correct distribution of the spaces for the food utensils and the robotic arm
allow the patient to position themselves in a suitable place to taste their food.
The height adjustment mechanism, formed by means of the rack and pinion ele-
ments, allows the vertical translation of the mechanical structure. The range of height
regulation is delimited by the studies of the INEN standards and an anthropomet-
ric study carried out in Mexico. AGMA standards and computer-aided engineering
are proven to be effective and reliable tools to select nylon as a material for the
implementation of the elements and thereby comply with the economic and design
parameters necessary for the selection of materials.
References
1. Solis, U., García y A. de Armas, V.: Rasgos demográficos en la osteoartritis de manos. Revista
Cubana de Reumatología 16(3), 275 (2014)
2. Cuddigan Law, [En línea]. Available: https://www.cuddiganlaw.com/library/making-the-
service-connection-for-arthritis.cfm?fbclid=IwAR2vnmcOQHx9nETuGUp_bWKDo9Zr9se_
pnASD0rHiyfjOPaJTFH4HuVRQvs [Último acceso: 22.01.2018]
3. Decker, J.: [En línea]. Available: https://meetobi.com/ [Último acceso: 2019 Enero 6] (2019)
4. Song, W.-K., Kim, J.: Novel assistive robot for self-feeding. En Robotic Systems-Applications,
Control and Programming. InTech (2012)
5. Topping, M.: Handy 1, a robotic aid to independence for severely disabled people. In: 7th
International Conference on Rehabilitation Robotics, pp. 142–147 (2001)
6. Sammons Preston. http://www.sammonspreston.com/
Adjustable Structure in Height for Assisted Feeding in Patients … 395
Abstract One of the biggest problems that society is currently facing is violence
against women. In recent years, tangible progress in protecting and saving the lives
of female victims of intimate partner/family-related homicide has not been made,
so targeted responses are clearly needed. In this work, an electronic device to help
victims of gender-based violence who live with their aggressor has been designed.
The system is built on Bluetooth Low Energy technology allowing a wireless com-
munication between device and mobile phone with a low power consumption. The
device is controlled by three different commands and is capable of sending mes-
sages through a mobile phone to a Control Center. Depending on the nature of the
received messages, the Control Center will take the appropriate measures to assist
the victim. The design has been made paying special attention to a reduced size so
that the device can easily be camouflaged in any accessory of the victim’s jewelry,
thus going unperceived to the possible aggressor.
1 Introduction
Nowadays, one of the problems of great social impact is the violence against women.
According to a new research published by the United Nations Office on Drugs and
Crime (UNODC), released for the International Day for the Elimination of Violence
against Women, a total of 87,000 women were intentionally killed in 2017. Around a
third (30,000), were killed by their current or former intimate partner, someone they
would normally expect to trust [1]. The main health consequences of this violence
are: death and injury, depression, problems with alcohol consumption, sexually trans-
mitted diseases, unwanted pregnancies and abortions, babies with low birth weight,
among others [2].
Since the 1980s, Spain has focused its attention on the problem of violence suf-
fered by women, reflecting his concern in several legal and regulatory programs
[3–12]. It is worth highlighting, the agreement signed between several Spanish Min-
istries for the implementation of the protocol of action of the monitoring system by
telematics means of the fulfillment of the restraining orders in matters of gender-
based violence. The monitoring system consists of a radiofrequency transmitter that
emits a radio frequency (RF) signal that is received by a track unit. Both are devices
for the accused. The track unit is a GPS tracking device that incorporates the basic
functionalities of a mobile phone in addition to the reception of the RF signal emit-
ted by the RF transmitter. The device for women is a track unit, practically equal to
the defendant’s and incorporates an external radio frequency antenna that allows to
detect the radio frequency signal of the RF transmitter of the accused. Figure 1 shows
the devices for the accused and the corresponding for the woman. When an alarm
occurs, the Control Center performs the communications provided in the protocol of
intervention for each type of alarm. Despite these actions, gender-based violence in
Spain still constitutes one of the main social problems.
Although there are multiple mechanisms that currently have the victims of gender
violence to protect themselves and ask for help, the reality is that the number of
fatalities does not seem to decrease and remains at a very high number. It should
Fig. 1 Devices of the monitoring system by telematics means: for the accused (a) and (b), (c) is
the device for women
Voice-Controlled Assistance Device for Victims of Gender-Based … 399
be noted that, only in the last year, 60 women were killed, of which 78% had never
processed a complaint against their aggressor [13]. Therefore, the current conception
of surveillance of the aggressor is insufficient for a real prevention of situations of
gender violence and targeted responses are clearly needed.
In order to provide a possible solution to this problem, in this paper we present
a device for asking help, designed for people suffering from gender-based violence,
including those who have not reported their aggressor and continue to live with him.
The purpose is to develop a system of personalized help, through electronic devices
easily camouflaged in the accessories of the victims, such as watches, necklaces,
bracelets, brooches, as well as a set of actions and strategies, aimed at returning to a
normal life this group at risk of social exclusion.
The present paper has been organized as follows: Sect. 2 describes the system
proposed. The voice capture system and its characteristics are detailed in Sect. 3. In
Sect. 4, the design of the Bluetooth application is mentioned. The conclusions are
set out in Sect. 5. Finally, Sect. 6 is dedicated to the acknowledgments.
2 Proposed System
The main goal has been to develop a device of small size that the victim or potential
victim of gender-based violence would carry at all times. The device is able to detect
a limited number of voice commands through a relatively simple hardware, which
respects the conception of low consumption device. The system will be built on
Bluetooth Low Energy (BLE) technology, which will allow to establish a wireless
communication between device and mobile phone with a low power consumption
thanks to the transmission of small data packets instead of a continuous flow of
information.
The smartphone will perform alert functions via calls and SMS, as well as GPS
location, thus allowing the device designed to be small in size and then easily cam-
ouflaged. It, also, will incorporate a microphone that will allow the smartphone to
perform GPS locator functions and launch calls to the authorities, depending on the
detected voice command. On the other hand, the smartphone will fulfill the functions
imposed under an Android application. The use of some capabilities that, a priori, the
majority of low-mid-range smartphones have (GPS and Bluetooth 4.0) is essential
to reduce the cost and its size to the minimum possible. The entire system described
is outlined in Fig. 2.
Regarding the products focused on the prototyping and development of systems
based on BLE technology, RFduino has been the selected for this work. Specifically,
the RFD22301 chip includes a microcontroller based on an ARM Cortex M0 archi-
tecture (nRF51822) that implements BLE technology. In addition, this platform is
fully compatible with the Arduino IDE environment and with the libraries developed
for Arduino. RFD22301 incorporates a 10 bits analog-to-digital converter, serial
port, a microcontroller operating at 16 MHz, 128 kB of Flash memory and 8 kB
of RAM [14]. To have an easy access to the chip’s ports, the module RFD22102
400 M. A. Domínguez et al.
“RFduino DIP” has been used [15] along with the RFD22121 “USB Shield.” This
device provides serial conversion-USB necessary to load compiled code on the chip,
thanks to the built-in FTDI [16]. Regarding the development environment, RFduino
is programmable through Arduino IDE in a language that mixes functions of C and
C++ [17]. Arduino IDE incorporates code editor, compiler and serial monitor, being
the only software debugging element available.
With respect to the smartphone, Android, which is based on the Linux kernel,
has been the operating system selected. Today it is present in smartphones, tablets,
smart watches, televisions, and automobiles, among others, being already the most
popular operating system in the world [18].
There are several environments that enable the development of Android appli-
cations in Web languages (HTML5, PHP, CSS3); however, it has been selected
Android Studio (IDE facilitated by Google) because it offers greater possibilities for
optimization and use of the hardware, as well as the use of APIs that facilitate the
implementation of services such as Bluetooth or location in a relatively simple way.
IDE Android Studio incorporates various utilities for programming: code editing,
compilation in real time, debugging, possibility of simulation of mobile devices, and
others.
As an Android device, we have used a Motorola Moto G, with Android Lollipop
5.0. In order to implement the libraries related to BLE technology in an Android
application, it is necessary that the device has API Level 18 or higher, that is, Android
4.3 or higher.
Regarding the BLE protocol just highlight that it is built on three fundamental
layers: application, host, and controller. This work mainly deals with the highest-level
layer, that is, the application layer.
The voice capture system is shown in Fig. 3. As can be seen, consists of a microphone,
a sound amplifier, and an analog-to-digital converter. Since the voltage variations will
be very small, it will be necessary to pass the electrical signal through an amplifier
Voice-Controlled Assistance Device for Victims of Gender-Based … 401
so that, finally, it is digitized, processed and the result sent through the Bluetooth
module. The amplified acoustic signal will be a signal with a continuous frequency
spectrum between 150 Hz and 4000 Hz, which is the range of frequencies on which
the male and female voice extends [19]. For an adequate sampling of the audio by
the ADC, it is necessary to ensure the Nyquist Theorem.
The amplification structure selected is based on a non-inverting configuration with
Operational Amplifier (OpAmp). In order to comply with the Nyquist criterion and
avoid the possible spectrum overlapping, a capacitor has been included to reduce
the bandwidth of the input signal. The amplifier is shown in Fig. 4, along with the
402 M. A. Domínguez et al.
capacitor Cf added to provide the amplifier with low-pass characteristics. Its value
will be selected following an empirical procedure. The OpAmp used has been the
LM324. It is a single-supply low power OpAmp. The resistors Rcm1 and Rcm2 are
responsible for providing the input signal with a common mode voltage, necessary
due to the 3.3 V single-supply operation of the OpAmp. On the other hand, resistors R1
and R2 set the gain of the circuit according to the expression (1) with R1 implemented
with a potentiometer for a manual adjustment of the gain.
R1
Gain = 1 + (1)
R2
In addition, the C 1 condenser decouples the input signal and the common mode
voltage of the circuit. Finally, the C 2 capacitor allows that the common mode feedback
will be complete. The values of the discrete components are the following: R1 =
218 k, R2 = 2.2 k, Rcm1 = 22 k, Rcm2 = 10 k, C 1 = 4.7 µF, C 2 = 4.7 µF so
the maximum value of the gain will be approximately 100 V/V, i.e., 40 dBs.
The total harmonic distortion of the amplifier has been obtained for a 10 mV
input signals at 1 kHz frequency obtaining a value of 0.3%, more than acceptable
considering that the maximum input signal will be around 2 mV (voltage level for
conversations of great intensity).
The digital processing of the audio signal through RFduino has been implemented
through the μspeech library [20]. Thanks to this open-source software library, it is
easy implement phoneme recognition functions in RFduino. It is written in C++ and
works by taking a number of audio samples that evaluates and associates with a
phoneme, distinguishing between English phonemes associated with the characters
‘e’, ‘h’, ‘v’, ‘f ’, ‘s’, and ‘I’. This library will be modified to adapt it to the needs of
this work.
Voice-Controlled Assistance Device for Victims of Gender-Based … 403
As already mentioned, the choice of the value of capacitor Cf has been made following
a completely empirical procedure. This has consisted of a test in which the three
commands to be detected were repeated 20 times. The results obtained are shown in
Table 1.
It is concluded that the best response is obtained using a 15 pF capacitor in the
feedback path. These tests have been carried out in ideal conditions of loudness
(without ambient noise). The results were very similar with certain levels of ambient
noise.
For the design of a prototype, the shield of the RFduino RFD22127 has been used [22].
It allows the circuit to be powered through a AAA 1.5 V battery since it implements
a DC/DC boost converter that sets a supply voltage of 3.3 V. Three LEDs have been
also included so they will light up when any of the voice commands were detected.
The estimated current consumption is around 15 mA. In the design of the printed
circuit board (PCB) special attention has been paid to the layout in order to size the
board so that have the dimensions and shape similar with those of the Shields used.
Voice-Controlled Assistance Device for Victims of Gender-Based … 405
Fig. 6 Miniaturized circuit and necklace where it can be placed a circuit top view, b bottom view
and c top and bottom part of the necklace
All traces have been arranged in the lower layer. In addition, three capacitors have
been included in the path from the power supply to ground to filter noises. Figure 5
shows the photograph of the PCB with all components and Shields.
As already mentioned, the final goal of this work is that the device can be carried
by a victim of gender-based violence camouflaged in some jewelry accessory. To
achieve this, it is necessary to minimize the size of the designed prototype. Figure 6a,
b shows the top and bottom part of the new prototype implemented, respectively. The
dimensions are 28.6 × 25.5 mm2 which allow it to be placed in a necklace as shown
in Fig. 6c.
The application has a graphical user interface (GUI) which shows how the phone
scans for advertising packets during a limited period of time, then going to sleep. If
advertising packets are detected, the information will be read to discern if it comes
from the implemented device (through the name) and what is the detected voice
406 M. A. Domínguez et al.
Fig. 7 Screenshots of the Android application a main screen, b “socorro” (SOS) screen,
c “información” (info) screen and d “GPS” screen
command (through the user data included in the package). The functions, depending
on the detected command, are:
– Voice command “socorro”: GPS location via satellite and telephony antennas,
ability to send SMS alerts with this information and to launch a telephone call.
– Voice command “informacion”: collecting the battery level of the device and send-
ing SMS with this information.
– Voice command “GPS”: GPS location and sending SMS with information regard-
ing the coordinates (latitude and longitude).
Figure 7 shows the different screenshots of the Android application depending on
the functions carried out.
Once the SMS is sent to the Control Center, the appropriate steps will be taken in
order to protect the victim from its possible aggressor or simply store the received
information.
5 Conclusions
Acknowledgements The authors are grateful to the Junta de Extremadura and FEDER (Fondo
Europeo de Desarrollo Regional “Una manera de hacer Europa”), for financial help by project
IB16211.
References
1. United Nations Office on Drugs and Crime, UNODC: Global Study on Homicide, Vienna
(2018)
2. World Health Organization, Department of Reproductive Health and Research, London School
of Hygiene and Tropical Medicine, South African Medical Research Council: Global and
regional estimates of violence against women. Prevalence and health effects of intimate partner
violence and non-partner sexual violence. World Health Organization, Switzerland (2013)
3. Organic Law 1/2004, of December 28, on comprehensive Protection Measures against Gender-
based Violence
4. Organic Law 3/1989, of June 21, updating the Criminal Code, which introduces the criminal
activity of habitual violence in article 425
5. Organic Law 11/2003, of September 29, on Measures on Citizen Security, Domestic Violence
and Social Integration that brings habitual violence to Article 173 of the Criminal Code and
introduces for the first time the “criminal activity of occasional mistreatment” in his article 153
6. Law 27/2003, of July 31, regulating the Order for the Protection of Victims of Domestic
Violence
7. Organic Law 5/2010, of June 22, which modifies the Organic Law 10/1995, of November 23,
of the Penal Code
8. Organic Law 2/2009, of December 11, reform of the Organic Law 4/2000, of January 11, on
rights and freedoms of foreigners in Spain and their social integration
9. Royal Decree-Law 3/2013, of February 22, which modifies the regime of fees in the area of
the Administration of Justice and the system of free legal assistance
10. B.O.E of June 6, 2014, Instrument of ratification of the Convention of the Council of Euro-pa
on prevention and fight against violence against women and domestic violence, done in Istanbul
on May 11, 2011
11. Organic Law 3/2007, of March 22, for the effective equality of women and men
12. Guide to criteria for judicial intervention against gender-based violence, 2013
13. Ministry of Health, Social Services and Equality of the Government of Spain on Gender-
based Violence Homepage, http://estadisticasviolenciagenero.msssi.gob.es/. Last accessed
2018/12/19
14. RFduino (RFD22301) Homepage, http://www.rfduino.com/product/rfd22301-rfduino-ble-
smt/index.html. Last accessed 2015/06/01
15. RFduino (RFD22102) Homepage, http://www.rfduino.com/product/rfd22102-rfduino-dip/
index.html. Last accessed 2015/06/01
16. RFduino (RFD22121) Homepage, http://www.rfduino.com/product/rfd22121-usb-shield-for-
rfduino/index.html. Last accessed 2015/06/01
17. Arduino programming language Homepage, http://www.arduino.cc/en/pmwiki.php?n=
Reference/HomePage. Last accessed 2015/06/01
18. Android Homepage, https://www.android.com/. Last accessed 2018/012/26
19. Nortel Networks, Voice Fundamentals, Reference Guide (2014)
20. GitHub directory of the μspeech library, https://github.com/arjo129/uspeech/releases. Last
accessed 2015/06/13
21. Association of phonemes and letters of Spanish, Homepage, http://www.livingspanish.com/
correspondencia-fonetica-grafia.htm. Last accessed 2015/06/13
22. RFduino (RFD22127) Homepage, http://www.rfduino.com/product/rfd22127-single-aaa-
battery-shield-for-rfduino/l. Last accessed 2015/06/13
Part XI
Analysis and Signal Processing
Analysis and Evaluation of the
Positioning of Autonomous Underwater
Vehicles Using Acoustic Signals
1 Introduction
Unmanned aerial vehicles, or drones, have rapidly grown in popularity during the
past years. They have broken through rigid barriers in traditional industries which
otherwise seemed impenetrable by similar technological innovations. Today, drones
are key elements in activities like aerial photography, search and rescue operations,
precision agriculture, and express shipping and delivery. In fact, even though the
military use of drones has a large history [7], military applications are currently the
main service of this type of vehicles [3, 16]. It should also be noted that unmanned
vehicles have been an important catapult for the battlefield industry and security
operations, improving the fight against organized and transnational crime, and other
threats that attempt to violate or alter citizen security.
However, illegal activities are also being developed in coastal profiles and off-
shore, and drones are not able to fully cover the needs existing in underwater environ-
ments. For instance, security operations require support to combat drug trafficking
in submersible vehicles, guerrillas next to zones covered by water, criminal activities
through rivers and estuaries, etc. It is then essential to use the benefits and capabili-
ties of unmanned vehicles for these operations in order to support military activities
in those areas. Thus, the need of developing the so-called unmanned underwater
vehicles arises. These vehicles are divided into remotely operated vehicles (ROVs),
which are controlled by a remote human operator, and autonomous underwater vehi-
cles (AUVs), which operate with no direct human intervention. AUVs are the most
complex and expensive vehicles since they completely rely on autonomous func-
tions, and they have gradually evolved offering capabilities in some missions and
applications that no other platforms can offer [1]. As a matter of fact, due to the tech-
nological innovations in the past years, small and inexpensive AUVs are becoming
feasible and profitable.
Although AUV field is still an emerging sector, AUVs will be part of many aca-
demic, commercial, and military applications [5]. In fact, military usage of AUVs
is a sector of increasing demand, due to their ability of conducting missions that no
other equipment can perform [8]. However, current existing alternatives face sev-
eral challenges like position uncertainty, limited and noisy communication, bounded
time autonomy, overall reliability, among others. In addition, the usage of AUVs
into military operations deserves a deeper analysis, since it is necessary to exploit
the principles of the war and carry out military missions effectively. Hence, it has
been promoted the creation, strengthening, and improvement of R+D+i processes
to generate technological solutions that energize and optimize the use of all kind of
resources in military operations.
Following this line of reasoning, this work seeks to solve a main AUV problem:
underwater positioning. This is a challenging task since the GPS network is not
available to submersed devices, and considering that radio signals do not propagate
very far in water, AUV positioning and navigation are still areas of active develop-
ment [14]. When georeferenced navigation is necessary, current AUVs use internal
navigation systems, such as inertial guidance systems that measure and integrate
Analysis and Evaluation of the Positioning of Autonomous Underwater … 413
2 AUV Positioning
An important step for the development of powerful AUVs is to know the vehicle’s
position adequately, using any available tool or technology. With this requirement in
mind, the basics of AUVs, the propagation of acoustic signals in water, and common
trilateration techniques are discussed below.
Many different AUVs have been designed in the past five decades, ranging in size
from portable AUVs to very large vehicles. Large AUVs have advantages in terms of
endurance and sensor payload capacity, but smaller AUVs benefit significantly from
lower logistics. Today, the AUV market is evolving, and new designs are following
commercial requirements rather than being purely experimental [2].
AUVs must basically control themselves while accomplishing a predefined task
[18]. For that, the following list represents the main technologies that have been
addressed over the last years [1, 5]:
414 E. V. Carrera and M. Paredes
In the water, acoustic signals propagate faster than in the air and their absorption
at low frequencies is weak, making the water a good conductor of acoustic waves
[10]. However, speed propagation of acoustic signals in the water depends on several
parameters like salinity, depth, and temperature. Del Grosso’s equation, an up-to-date
alternative to the UNESCO algorithm, determines the existing relationship among
all these parameters [19]. The base velocity considered by Del Grosso’s equation is
1402.4 m/s, and instead of depending on the depth, this equation uses pressure as
an input parameter. Obviously, the pressure depends on the depth and geographical
latitude.
Del Grosso’s equation was derived from fitting it to experimental data, and it
has an associated uncertainty in its prediction of sound speed. There are also other
proposed equations and algorithms, but the choice of a particular model depends
on the accuracy and precision acceptable for the application in which it is being
employed. In any case, the range of validity for Del Grosso’s equation is temperature
Analysis and Evaluation of the Positioning of Autonomous Underwater … 415
between 0 and 30 ◦ C, salinity between 30 and 40 parts per thousand, and pressure
between 0 and 1000 kg/cm2 .
The absorption of acoustic signals in the water also depends on some properties
such as temperature, salinity, and acidity of the water, as well as the frequency of the
acoustic signal [9]. This absorption generates some losses in the transmitted energy
from the source to the receiver. However, the major contribution to transmission
losses is the spreading of the acoustic wave as it propagates away from the source. It
is well known that sound spreads such that its intensity decreases exponentially with
distance.
RSSI and ToA describe circumferences centered in the sources and the position of
the vehicle is determined by the intersection of those circumferences as explained in
Fig. 1.
TDoA. This method determines the vehicle position measuring the time differences
between every pair of received signals. Geometrically, the differences in time gen-
erate hyperbolas that intersect in the position of the vehicle as shown in Fig. 1. This
technique requires that only the acoustic sources are synchronized among them,
being clearly advantageous an infrastructure-based TDoA positioning technique as
there is only one source.
In order to analyze and evaluate different positioning techniques for AUVs, an under-
water vehicle simulator has been developed. The technical details of the simulator
and its default configuration are presented in the following subsections.
The simulator was implemented in MATLAB® and includes a very complete model
of the sound propagation in water. The acoustic sources can be configured in space
and number with specific directivity, while the hydrophones are always omnidirec-
tional. The speed propagation is modeled according to Del Grosso’s equation, and
the absorption of the sound is modeled by the Ainslie and McColm algorithm. After
determining the existing response to the discrete unit impulse between any source
Analysis and Evaluation of the Positioning of Autonomous Underwater … 417
and the receivers, the response to a discrete pulse is computed. Obviously, multipath
interference and path loss are considered in these calculations in order to obtain a
realistic pulse response.
Using the corresponding responses to the pulses emitted by the acoustic sources,
the simulator is able to compare RSSI, ToA, and TDoA algorithms using both
client-based and infrastructure-based trilateration techniques. The computed posi-
tions through these methods can be compared for any specific AUV position, or the
average error for a fraction of the whole volume can be determined. The fraction
of volume used in this last case is the centered volume limited by a scaling factor
between 0 and 1. Figure 2 allows us to understand better the volume corresponding
to a specific r factor.
In addition, the simulator implements an intuitive graphical interface shown in
Fig. 3. Through the interface, the final user can configure the size of the water con-
tainer, its latitude, the water temperature and salinity, and the reflection coefficients of
every wall in the container. Moreover, the sampling frequency for digital processing
and the duration of the pulses emitted by the sources are also configurable.
The default configuration of the simulator considers the parameters found in a lake
at the Andean region of Ecuador. Basically, we use a latitude of 0.216667◦ , a tem-
perature of 4 ◦ C, and a salinity of 10 ppm. The reflection coefficients are 1.0 for the
surface and 0.46 for the other walls of the water container. The default size of the
water container is 5 × 5 × 3 m, and the average errors are obtained examining points
separated 0.2 m in each direction along the volume scaled by a factor r (see Fig. 2).
Lastly, the sampling frequency used in the computation of the unit impulse response
is 160 kHz and the duration of the pulses is 500 ms.
4 Results
The main results obtained by the simulator are presented below. A parameter space
study is also included before discussing the main implications of these values.
The default configurations for comparing the three main trilateration techniques are:
five noise sources, temperature of 10 ◦ C, and a water container of 5 × 5 × 3 m. The
results shown in Table 1 confirm that TDoA is the most accurate technique. Although
ToA has similar results, ToA requires additional time synchronization among acoustic
sources and receivers. Remember that TDoA only requires that the acoustic sources
are synchronized.
Other import observation from Table 1 is the importance of keeping away the
vehicle from the acoustic sources. When the operational zone of the AUV is contained
inside an r factor of 0.8 (i.e., approximately half of the total volume), the accuracy
is lower than 10 cm. Furthermore, if the operational zone is inside an r factor of 0.6,
the accuracy could be as low as 1 cm.
Results for an infrastructure-based positioning instead of a client-based position-
ing also show the same trend.
Table 1 Average position accuracy (in cm) for different trilateration techniques
Technique Scaling factor r (volume)
1.0 (100%) 0.8 (51%) 0.6 (22%)
RSSI 326.2 29.0 3.4
ToA 163.0 9.6 1.1
TDoA 162.8 9.6 1.1
Analysis and Evaluation of the Positioning of Autonomous Underwater … 419
Table 2 Average position accuracy (in cm) for TDoA using different configurations
Temperature (◦ C) Scaling factor r (volume)
1.0 (100%) 0.8 (51%) 0.6 (22%)
4 130.8 5.6 1.0
10 162.8 9.6 1.1
20 169.5 12.1 1.1
Number of sources Scaling factor r (volume)
1.0 (100%) 0.8 (51%) 0.6 (22%)
4 114.0 58.3 25.7
5 162.8 9.6 1.1
6 25.7 3.2 0.9
Size of the container (m) Scaling factor r (volume)
1.0 (100%) 0.8 (51%) 0.6 (22%)
5×5×3 162.8 9.6 1.1
10 × 10 × 6 177.0 6.0 1.4
20 × 20 × 12 107.6 3.3 1.4
In order to determine how some parameters included in the simulator affect the
accuracy of the TDoA technique, Table 2 presents accuracy values for different tem-
peratures, number of noise sources, and size of the water container.
We can see that low temperatures slightly improve accuracy, even for high val-
ues of r . On the other hand, the number of acoustic sources significantly affects
the accuracy of TDoA. Basically, five acoustic sources are the minimum number
of allowed sources for getting an acceptable accuracy. Working with six acoustic
sources, instead of five, still causes a noticeable improvement.
In addition, although the initial configuration of the water container might seem
a bit small, we can see that accuracy values are similar for larger configurations of
the container. In the case of a container of 20 × 20 × 12 m, the positioning accuracy
is lower than 5 cm for an r factor of 0.8.
4.3 Discussion
These results definitively place TDoA as the best trilateration technique without using
angles of arrival. Results are pretty good, especially for low temperatures, using at
least five noise sources, and big containers of water. In summary, an accuracy of a
few centimeters can be easily achieved by TDoA.
420 E. V. Carrera and M. Paredes
The main problem of TDoA is the high number of noise sources required in
the surrounding infrastructure. This problem is enlarged if military applications are
considered, since enemy forces can easily be aware of the presence of such devices
in the battlefield.
Despite that, we have already started the hardware implementation of the TDoA
technique to validate previous results in the field. In order to detect the starting point
of the acoustic pulses, a variation of Goertzel’s algorithm [11] has been implemented
in a Raspberry Pi motherboard. At this moment, time difference errors lower than
0.1 ms are achieved with this hardware platform.
5 Conclusions
This work demonstrates that trilateration techniques are good enough to provide a
positioning accuracy below 10 cm in a broad range of configurations. The imple-
mented simulator considers a complex model for the sound propagation in the water,
providing acceptable trends in the comparison of trilateration techniques based on
signal intensities. We expect that this type of technology can be used soon in military
application after minimizing the number of noise sources.
For the reduction of noise sources, as a future work, we plan to extend the simulator
for comparing the AoA technique to the other trilateration techniques. In fact, we
would like to study microphone/hydrophone arrays [13] to combine AoA and TDoA
techniques in order to reduce significantly the number of noise sources. Finally, the
hardware implementation of the TDoA technique is almost finished and we expect
to make tests in the field using a commercial ROV in a lake of Ecuador to validate
the results presented along with this document.
Acknowledgements This work was partially supported by the Universidad de las Fuerzas Armadas
ESPE under Research Grant PREDU-2016-005.
References
1. Allard, Y., Shahbazian, E.: Unmanned underwater vehicle (UUV) information study. Technical
report, DRDC-RDDC-2014-C290, OODA Technologies Inc., Montreal, Canada (2014)
2. Antonelli, G.: Underwater Robots, 4th edn. Springer, Berlin (2018)
3. Baek, H., Lim, J.: Design of future UAV-relay tactical data link for reliable UAV control and
situational awareness. IEEE Commun. Magaz. 56(10), 144–150 (2018). https://doi.org/10.
1109/MCOM.2018.1700259
4. Bensky, A.: Wireless positioning technologies and applications. Artech House (2016)
5. Button, R.W., Kamp, J., Curtin, T.B., Dryden, J.: A survey of missions for unmanned undersea
vehicles. RAND National Defense Research Institute, Santa Monica, CA (2009)
6. Carrera, E.V., Perez, M.S.: Event localization in wireless sensor networks. In: 2014 IEEE
Central America and Panama Convention (CONCAPAN XXXIV), pp. 1–6. IEEE, Panama,
Panama (11 2014)
Analysis and Evaluation of the Positioning of Autonomous Underwater … 421
7. Cook, K.L.B.: The silent force multiplier: The history and role of UAVs in warfare. In: 2007
IEEE Aerospace Conference. pp. 1–7 (March, 2007)
8. Damian, R.G., Jula, N., Paturca, S.V.: Autonomous underwater vehicles - achievements and
current trends. Sci. Bull. Nav. Acad. 21(1), 85–89 (2018)
9. Doonan, I.J., Coombs, R.F., McClatchie, S.: The absorption of sound in seawater in relation to
the estimation of deep-water fish biomass. ICES J. Mar. Sci. 60(5), 1047–1055 (2003)
10. Etter, P.C.: Underwater Acoustic Modeling and Simulation. CRC Press (2018)
11. Jiang, J., Brewer, R., Jakubowski, R., Tan, L.: Development of a piano frequency detect-
ing system using the goertzel algorithm. In: 2018 IEEE International Conference on Elec-
tro/Information Technology (EIT), pp. 0346–0349. IEEE (2018)
12. Khan, R., Ercan, M.F., Metarsit, L., Le, A.N.S., Lim, K.V., Tan, W.T., Ang, J.L.: Underwater
navigation using maneuverable beacons for localization. In: OCEANS 2016 MTS/IEEE, pp. 1–
5. IEEE, Monterey, CA (2016)
13. Paredes, D., Apolinario, J.: Shooter localization using microphone arrays on elevated platforms.
In: 2014 IEEE Central America and Panama Convention (CONCAPAN XXXIV), pp. 1–6.
IEEE, Panama, Panama (2014)
14. Paull, L., Saeedi, S., Seto, M., Li, H.: AUV navigation and localization: A review. IEEE J.
Ocean. Eng. 39(1), 131–149 (2014)
15. Perez, M.S., Carrera, E.V.: Acoustic event localization on an arduino-based wireless sensor
network. In: 2014 IEEE Latin-America Conference on Communications (LATINCOM), pp. 1–
6. IEEE, Cartagena, Colombia (2014)
16. Solodov, A., Williams, A., Al Hanaei, S., Goddard, B.: Analyzing the threat of unmanned aerial
vehicles (UAV) to nuclear facilities. Secur. J. 31(1), 305–324 (2018)
17. Stojanović, D., Stojanović, N.: Indoor localization and tracking: methods, technologies and
research challenges. Facta Univ. Ser. Autom. Control. Robot. 13(1), 57–72 (2014)
18. Wadoo, S., Kachroo, P.: Autonomous underwater vehicles: modeling, control design and sim-
ulation. CRC Press (2016)
19. Wong, G.S., Zhu, S.m.: Speed of sound in seawater as a function of salinity, temperature, and
pressure. J. Acoust. Soc. Am. 97(3), 1732–1736 (1995)
Part XII
Chemical, Biological and Nuclear Defense
Evaluation of 3D Printing Parameters
on the Electrochemical Performance
of Conductive Polymeric Components
for Chemical Warfare Agent Sensing
Abstract Aiming at the use of 3D printing as a tool in the design of electronic com-
ponents and sensors, the present work has developed a preliminary evaluation of the
influence of printing conditions on the electrochemical behavior of PLA and com-
mercial carbon conductor-based composites. For this, characterization experiments
were carried out by means of infrared spectroscopy and thermal analysis, pointing
to a clear variability of behavior of different types of PLA, as well as the influence
of this variation on the thermal behavior of the composites, which consequently
influences the processes of 3D printing. Experiments allowed a speculation of the
conductor load present in the conductive filament (about 20.5%), although it was not
possible to define its category. The print modes, in turn, proved to be a decisive fac-
tor for the electroanalytical behavior in front of a redox probe, being responsible for
improving or worsening the resolution, or favoring the exchange in a given direction.
In all cases, the relations between currents (cathodic and anodic) were acceptable,
although the loss of resolution, translated in the form of spacing between peaks, has
greatly contaminated the calculation of electroactive areas in some cases. Clearly, an
optimization of the printing process, as well as a better control in the particle size,
will allow obtaining high electroactive areas, with adequate resolution, even with low
driver loads, which shows a promising line currently in development in our Group.
1 Introduction
Kanchi et al. [11] and Ainla et al. [12] described different characterization projects
for a universal wireless electrochemical system in a wide range of voltammetric
techniques, with compatible results from all assessed systems.
Colozza et al. [13] reported a new paper-based electrochemical sensor for detec-
tion of sulfur mustards. The working electrode was modified with a nanocomposite
consisting of Prussian blue and carbon black nanoparticles.
From these examples, it is easy to conclude that use of smartphones and other
controlling systems is no longer a challenging task but, on the other hand, customizing
sensors is still a decisive step for a reliable application. It becomes important to note
that many reports describe the use of carbon-based substrates, which is not only
cheap and easy to manipulate, but also versatile in terms of chemical modification.
Carbon composites have numerous advantages over conventional substrates such
as easy surface renewal (allowing the removal of adsorbates), fabrication in different
shapes and sizes, application in a wide range of pH and working potential, possi-
bility of chemical modification on the surface of the electrode or in the bulk itself,
low production cost, among others [14–20]. Among many available binders for 3D
printing, poly(lactic acid) (PLA) stands for a promising substrate, being a biodegrad-
able aliphatic polyester with melting point between 130 and 180 °C, derived from
renewable resources such as corn, rice, cassava roots and sugarcane. Among its char-
acteristics, PLA has a high mechanical resistance that promoted the study of the same
in the use of several materials [14, 21–23].
Various forms of carbon-based particles have been used as conductive phase
in composite materials suitable for electrochemical sensors [20]. Among these,
graphite [15], vitreous carbon particles [24], graphenes [25], nanotubes [26] and
fullerenes [27], among others, have shown promising properties. Graphene consists
of a monoatomic layer formed by carbon atoms with sp2 hybridization, with a sur-
face area that is almost twice as large as that of single-walled carbon nanotubes [28],
and with a long p-conjugated system, the electrons are confined in two dimensions,
which gives the graphene remarkable properties such as high electrical and thermal
conductivity, good transparency, good mechanical strength, inherent flexibility and
huge specific surface area [29–31].
3D printing is a technology that allows the fabrication of solid 3D objects, with
high precision, and with a great deal of flexibility over the adopted design, from a
digital file. The material used for printing is considered low cost, and the produc-
tion process generates minimal waste. There is a commercial drawback, related to
fabrication of conductive parts by 3D printing, using carbon black, graphene and nan-
otubes, which reflects the higher cost compared to pure non-conductive filaments.
One important point is the lack of information about the load (%) and nature of the
conductive phase employed, since a significant part of the producers and suppliers
do not declare such information, offering the product on the market as a “conductive
filament” without further technical details.
Guo et al. [32] presented in their article electrodes fabricated from PLA nanocom-
posite and multilayer nanotubes by 3D printing with a helical structure. In addition
to high electrical conductivity, this system has good rigidity, excellent sensitivity and
selectivity.
428 J. R. Barbosa et al.
Vernadou et al. [33], in his paper on 3D-printed graphene electrodes, deal with
the use of graphene printed with pyramidal geometry using a double-extruded 3D
FDM type printer for application on lithium-ion batteries.
Palenzuela et al. [34] used graphene-PLA composite electrodes imprinted in ring
and disk form in a 3D process of melting and deposition molding and, after charac-
terization by cyclic voltammetry and scanning microscopy, applied in the detection
of picric acid and ascorbic acid.
In spite of the clear application potential and the variety of commercial filaments
available, it is interesting to consider that few previous works take into account the
printing conditions or describe them in detail, although the interfacial properties
obtained are directly affected by the relationship between nature, properties, charge
and dimensions of the dispersed conductive phase, extrusion and printing conditions.
In such context, the present work aims to exploit the influence of printing conditions
over the electrochemical performance of carbon-PLA sensors as prototypes for cus-
tomized sensor strips for lab-free use.
Prototypes were prepared by direct printing, using a Voolt 3D GI3 3D printer, with
Slic3r software. These test bodies/work electrodes with dimensions (2.8 × 1.5 ×
0.1 cm) (length, width and thickness) were printed in horizontal and vertical modes
and with Linear type interfacial geometries, Helbert, Archiemedean, Octagram and
concentric, with filler density of 10 and 100%.
Filaments of PLA (FPLAP), and conductive PLA (FPLAC), supplied by 3D Lab®
(Brazil), Proto-Pasta® (USA), respectively, both with a diameter of 1.75 mm, were
used as feeder filaments. Table and nozzle temperatures were adjusted following
properties described by the manufacturers and modes suggested by the printer default
(nozzle temperature between 195 and 225 °C, bed temperature circa 60 °C).
The thermal behavior was evaluated by thermogravimetric analysis (TGA and DTG),
using a Shimadzu thermogravimetric analyzer model TGA-60, sample mass about
20 mg of pre-sampled sample in alumina samples and under heating at 10 °C min−1 ,
at room temperature at 900 °C, under a dynamic atmosphere N2 inlet at a flow
rate of 40 mL min−1 . Further additional information was obtained by means of
differential scanning calorimetry (DSC), using a Shimadzu differential scanning
calorimeter model DSC-60, between room temperature and the thermal stability
Evaluation of 3D Printing Parameters … 429
Voltammetric cells printed directly on ABS with diameter 2.2 and 2 cm in height
were used, with total volume of 5 mL in electrolyte solution. The working electrode
was positioned at the bottom, in a window allowing an exposure of 0.385 cm2 in the
geometric area of the sensor, and the sealing was performed with the aid of O’ring
and acetic curing silicone glue.
The electroactive areas were measured by a system of three electrodes
(Ag|AgClsat ) as reference, surgical steel needle as against electrode and the printed
working electrodes to be tested) carefully inserted into the voltammetric cell already
described, using a potentiostat, Ivium® CompactStat model (Ivium Technologies,
Netherlands).
Cyclic voltammetry (CV) in potassium hexacyanoferrate (5 mmol L−1 ) and
0.5 mol L−1 potassium chloride was used, and the Randles–Sevcik ratio, previ-
ously presented and defined, was used for calculations. Three successive scans were
performed in the potential range from −1.0 to 1.5 V, under different scan rates (10,
20, 30, 50, 75 and 100 mV s−1 ), as usual.
about the nature and loading of the conductive phase in these filaments are not pro-
vided, which points to a clear need for prior characterization by thermal techniques,
aiming to evaluate not only the thermal decomposition profile, but possible faults in
the final components obtained by the formation of conductor clumps or regions of
heterogeneity in the parts as a consequence of large differences in thermal behavior
between insulating (PLA) and conductive (undeclared) phases.
Both materials have different thermal stabilities, the FPLAC being more thermally
resistant, since the thermal decomposition starts at 312.12 °C (Tonset ), about 100 °C
higher compared to FPLAP. Another interesting aspect is the third mass loss in
FPLAC (25.4%), compared to the event in the same temperature range for FPLAP
(4.9%), indicating a percentage of conductive phase of about 20.4% and in agreement
with the observed temperatures for carbon-based phases in several reports [21, 35].
Certainly, such an approach is semi-quantitative, since the content is not stated,
as well as the nature of the driver, besides the fact that these are different PLA
structures. This behavior suggests that the conductor filler dispersed in PLA matrix
may increase the thermal stability of the material as a function of the colligative
properties, making it more resistant. It was also possible to note in the DTG two
small mass loss processes of FPLAP, between 84.94 and 109.47 °C and between
217.80 and 248.69 °C, the latter shortly before thermal decomposition, which may
suggest a minimum presence of moisture and additives used in the manufacture
of the filaments, respectively. Thermal decomposition occurs between 248.69 and
338.51 °C, where there is a large mass loss, followed by another small loss between
559.2 and 900.0 °C, with no residue in the crucible at the end of the test, as reported
in the literature [36].
Differential scanning calorimetry (DSC) for the FPLAP and FPLAC samples was
carried out by heating-cooling-heating mode [37] between room temperatures ~25
and 220 °C, based on previous results from TG curves. The percentage of crys-
tallinity was obtained through Eq. 1, where Hc is the enthalpy of crystallization in
(J/g), Hm is the enthalpy of fusion, being obtained by the area of the peak in the
DSC curve, and Hm 100 is the melting enthalpy of 100% crystalline PLA, which
according to the literature is given by 93.7 J/g [38, 39].
|Hm − Hc |
Xc (%) = × 100 (1)
H 100%
The PLA has a characteristic heating profile, with three thermal events—a
glass transition around 60 °C, crystallization around 100 °C and melting around
160 °C—and can vary between 130 and 180 °C. Comparing the first and second
heating cycles, it was observed that the FPLAC had its DSC profile more affected
by the cooling than the FPLAP; however, the glass transition temperatures (Tg ) did
not change significantly. In both cases, the glass transition is followed by a small
endothermic peak, which suggests some degree of physical aging of the materials,
since the polymers have undergone previous processing when the filament is made.
The crystallization process characterized by the exothermic peak at 101.96 °C in
the first heating for the FPLAC does not occur after the cooling process in addition
Evaluation of 3D Printing Parameters … 431
to a substantial decrease of the melt peak at 150.96 °C, suggesting that the solid upon
cooling did not form a more organized or crystalline structure due to the presence
of the conductive filler. It was observed that FPLAP presented higher crystallinity
(13.97%) than FPLAC (10.21%), which was improved with cooling since the crystal-
lization peaks (first and second) besides the melting became better defined, pointing
to a better reorganization of the polymer chains.
The melting temperatures Tm for the two samples show a significant difference,
which is attributed mainly to the structural difference between the two materials,
possibly due to different proportions between the l-lactic acid/d-lactic acid type
monomers along the polymer, resulting from different synthesis processes, in which
the chains can aggregate in points with a greater proportion of l or d, forming
clusters that make the material more crystalline, as described in Kumar et al. [40]
and Ceregatti et al. [41].
On the other hand, the presence of conductive filler dispersed in the PLA chains
promotes a better thermal stability; however, it makes it difficult to reorganize
the chains, making the material less crystalline, after successive cycles of fusion-
solidification, unlike that presented by Ceregatti et al. [41], in which the material
presented higher crystallinity in the second heating with CNT in concentrations up
to 5%.
A batch-injection cell was used to determine the electrode area and subsequent evalu-
ation of the best printing conditions (direction, fill type and surface), which was filled
by electrolyte-holder for later activation and measurements. Subsequent addition of
adequate mass of the probe allowed, under homogenization, to reach the desired
concentration of the same and then the measurements of the electroactive areas.
The determination of the electroactive area was performed using cyclic voltam-
metry between −1 and +1.5 V versus Ag|AgClsat , at different scanning rates and
three consecutive cycles for each condition. A preliminary activation step in the same
window was performed at a speed of 100 mV s−1 . Parameters such as peak shift, and
the relationship between anodic and cathodic currents, as well as the linear relations
between current and velocity values (Ip × v1/2 ) were used to evaluate the best condi-
tions of application of the material as an electrode surface. In addition, the equation
of Randles and Sevcik was used to determine the electroactive area.
Different electrode prototypes (with dimensions 2.8 × 1.5 × 0.1 cm) obtained in
the horizontal and vertical modes and with Linear, Heli, Archiemedean, Octagram
and concentric interfacial geometries, with fills of 10 and 100%, were adapted to the
described BIA cell, the seal being obtained by the use of acetic curing silicone glue,
so that the exposed geometric window remained constant throughout all the tests.
Based on the voltammetric profile, as well as the evaluation of the aspects cal-
culated, it was possible to notice that in this impression condition, the electroactive
area (0.070 cm2 , 18.18% of the exposed geometric area −0.385 cm2 ) is almost
432 J. R. Barbosa et al.
4 Final Remarks
References
1. Cinti, S.: Electroanalysis: towards a “laboratory-free” approach. SM Anal. Bioanal. Tech. 1(1),
1004 (2016)
2. Wang, J.: Analytical Electrochemistry. 3ª edição. Weinheim: Ed. Wiley-VCH (2006)
3. Ismail, W.N.M., Matsuda, A.: Electrochemical imprinted sol-gel films detection of organophos-
phate chemical warfare agent. Def. S T Tech. Bull. 8(1), 9–16 (2015)
4. Mahyari, M.: Electrochemical sensing of thiodiglycol, the main hydrolysis product of sulfur
mustard, by using an electrode composed of an ionic liquid, graphene nanosheets and silver
nanoparticles. Microchim. Acta 183(8), 2395–2401 (2016)
5. Sikarwar, B., Shama, P.K., Singh, V.V., Boopathi, M., Singh, B., Jaiswal, Y.K.: Xanthine oxidase
immobilized electrode for electrochemical sensing of chemical warfare agent simulant. Sens.
Lett. 15(3), 227–235 (2017)
6. Elliot, J., Simoska, O., Karasik, S., Shear, J.B., Stevenson, K.J.: Transparent carbon ultrami-
croelectrode arrays for the electrochemical detection of a bacterial warfare toxin, pyocyanin.
Anal. Chem. 89(12), 6285–6289 (2017)
7. Hondred, J.A., Breger, J.C., Aalves, N.J., Trammel, S.A., Walper, S.A., Medintz, I.L., Claussen,
J.C.: Printed graphene electrochemical biosensors fabricated by inkjet maskless lithography
for rapid and sensitive detection of organophosphates. ACS Appl. Mater. Interfaces 10(13),
11125–11134 (2018)
8. Wang, X., Gartia, M.R., Jiang, J., Chang, T.-W., Qian, J., Liu, Y., Liu, X., Liu, G.L.: Audio
jack based miniaturized mobile phone electrochemical sensing platform. Sens. Actuators, B:
Chem. 209, 677–685 (2015)
9. Shim, W., Han, J.-H., Kim, S., Kwon, H.J., Pak, J.: A portable potentiostat with Bluetooth
communication for square wave voltammetry measurement. Trans. Korean Inst. Electr. Eng.
65(4), 622–627 (2016)
10. Fan, Y., Liu, J., Wang, Y., Luo, J., Xu, H., Xu, S., Cai, X.: A wireless point-of-care testing
system for the detection of neuron-specific enolase with microfluidic paper-based analytical
devices. Biosens. Bioelectron. 95, 60–66 (2017)
11. Kanchi, S., Sabela, M.I., Mdluli, P.S., Inamuddin, I., Bisetty, K.: Smartphone based bioanalyt-
ical and diagnosis applications: a review. Biosens. Bioelectron. 102, 136–149 (2018)
12. Ainla, A., Mousavi, M.P.S., Tsaloglou, M.-N., Redston, J., Bell, J.G., Fernández-Abedul, M.T.,
Whitesides, G.M.: Open-source potentiostat for wireless electrochemical detection with smart-
phones. Anal. Chem. 90(10), 6240–6246 (2018)
13. Colozza, N., Kehe, K., Popp, T., Steinritz, D., Moscone, D., Arduini, F.: Paper-based electro-
chemical sensor for on-site detection of the Sulphur mustard. Environ. Sci. Pollut. Res. 1–12
(2018)
14. Buzzetti, P.H.M., Oliveira, G.C., Azevedo, A.L.M., Michel, R.C., Ponzio, E.A., Semaan, F.S.:
Conductive composites as versatile substrates for modeling of interfaces and sensors. In:
Wythers, M.C. (ed.) Advances in Materials Science Research, vol. 21, 1st edn, pp. 1–24.
Nova Science Publisher, New York (2015)
15. Fonseca, C.A., Dos Santos, T.A.D., Resende, A.C., Semaan, F.S.: Paraffin-graphite based com-
posite electrodes as substrate for the electrodeposition of conductive films with analytical pur-
poses. Revista Virtual de Química 5(4), 538–540 (2013)
434 J. R. Barbosa et al.
16. Amorim, R.B.S., Rabelo, A.C., Bottecchia, O.L., Muñoz, A.A., Richter, E.M.: Desenvolvi-
mento, caracterização e aplicação eletroanalítica de um compósito fluido de adesivo epóxi,
grafite e ciclo-hexanona. Quim. Nova 33(6), 1398–1402 (2010)
17. Vasiliev, V.V., Morozov, E.V.: Mechanics and Analysis of Composite Materials, 1st edn. Else-
vier Science Ltd. (2001)
18. Tallman, D.E., Petersen, S.L.: Composite electrodes for electroanalysis: principles and appli-
cations. Electroanalysis 2, 499–510 (1990)
19. McCreery, R.L.: Advanced carbon electrode materials for molecular electrochemistry. Chem.
Rev. 108, 2646–2687 (2008)
20. Corb, I., Manea, F., Radovan, C., Pop, A., Burtica, G., Malchev, P., Picken, S., Schoonman, J.:
Carbon-based composite electrodes: preparation, characterization and application in electro-
analysis. Sensors 7, 2626–2635 (2007)
21. Silva, A.L., Corrêa, M.M., Oliveira, G.C., Michel, R.C., Semaan, F.S., Ponzio, E.A.: Develop-
ment and application of a routine robust graphite/poly(lactic acid) composite electrode for the
fast simultaneous determination of Pb2+ and Cd2+ in jewelry by square wave anodic stripping
voltammetry. New J. Chem. 42, 19537–19547 (2018)
22. Pereira, R.B., Morales, A.R.: Estudo do Comportamento Térmico e Mecânico do PLA Modi-
ficado com Aditivo Nucleante e Modificador de Impacto. Polímeros 24(2), 198–202 (2014)
23. Milde, J., Hrušecký, R., Zaujec, R., Morovič, L., Görög, A.: Research of ABS and PLA materials
in the process of fused deposition modeling method. DAAAM International, Vienna (2017)
24. Kalcher, K., Svancara, I., Buzuk, M., Vytrias, K., Walcarius, A.: Electrochemical sensors and
biosensors based on heterogeneous carbon materials. Monatsh. Chem. 140, 861–889 (2009)
25. Geim, A.K., Novoselov, K.S.: The rise of graphene. Nat. Mater. 6, 183–191 (2007)
26. Rivas, G.A., Rubianes, M.D., Pedano, M.L., Ferreyra, N.F., Luque, G.L., Rodrigues, M.C.,
Miscoria, S.A.: Carbon nanotubes paste electrodes: a new alternative for the development of
electrochemical sensors. Electroanalysis 19(7–8), 823–831 (2007)
27. Miranda-Hernandez, M., González, R.: Characterization of carbon–fullerene–silicone oil com-
posite paste electrodes. Carbon 43(9), 1961–1967 (2005)
28. Scida, K., Stege, P.W., Haby, G., Messina, G.A., García, C.D.: Recent applications of carbon-
based nanomaterials in analytical chemistry: critical review. Anal. Chim. Acta 691(1–2), 6–17
(2011)
29. Vieira, J.E.D., Vilar, E.O.: Grafeno: Uma revisão sobre propriedades, mecanismos de produção
e potenciais aplicações em sistemas energéticos. Revista Eletrônica de Materiais e Processos
11(2), 54–57 (2016)
30. Zarbin, A.J.G., Oliveira, M.M.: Nanoestruturas de carbono (nanotubos, grafeno): quo vadis?
Quim. Nova 36(10), 1533–1539 (2013)
31. Castro, M.O.: Síntese de grafeno pelo método CVD. 84 f. Dissertação de Mestrado em Física.
Departamento de Física, Universidade Federal do Ceará, Ceará (2011)
32. Guo, S., Yang, X., Heuzey, M., Therriault, D.: 3D printing of multifunctional nanocomposite
helical liquid sensor. J. Name 00, 1–3 (2012)
33. Vernadou, D., Vasilopoulos, K.C., Kenanakis, G.: 3D printed graphene-based electrodes with
high electrochemical performance. Appl. Phys. A 123, 623 (2017)
34. Palenzuela, L.C.M., Novotný, F., Krupicka, P., Sofer, Z., Pumera, M.: 3D-printed
graphene/polylactic acid electrodes promise high sensitivity in electroanalysis. Anal. Chem.
(2018)
35. Azevedo, A.L.M., Oliveira, R.S., Ponzio, E.A., Semaan, F.S.: Sensor development exploiting
graphite-epoxy composite as electrode material. In: IOP Conference Series: Materials Science
and Engineering, vol. 97 (2015)
36. Auras, R., Harte, B., Selke, S.: An overview of polylactides as packaging materials. Macromol.
Biosci. 4, 835 (2004)
37. Vidovic, E., Faraguna, F., Jukic, A.: Influence of inorganic fillers on PLA crystallinity and
thermal properties. J. Therm. Anal. Calorim. (2016)
38. Du, Y., Wu, T., Yan, N., Kortschot, M.T., Farnood, R.: Fabrication and characterization of fully
biodegradable natural fiber-reinforced poly (lactic acid) composites. Compos. Part B Eng. 56,
717–723 (2014)
Evaluation of 3D Printing Parameters … 435
39. Van de Velde, K., Kiekens, P.: Biopolymers: overview of several properties and consequences
on their applications. Polym. Test. 21, 433–442 (2002)
40. Kumar, S., Bhatnagar, N., Ghosh, A.K.: Effect of enantiomeric monomeric unit ratio on thermal
and mechanical properties of poly (lactide). Polym. Bull. 73, 2087–2104 (2016)
41. Ceregatti, T., Pecharki, P., Pachekoski, W.M., Becker, D., Dalmolin, C.: Electrical and thermal
properties of PLA/CNT composite films. Revista Matéria 22(3) (2017)
Part XIII
Information and Communication
Technology in Education
Interactive System to Improve the Skills
of Children with Dyslexia: A Preliminary
Study
Abstract This paper describes a virtual system for the strengthening of linguistic
abilities of children with dyslexia. To achieve this objective, an intuitive interface
has been developed. The interface consists of three games (each with three levels
of difficulty), all of them being part of a rehabilitation program. These applications
combine visual and auditory messages that complement each other, in order to pro-
vide an immersive experience and to train more than one of the five senses at a time.
The virtual environment has been developed in Unity 3D software, and the diffusion
of sounds is performed through binaural hearing aids. To evaluate the performance
of the presented proposal, a sample of eight infants (three girls and five boys) with
1 Introduction
Children school performance depends on their physical, emotional sensory, and psy-
chological well-being [1, 2]. When the child suffers from a disorder or syndrome,
their performance drops markedly, as well as its ability to relate to their environment
[3–5]. Among the main learning disorders include dyscalculia, non-verbal learning
disorder (NVT), disortography, dysgraphia, dysphasia, and dyslexia [6, 7]. The latter
affects the development of the infant, preventing him from acquiring efficient reading
and spelling skills despite adequate teaching and the absence of manifest sensorial
and/or neural deficiencies [8]. This language learning disability affects one in five
people in the world, and it can produce anxiety due to the subject imagining scenarios
of mockery or social rejection [9, 10]. They also have difficulty remembering words,
and problems distinguishing certain sounds, so they pronounce words with similar
sounds, and this increases confusion [11]. Determining the origin of this syndrome
coupled with the visual and/or auditory disjunction that it produces has led to the
development of several related investigations. As shown in [8], several prominent
sensory theories of dyslexia are evaluated. Particularly, the effects of experiencing
scarce reading in the brain of affected children are presented as a priority cause. In
[12], a study is presented, which aims to discover the nature of this disorder, and
to achieve this complete brain regions are examined using the non-invasive auditory
P300 paradigm in children with dyslexia and neurotypical controls.
Cases of dyslexia occur in all known languages, although it differs according
to the spelling, which triggers labor problems as well. That is why identifying it
at an early age and carrying out an adequate therapeutic process is a high priority.
In [13], we describe a cognitive behavioral therapy based on mindfulness called
Mindfulness Based Rehabilitation of Reading, Attention & Memory (MBR-RAM
©). It uses techniques of visual meditation to improve attention focusing on formats
assisted by therapists, and practice at home to rehabilitate reading deficits, lack of
visual attention, lack of visual motor coordination, and visual memory. The proposal
was tested in three children between 8 and 10 years of age, obtaining significant
clinical and statistical improvements after a trial period of 6 months. In [14], several
Interactive System to Improve the Skills of Children … 441
technological proposals that seek to remedy the reading difficulties of children who
have this disability are described. “Friendly” features are incorporated for the user,
such as altering the size and format of the text and converting text to speech. As can be
seen in [15], the use of technological tools contributes to the rehabilitation of users.
A book that incorporates a set of mental games, mazes, and coloring pages, ideal for
creative children with dyslexia, ADHD, Asperger syndrome, and autism (volume 3),
is presented. The latter being an interesting proposal that incorporates 180 pages and
that is distributed at an affordable cost to parents. The exponential development of
technology has enabled greater and better benefits to be implemented, in this case
focused on medical applications. The main tools currently available are virtual reality
(VR) and interactive systems [16, 17]. Therefore, in [18] a virtual psychometric tool
for the rehabilitation of patients with dyslexia is presented. Such tool is based on the
Nintendo Wii video game system. The results show that it is a tool that improves
attention, but it has no immediate effect on reading performance, suggesting a longer
protocol as future work.
The standard rehabilitation of this learning disorder involves a classic format of
paper and pencil training, meaning that it presents boring and routine exercises to the
subject. In this context and based on the previously cited studies, this paper proposes
the implementation of a virtual system for the rehabilitation of children suffering
from dyslexia. For this, an application has been developed in Unity software that
incorporates three games with three levels of difficulty each (easy, medium, and
hard), which must be executed in order for a better recovery process. In the first, word
games are presented, allowing the user to develop spelling and reading skills. In the
remaining games, the sense of hearing is added, and through this the identification
words, and if their syllables are in the proper order. In order to corroborate the
performance of this proposal, the respective experimental tests were carried out.
This work is composed of four sections: Sect. 1 describes the introduction and
the works related to the topic. Section 2 shows the description and design of the
implemented system. Section 3 presents the tests and results, and finally in Sect. 4
the conclusions and future work are presented.
2 Methodology
2.1 Materials
Hardware The implemented system has a commercial brand laptop, where the
keyboard and mouse are used as input devices and the screen is the visual output to
the patient. Binaural hearing aids are used to provide complementary therapy with
sound outputs, when it is required. The general diagram of the project is presented
in Fig. 1.
Software The software used for the development of the interactive interface is Unity
3D and its complementary packages. This software has tools that allow the imple-
442 J. Buele et al.
mentation of virtual environments simulating real scenarios. You can develop envi-
ronments in 2D and 3D; in this case, the application is set to work in two dimensions,
since the child’s eye development is not yet complete, and taking into account the
ergonomics. Video games must be executed in order, since the training program has
been carried out with a pre-established sequence.
2.2 Methods
Sample It is made up of eight children (three female and five male), and their demo-
graphic characteristics are described in Table 1. The criteria for the selection of the
sample are: age (between 8 and 12 years) and the diagnosis of dyslexia (with/without
dysgraphia). Exclusion criteria include: presence of other disorders in the educational
setting and other psychological or neurological diseases. Also, there are some visual
deficiency and/or an auditory disorder.
Development of scripts In this section, the development of each one of the imple-
mented scripts are explained, for example, how these flat text files manage the infor-
mation entered by the user and allow him or her to interact with the environment.
Based on the flow diagram presented in Fig. 2, scripts are programmed to perform
the necessary tasks in the proposed rehabilitation program.
Interactive System to Improve the Skills of Children … 443
Procedure In this subsection, the developed games and a brief description are
shown.
(i) In the first game, an incomplete word is presented on the screen and a series of
syllables are placed, and the user has to choose the complement to said word
and thus make sense of it. Figure 5 presents the developed interface.
(ii) In the second game, the child is presented with a word composed of two sylla-
bles, and in parallel, an auditory message is reproduced. It must be determined
if the sound corresponds to the word that is shown on the screen, meaning that
if the order of the syllables is the right one or is the other way around; according
to that, “yes” or “no” is chosen. Figure 6 shows the interface.
(iii) In the third application, a word is played through the headphones and on the
screen two words of two or three syllables (depending on the level of difficulty)
each one are presented. The user has to choose between these two options,
which is the word that has the correct order of their syllables. Figure 7 shows
the developed interface.
3.1 Tests
The participants were subjected to sessions of 30 min, two times per week, for a
period of 5 weeks. Figure 8 shows how the tests were developed in two of the eight
users. For the execution of tasks, it is recommended that a psychologist or educational
therapist conducts the session and supervises each video game. Although it has been
designed intuitively, an adult that is not specialized can direct it. The exercises were
held in private sessions, and outside school hours with the intention of avoiding some
kind of social pressure, and the indications were repeated until the child understands
them.
3.2 Results
At the end of the execution of the games, the interface has an option that exports
the data to a file with a.txt extension. This report contains information detailing the
name of the patient and his score obtained, so that the specialist can verify if there
has been an improvement. In addition, the SUS evaluation test has been applied to
users, also known as the system usability scale created by John Brooke in 1986. The
system usability scale (SUS) provides a reliable and fast tool for the measurement
of usability, thus allowing the evaluation of a wide variety of products and services,
including hardware, software, mobile devices, Web sites, and applications. The SUS
test can be used in small samples with very reliable results and is valid since it can
effectively differentiate between usable and non-usable systems. For this reason,
in the developed application the scores have been normalized in order to obtain a
Interactive System to Improve the Skills of Children … 447
percentile classification, which is (82.5 ± 0.52), and as the obtained result is superior
to 68, it means that the developed system has a good degree of acceptance.
Through this research, patients with dyslexia have been given a virtual tool to
strengthen their linguistic abilities. It is a valid technological proposal because it
has visual and audible feedback to improve concentration and the learning process.
In this way, conventional exercises have been set aside, with the intention of provid-
ing greater understanding, confidence, and better experiences to the student. It should
be clarified that the present work is a preliminary study that shows the development
and application of video games with the use of Unity 3D software in a mixed set of
children. Being an approved system, there are different types of experimental results
in each patient, and it depends on the reactions each of them presents. As a metric
to determine the validity of this prototype, the SUS usability test was implemented,
which has demonstrated that the interface presented to the user is easy to use, intu-
itive, and friendly since it is focused in evaluating infants. As an important remark,
this research has been evaluated from the point of view of the acceptance generated
by this system, but not by evaluating the approach of educational therapy, which is
part of a broader investigation scope.
Despite obtaining positive results, the authors of this research are making mod-
ifications to the system based on the feedback obtained from the comments of the
users. In addition, what is proposed, as future work is to present a more personal-
ized interface that can be applied to a larger sample, also enabling the assessment
of what is the impact it has on adolescents, and even on adults who have this syn-
drome. It should be emphasized that for the test users, 3D games could already be
implemented, which will provide another type of experimental results (Table 2).
Acknowledgements This work was financed in part by Universidad Técnica de Ambato (UTA)
and Dirección de Investigación y Desarrollo (DIDE) under project PFISEI 26.
References
1. Cameron, C.E., Cottone, E.A., Murrah, W.M., Grissmer, D.W.: How are motor skills linked to
children’s school performance and academic achievement? Child. Dev. Perspect. 10(2), 93–98
(2016)
2. Baroutsis, A., Lingard, B.: Counting and comparing school performance: an analysis of media
coverage of PISA in Australia, 2000–2014. J. Educ. Policy 32(4), 432–449 (2017)
3. Björkenstam, E., Dalman, C., Vinnerljung, B., Weitoft, G.R., Walder, D.J., Burström, B.: Child-
hood household dysfunction, school performance and psychiatric care utilisation in young
adults: a register study of 96 399 individuals in Stockholm County. J. Epidemiol. Community
Health 70(5), 473–480 (2016)
4. Skerfving, S., Löfmark, L., Lundh, T., Mikoczy, Z., Strömberg, U.: Late effects of low blood lead
concentrations in children on school performance and cognitive functions. Neurotoxicology
49, 114–120 (2015)
5. Ranning, A., Laursen, T., Agerbo, E., Thorup, A., Hjorthøj, C., Jepsen, J.R.M., Nordentoft,
M.: School performance from primary education in the adolescent offspring of parents with
schizophrenia and bipolar disorder—a national, register-based study. Psychol. Med. 48(12),
1993–2000 (2018)
Interactive System to Improve the Skills of Children … 449
6. Mayes, S.D., Frye, S.S., Breaux, R.P., Calhoun, S.L.: Diagnostic, demographic, and neurocog-
nitive correlates of dysgraphia in students with ADHD, autism, learning disabilities, and neu-
rotypical development. J. Dev. Phys. Disabil. 30, 1–19 (2018)
7. Berninger, V.W., Richards, T.L., Abbott, R.D.: Differential diagnosis of dysgraphia, dyslexia,
and OWL LD: behavioral and neuroimaging evidence. Read. Writ. 28(8), 1119–1153 (2015)
8. Goswami, U.: Sensory theories of developmental dyslexia: three challenges for research. Nat.
Rev. Neurosci. 16(1), 43–54 (2015)
9. Eden, G.F., Olulade, O.A., Evans, T.M., Krafnick, A.J., Alkire, D.R.: Developmental dyslexia.
Neurobiol. Lang. 815–826 (2016)
10. Knoop-van Campen, C.A., Segers, E., Verhoeven, L.: The modality and redundancy effects in
multimedia learning in children with dyslexia. Dyslexia 24(2), 140–155 (2018)
11. Diamanti, V., Goulandris, N., Stuart, M., Campbell, R., Protopapas, A.: Tracking the effects of
dyslexia in reading and spelling development: a longitudinal study of Greek readers. Dyslexia
24(2), 170–189 (2018)
12. Papagiannopoulou, E.A., Lagopoulos, J.: P300 event-related potentials in children with
dyslexia. Ann. Dyslexia 67(1), 99–108 (2017)
13. Pradhan, B., Parikh, T., Sahoo, M., Selznick, R., Goodman, M.: Current understanding of
dyslexia and pilot data on efficacy of a mindfulness based psychotherapy (MBR-RAM) model.
Adolesc. Psychiatry 7(1), 44–55 (2017)
14. Caute, A., Cruice, M., Marshall, J., Monnelly, K., Wilson, S., Woolf, C.: Assistive technology
approaches to reading therapy for people with acquired dyslexia. Aphasiology 32(sup1), 40–42
(2018)
15. Brown, S.J., Games, D.: Brain Games, Mazes & Coloring Pages-Homeschooling with
Minecraft: Dyslexia Games Presents an Activity Book-Great for Creative Kids with Dyslexia,
ADHD, Asperger’s Syndrome and Autism, vol. 3. ACM, USA (2018)
16. Ali, M., et al.: iCBLS: an interactive case-based learning system for medical education. Int. J.
Med. Informatics 109, 55–69 (2018)
17. Renganathan, S.M., Stewart, C., Perez, A., Rao, R., Braaten, B.: Preliminary results on an
interactive learning tool for early algebra education. In: 2017 IEEE Frontiers in Education
Conference (FIE), pp. 1–5. IEEE (2017)
18. Pedroli, E., Padula, P., Guala, A., Meardi, M.T., Riva, G., Albani, G.: A psychometric tool for
a virtual reality rehabilitation approach for dyslexia. Comput. Math. Methods Med. 2017, 1–6
(2017)
Use of Information and Communication
Technologies in the Classroom:
An Exploratory Study in Professional
Military Education
Abstract The study focuses on the use of information and communication technolo-
gies in professional military education, delimited to the present moment and to the
current professors and students of the Portuguese Armed Forces Military University
Institute. This study aims to analyse the relationship between ICT and teaching–learn-
ing methodologies in the context of professional military education, with emphasis
on the concept of innovation in the classroom, on teaching–learning styles and on the
role of ICTs in learning. The study is based on a mixed research strategy combining
deductive and inductive approaches, materialized in a case study, with data collected
through questionnaires, interviews and documentary analysis. This article focuses on
the conceptual framework and its interconnection with the methodological strategy
for the empirical study. The results presented refer to the pilot validation test of the
data collection instruments and indicate that, in general, students and teachers share
the same teaching–learning styles, both students and teachers show a good propen-
sity to use ICT in the classroom and an almost complete substitution of traditional
lessons, lectures and conferences by distance learning with a face-to-face approach
in the discussion of case studies is possible.
1 Introduction
1 The traditional classroom concept presents it as a space, usually a room of variable dimensions,
with environmental, dispositional, work and study conditions, where the formal teaching–learning
process takes place, whose development dates back to the century with the democratization of access
to education [1]. The “Classroom” concept of the future was created in 2011 under the iTEC Project
under the coordination of the European Schoolnet, with the purpose of designing a new proposal of
organization of classroom space and practices, by harmonious conjugation of three key elements:
space, technology and pedagogy [2].
Use of Information and Communication Technologies … 453
2. What are the attitudes of students and teachers towards the use of ICT in the
“classroom”, what is the relationship between them, and how do they contribute
to the teaching–learning process?
3. Which, among the new ICT teaching–learning methodologies, are the most
appropriate to the curricular contents of the PME?
In the present article we intend, essentially, to develop the conceptual framework
and its interconnection with the methodological strategy, that is, the definition of the
instruments of data collection for the complete empirical study to be developed. In this
way, the results presented now refer to the validation pilot test. To this end, the article
is structured in three chapters, besides the introduction and conclusion. Initially, a
review of the literature is done, highlighting the PME new challenges facing the
VUCA2 context of today, the importance of technology in the development of new
teaching–learning methodologies, the emergence of new learning environments, the
teaching–learning styles and the acceptance of the technology. Secondly, a detailed
description of how the study is being conducted is given, including an explanation
of the concepts and the operationalization of the variables under study. Next, the
preliminary data collected are summarized, characterizing the sample and analysing
the relevance of the data collected.
2 Literature Review
2 Concept introduced by US Army War College to describe the multilateral world resulting from
the end of the Cold War: Volatile, Uncertain, Complex and Ambiguous.
454 N. A. R. S. Loureiro and L. A. B. dos Santos
In the classroom, technology can span all types of tools. The latest technologies
allow us to experiment classroom methodologies, both physical and virtual, that
were not previously possible, depending fundamentally on what we want to accom-
plish. Teaching with technology can deepen student learning by supporting training
objectives. However, it can be a huge challenge to select the “best” technology tools
without losing sight of the learning objectives. Once identified, the integration of
these tools can also be another challenge, although it can become an experience with
high educational returns.
Referring to WEB 2.0 technology, Foon Hew and Sum Cheung [9] affirm that this
is an interactive tool that facilitates bidirectional interaction, requiring the students
to contribute to the placement of information on the site available, interacting and
sharing their ideas and knowledge in a collaborative way. According to the authors,
the technological tools of WEB 2.0 allow teachers to apply a constructivist approach
to teaching–learning. There are three possible ways to use WEB 2.0 tools within the
scope of teaching: Blogger; Active Worlds; and Teachertube [9, 10 cited by 11].
Pinel [12] states that students are required to acquire twenty-first century ICT skills
because they are related to the real world, develop as students construct knowledge,
to contribute to society.
An Australian publication on educational technology edited by Education Tech-
nology Solutions (ETS), recently published an online article entitled Technology
That Will Shape Education In 2017, in which it present a guide to the main trends
in educational technology that will have a relevant impact on way of learning and
teaching. The way in which education professionals learn, teach and collaborate is
changing significantly with the emergence of new technologies, such as virtual real-
ity, augmented reality, learn from anywhere, teaching from anywhere mobile devices,
collaboration technology, gamification, coding, evolving learning spaces and styles
and the maker movement [13].
The assimilation and processing of information and knowledge are different from
individual to individual. They can do this by seeing or hearing, reflecting or acting,
reasoning in a logical or intuitive way and analysing or visualizing. Students have dif-
ferent strengths and preferences in how they receive and process information, which
means that they have different learning styles [11, 14]. Teaching methodologies also
vary, with some teachers preferring lectures and others favouring demonstration or
leading students to self-discovery; some focus on principles and others on applica-
tions; some emphasize memory and others emphasize understanding.
Difficulties arise when there are incompatibilities between the student’s learning
style and the teacher’s teaching style; students may become bored and inattentive in
class, poor test performance, and lose motivation regarding courses or curriculum
[15–17]. Empirical studies have confirmed the hypothesis that teachers who are able
to adapt their teaching style to include the two poles of each dimension, ideal for
most (if not all) students in a class, are more effective [14].
456 N. A. R. S. Loureiro and L. A. B. dos Santos
The Felder and Silverman model, in the 2002 update [18], ranks a student’s learn-
ing style from one category or another in each of the four dimensions through the
answers given to four questions:
1. What kind of information the student preferentially perceives: sensory (visions,
sounds, physical sensations, concrete, practical, fact-oriented and intuitive think-
ing) or intuitive (possibilities, perceptions, hunches, abstract thinking, innovative,
oriented to theories and meanings underlying)?
2. Through which sensitive channel is the most effectively perceived external infor-
mation: visual (prefer visual representations of displayed material such as figures,
diagrams, flowcharts, graphs and demonstrations) or verbal (prefer written and
spoken explanations)?
3. How does the student prefer to process information: actively (through involve-
ment in physical activity or discussion, experiencing things and working in
groups) or reflexively (through introspection, prefer to work alone or with a
single family partner)?
4. How does the student progress towards understanding: sequentially (linear think-
ing process and learning in small incremental steps in continuous steps) or glob-
ally (holistic thinking process and learning in big leaps)?
The same model states that teaching style can also be defined, in one or another
category of each of the four dimensions, in terms of answers to four questions:
1. What kind of information is emphasized by the teacher: concrete (factual) or
abstract (conceptual, theoretical)?
2. Which form of presentation is preferred by the teacher: visual (visual images,
diagrams, films and demonstrations) or verbal (verbal talks, readings and discus-
sions)?
3. What mode of student participation is facilitated by the teacher’s presentation:
active (do students speak, move and reflect) or passive (do students watch and
listen)?
4. What kind of perspective is provided on the information presented: sequential
(step-by-step, showing “the trees”) or global (relevance (presenting “the forest”)?
Table 1 (see Appendix) summarizes learning and teaching styles in their different
dimensions and categories, as proposed by Felder and Silverman [18].
The Index of Learning Styles is an online research tool used to evaluate pref-
erences in four dimensions (active/reflexive, sensory/intuitive, visual/verbal and
sequential/global), built from the model of learning styles formulated by Felder and
Silverman [11, 18]. The scale was developed and validated by Felder and Soloman
[15–17]. In their original version, respondents answer online to 44 questions, with
two alternative answers, “a” and “b”, and submit responses online, and receive a
report on their preferences regarding the four dimensions under review.
Use of Information and Communication Technologies … 457
Acceptance of technology results from users’ beliefs and attitudes about their use,
which was measured with the perceived utility and perceived ease of use in the
technology acceptance model (TAM) [19, 20]. The Technology Acceptance Barriers
questionnaire is an instrument that intends to measure the extent and nature of the
barriers to the integration of ICT in the perspective of technology acceptance, com-
piled by Gu, Zhu, and Guo [21] into four constructs often referred to as predictors
of ICT acceptance: expectation of results, adjustment of technology to task, social
factor and personal factor.
Outcome expectancy (OE) results from internal beliefs and attitudes about the
use of ICT, and it is measured as perceived utility and perceived ease of use, being
considered the most important predictor of the use of technology [20, 22, 23]. Task-
technology fit (TTF) is the degree to which technology helps an individual to accom-
plish his or her tasks [24]. It is based on the assumption that users accept the technol-
ogy because of its potential benefits, such as performance improvement, regardless
of their attitude. Social factor (SF) is a type of social norm defined as “perceived
social pressure to carry out behaviour or not” [25, 26]. Studies suggest that perceived
social influence has a significant positive influence on individual beliefs about the
usefulness of technology and positively and significantly affects the use of ICTs
[22, 27, 28]. Personal factors (PF) construct includes computer self-efficacy and per-
sonal innovation through technology, widely recognized as explanatory factors that
influence the use of IT by end-users [27, 28].
3 Methodology
3.1 Questionnaire
For the empirical study, a data collection instrument was prepared based on the
following scales: (1) Index of Learning Styles (ILS), proposed by Soloman and Felder
[17]; and (2) Technology Acceptance Barriers (TAB), proposed by Gu, Zhu, and Guo
[21]. It was also complemented by ad hoc items designed to collect biographical and
professional data on the one hand and, on the other hand, to verify the traditional
teaching methodologies currently used in curricular areas and to identify the most
appropriate ICT-based teaching methodologies to each of the specific curricular areas.
In the present case, the scales were adapted to the Portuguese language and to the
military context.
In order to develop a comparative analysis between preferences of learning styles
and teaching styles between students and teachers, the results of the ILS question-
naire were transformed into a seven-point Likert scale, according to Table 6 (see
Appendix—Table 6).
All items of TAB questionnaire were also measured using a seven-point Likert
scale ranging from “strongly agree” to “strongly disagree”.
Regarding the ad hoc items introduced in the questionnaire, some asked the
respondent to choose the three most traditional teaching methodologies3 currently
used in each curricular area; others asked the respondent to choose the three ICT-
based teaching methodologies4 best suited to each of the specific curricular areas.
The questionnaire, necessarily different between students and teachers, after a
brief introduction, explaining the objectives of the study and guaranteeing the treat-
ment of the data in an anonymous and confidential way, and its exclusive use for the
mentioned effects, was thus composed of the four sections shown in Table 2 (see
Appendix).
In order to adapt the questionnaire formulation to the Portuguese language and the
military context, three sequential stages were followed: (1) translation and retrover-
sion, (2) pretest and (3) pilot test. As the items were initially expressed in the English
language, the retroversion was applied to guarantee a precise translation into Por-
tuguese. Subsequently, a pretest was applied, using a small number of respondents
(focus group) to test the adequacy of the questions and their comprehension. This
focal group, consisting of 10 subjects from each course (30 participants) suggested
some modifications in the items of the questionnaire, in order to be better understood
by the target population. After the pretest, a pilot test was performed and submitted
to all individuals of the SOC, JSC and FOC of the 2017/2018 school year, whose
objective was to test the reliability of the items (consistency).
cation work/application work group; CPX/CAX computer assisted; field exercises; field trip;
seminar/panel/symposium; workshop; lecture/ conference/cycle of conferences; presentation and
defence of work.
4 Digital Book; ongoing training online; gamification; project-based learning (PBL); case study;
team-based learning (TBL); flipped classroom; coding; virtual reality; computer-based training
(CBT); augmented reality; learn from anywhere/teach from anywhere mobile devices.
Use of Information and Communication Technologies … 459
The pilot test universe consisted of 76 teachers and 225 students. The questionnaire
was answered by 46 teachers and 150 students. After validation of the answers given,
there were some errors and incongruities, which led to the elimination of some of
them. The final number of validated respondents was 24 teachers and 124 students,
corresponding, respectively, to 31.6 and 56.4% of the target population. Their demo-
graphic and professional characteristics can be seen in Table 3 (see Appendix).
As preliminary results from a pilot test, they should be interpreted as exploratory
data for the preparation of the questionnaire that will be submitted to the target
population of the study, SOC, JSC and FOC students of the 2018/2019 school year.
Reliability was estimated by the Cronbach’s alpha coefficient, and the items of
the study achieved a reliable result (ILS > 0.60, use of ICT > 0.97).
The answers to the questionnaire were, therefore, submitted to a first analysis,
using the statistical package for the social sciences (SPSS V.23) with regard to
descriptive statistics and comparative analysis of means, centred on two aspects:
(1) analysis of learning style profiles and (2) analysis of the barriers to the use of
ICT in the “Classroom”.
the “Visual” style in the “Input” dimension, and also, in the case of the SOC and JSC
students, a moderate or strong style preference of “Sensory” perception, not being
followed by the teachers in this preference. Particular attention should be given to
these situations.
Therefore, with regard to global learning and teaching styles (see
Appendix—Table 7), and by gender (see Appendix—Table 8), the results indicate
no significant differences in the preferences and attitudes of students and teachers.
According to the branch of the armed forces to which the respondents belong
(see Appendix—Table 9), the results indicate significant differences in the air force
branch in the dimensions of “Perception/Content”, “Input/Presentation” and “Un-
derstanding/Perspective”.
According to the age group to which the respondents belong (see
Appendix—Table 10), the results indicate significant differences in the 51–55 group
in the four dimensions.
According to the course the respondents attend/teach (see
Appendix—Table 11), the results indicate no significant differences in the
preferences and attitudes of students and teachers, except in the dimension
“Understanding/Perspective” within the FOC students and teachers.
According to the effective service time to which the respondents belong (see
Appendix—Table 12), the results indicate significant differences in the 31–35 group
in the four dimensions.
Given the results of the data collected, both pupils and teachers indicate a good
outcome expectation with the use of ICT in the “Classroom”, consider ICT rea-
sonably adjusted for use in the context of professional military training, consider
themselves capable of to use and consequently accept the introduction of technology
into teaching–learning processes. The deepening of this study will allow us to see
how concretely it can be done.
Taking into account the preliminary results achieved (see Appendix—Tables 13, 14
and 15), whereas in the SOC, the most used traditional teaching–learning method-
ologies are the “Lesson/Lesson-debate”, followed by “Directed Discussion/Learning
Discussion/Topic Discussion” and “Lecture/Conference/Lecture Series”, in JSC
preference is given to “Directed Discussion/Learning Discussion/Topic Discussion”,
followed by “Lesson/Lesson-debate” and “Lecture/Conference/Lecture Series”. This
Use of Information and Communication Technologies … 461
4 Conclusions
Appendix
Organization
– Military 1 3 2 3 2 1
Strategy
– Public 1 2 3 1 2 3
International
Law
– Military History 1 2 3 1 2 3
of Portugal
– Military Units 2 1 3 1 3 2
Framework
– Military 1 2 3 3 2 1
Operations
Planning
467
Table 14 JSC results on teaching methodologies
468
Teaching methodologies
Traditional ICT-based
– Lesson/ – Lecture/ – Directed – Exercises of – Digital – Continuing – Case – Team Based
Lesson- Conference/ Discussion/ Computer Book Education Study Learning
Debate Lecture Learning Assisted Online (TBL)
Series Discussion/ Command
Topic Posts
Discussion (CPX/CAX)
– Organizations 2 3 1 1 2 3
Management
– Resource 1 3 2 1 2 3
Management
– Command and 2 3 1 3 2 1
Leadership
– Communication 1 3 2 3 1 2
and Public
Relations
– Public 1 3 2 1 2 3
International Law
– Geopolitics 2 3 1 2 1 3
– International 3 2 1 1 2 3
Context
– War and Peace 3 1 2 1 2 3
(continued)
N. A. R. S. Loureiro and L. A. B. dos Santos
Table 14 (continued)
Teaching methodologies
Traditional ICT-based
– Lesson/ – Lecture/ – Directed – Exercises of – Digital – Continuing – Case – Team Based
Lesson- Conference/ Discussion/ Computer Book Education Study Learning
Debate Lecture Learning Assisted Online (TBL)
Series Discussion/ Command
Topic Posts
Discussion (CPX/CAX)
– Military History 1 2 3 1 2 3
– Strategic Planning 1 3 2 2 1 3
– Strategic Studies 2 3 1 1 2 3
– Doctrinal 2 3 1 2 1 3
Operations
Framework
– National 1 2 3 2 3 1
Use of Information and Communication Technologies …
Operations
Planning
– Operational 2 3 1 2 1 3
Management
– Exercise Planning 1 2 3 1 2 1
and Conduct
469
Table 15 FOC results on teaching methodologies
470
Teaching Methodologies
Traditional ICT-based
– Lesson/ – Lecture/ – Directed – Exercises of – Academic – Digital – Continuing – Case Study – Team Based
Lesson- Conference/ Discussion/ Computer Seminar/ Book Education Learning
Debate Lecture Learning Assisted Panel/ Online (TBL)
Series Discussion/ Command Symposium
Topic Posts
Discussion (CPX/CAX)
– The Strategic 3 2 1 1 2 3
Programming Model
– Threats and Conflicts 2 1 3 2 3 1
– Strategic Objectives 3 2 1 2 3
and Interests
– Means and Strategic 3 2 1 3 2
Instruments
– Strands of the 3 2 1 2 3
National Strategy
– Organizational 3 2 1 3 2
Management and
Resource
Management
– Superior 3 2 1 2 3
Organization of the
Armed Forces
– Administrative Law 2 3 1 2 3
(continued)
N. A. R. S. Loureiro and L. A. B. dos Santos
Table 15 (continued)
Teaching Methodologies
Traditional ICT-based
– Lesson/ – Lecture/ – Directed – Exercises of – Academic – Digital – Continuing – Case Study – Team Based
Lesson- Conference/ Discussion/ Computer Seminar/ Book Education Learning
Debate Lecture Learning Assisted Panel/ Online (TBL)
Series Discussion/ Command Symposium
Topic Posts
Discussion (CPX/CAX)
– Communication and 1 3 2 2 3
Media Relations
– Command and 3 2 1 3 1 2
Leadership
– Economy and 2 1 3 1 2 3
Finance
– Joint and Combined 2 3 1 2 3 1
Operations
– Operational Planning 2 1 3 3 1 2
Use of Information and Communication Technologies …
Exercise
– Operational Activity 2 3 1 3 1 2
of the Armed Forces
471
472 N. A. R. S. Loureiro and L. A. B. dos Santos
References
1. Garrido, A.: Errar é humano! A vivência de erros e seus efeitos na produção oral sob a per-
spectiva do aluno de Inglês como Língua Estrangeira.pdf (2006)
2. Lewin, C., McNicol, S.: Criar a Sala de Aula do Futuro: conclusões do projeto iTEC (2014)
3. Moskos, C.C., Williams, J.A., Segal, D.R.: The Postmodern Military: Armed Forces After the
Cold War. Oxford University Press on Demand (2000)
4. Exército Português: Manual Didático (MD) 240-01 Qualidade da Formação (2014)
5. Downes, C.: Rapidly evolving, digitally-enabled learning environments: implications for insti-
tutional leaders, educators and students. In: Doughty, R., Wells, L., and Hailes, T. (eds.) Inno-
vative Learning: A Key to National Security. pp. 101–132. Army Press (2015)
6. Denning, P.J., Higgins, S.L.: Being in uncertainty: cultivating a new sensibility in military
education. In: Doughty, R., Wells, L.I., Hailes, T. (eds.) Innovative Learning: A Key to National
Security. pp. 133–154 (2015)
7. Neal, D.J.: Technology and its impact on defense/security thinking and learning intervention
issues. In: Doughty, R., Wells, L.I., Hailes, T. (eds.) Innovative Learning: A Key to National
Security. pp. 155–170 (2015)
8. Schatz, S., Fautua, D.T., Stodd, J., Reitz, E.: The Changing Face of Military Learning. The
Army Press
9. Foon Hew, K., Sum Cheung, W.: Use of Web 2.0 Technologies in K-12 and Higher Education:
The Search for Evidence-Based Practice (2013)
10. Bower, M., Hedberg, J., Kuswara, A.: A framework for Web 2.0 learning design. Educ. Media
Int. 47, 177–198 (2010)
11. Felder, R., Silverman, L.: Learning and teaching styles in engineering education. Eng. Educ.
78, 674–681 (1988)
12. Pinel, S.: Bringing It All Together: Literacy, ICT and the 21st Century Skills
13. Low, M.L.: Technology That Will Shape Education In 2017
14. Felder, R., Spurlin, J.: Application, reliability and validity of the index of learning styles. Int.
J. Eng. Educ. 21, 103–112 (2005)
15. Soloman, B.A., Felder, R.: Index of Learning Styles Questionnaire, pp. 1–5. NC State Univer-
sity. North Carolina State University (1996)
16. Soloman, B.A., Felder, R.: Index of Learning Styles Questionnaire (1999)
17. Felder, R.M., Soloman, B.A.: Learning Styles and Strategies (2012)
18. Felder, R., Silverman, L.: Learning and Teaching Styles In Engineering Education (2002)
19. Davis, F.D.: A Technology Acceptance Model for Empirically Testing New End-User Infor-
mation Systems: Theory and Results (1985)
20. Venkatesh, V., Smith, R.H., Morris, M.G., Davis, G.B., Davis, F.D., Walton, S.M.: User Accep-
tance of Information Technology: Toward a Unified View (2003)
21. Gu, X., Zhu, Y., Guo, X.: Meeting the “digital natives”: understanding the acceptance of
technology in classrooms. Educ. Technol. Soc. 16, 392–402 (2013)
22. Kim, C., Jahng, J., Lee, J.: An empirical investigation into the utilization-based information
technology success model: Integrating task-performance and social influence perspective. J.
Inf. Technol. 22, 152–160 (2007)
23. Lee, M.C.: Explaining and predicting users’ continuance intention toward e-learning: an exten-
sion of the expectation-confirmation model. Comput. Educ. 54, 506–516 (2010)
24. Goodhue, D.L.;, Thompson, R.L.: Task-technology fit and individual performance (1995)
25. Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179–211
(1991)
26. Ajzen, I.: The theory of planned behavior. Orgn. Behav. Hum. Decis. Process. 50, 179–211
(1991)
27. Lewis, W., Agarwal, R., Sambamurthy, V.: Sources of influence on beliefs about information
technology use: an empirical study of knowledge workers. MIS Q. 657–678 (2003)
Use of Information and Communication Technologies … 473
28. Thompson, R., Compeau, D., Higgins, C., Lupton, N.: Intentions to use information technolo-
gies: an integrative model. In: End User Computing Challenges and Technologies: Emerging
Tools and Applications: Emerging Tools and Applications vol. 18, pp. 79–101 (2007)
29. Creswell, J.: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches
(2013)
30. Quivy, R., Campenhoudt, L.: Manual de Investigação em Ciências Sociais. Gradiva, Lisboa
(2008)
31. Creswell, J.: Educational research: Planning, Conducting, and Evaluating Quantitative and
Qualitative Research. University of Nebraska–Lincoln (2012)
32. Bryman, A.: Quantity and Quality in Social Research. Taylor & Francis e-Library, 2004, New
York (1988)
Using Augmented Reality for Learning
Naval Operations
1 Introduction
The augmented reality (AR) aims for a more interactive communication, closer to a
real environment, such as the simulation of the actual presence of people and objects,
or the presentation and manipulation of virtual objects close to the interlocutor with
whom the communication is done. The characteristics that define AR are the com-
bination of real and virtual, real-time interactivity, and the 3D experience [1]. With
AR, it is possible to improve the human senses by enriching the real world with
virtual information (dynamic images, spatial sounds, and haptic sensations), gener-
ated by computer in real time and positioned in space through special technological
devices [1]. So, AR aims at greater integration between the user and the display
device. This symbiosis intends more easiness in information sharing of presented in
the devices, namely with greater authenticity in the projection of game scenarios and
teaching/training contents [2].
The benefits obtained with AR are translated on an improved performance of
everyday tasks when people wearing AR device access, for example, for an on-screen
projection of contextualized information that help them to perform complex tasks.
In real or simulated war scenarios, the potentialities of AR are evident, namely in the
situational awareness of a conflict scenario and in support of the decision-making
process of the forces in the operations theater.
In the navy, the garrison of a ship needs to train in different scenarios, as closer as
possible to real situations in order to obtain a high degree of readiness. The training
on board of a ship enables the consolidation of knowledge, previously acquired,
through practice. One of the important skills to exercise is the maneuvers of the ship
in the context of a naval force.
Training is thus a basic requirement for the readiness of the ship’s crew. When the
training is performed in real environment, it is usually carried out at the stations on
board, whether the ship is part of a fleet or is standalone. Being this the ideal training
situation, however, there are obstacles to its full realization, namely the cost that is
involved navigation of several ships in open sea. An alternative to overcome this
drawback is the training in simulators or in simulated environments. As examples of
the creation of total or partially virtualized scenarios, we can have a ship (isolated or as
part of a fleet of virtual or real ships), training procedures of the ship or fleet regarding,
among others, damage limitation, battle stations for one or multiple threats (aerial,
submarine, and surface), maneuvers and evolutions, tactical operations, refueling
operations, or navigation in restricted waters.
This paper intends to report a work carried out aimed at the construction of an
AR application, to support the teaching and learning of vessel’s maneuvers in naval
formations. The article was developed in six sections. In this section, we presented the
motivation for the theme. In the second section, the technical characteristics of AR
are presented, as well as some of the existing applications in the context of the armed
forces. The methodology used for the development of the AR application is also
presented. The third section describes the process of collecting functionalities from
the target users and details the steps developed in the construction of the proposed AR
solution. The fourth section presents the process of validation of the built solution,
based on a survey designed to obtain feedback from users. Finally, in the last section,
we present the conclusions and the future work.
Using Augmented Reality for Learning Naval Operations 477
The AR technology offers applications for purposes both recreational and profes-
sional, related, the latter, with military areas. AR began by demonstrating its potential,
especially in the area of aviation, both military and civil. The U.S. Air Force took
the first steps in using this technology with the creation of teams to work on the
creation of systems to assist the pilot during the flight and in the definition of firing
angles. With the heads-up display (HUD) system, it was possible for the pilots to
make a more precise firing line on the targets, performing the necessary calculations
for the effect [4]. This system displays the information in a transparent fixed area,
with the observer having only one viewing angle for information reading. In military
aviation, head-mounted displays (HMDs) are replacing HUDs with other advantages
and features, such as an allowed higher viewing angle [4].
478 A. Correia et al.
In the case of the navy, there are numerous developments in this field. A helmet for
divers allows the clarification of the information in an underwater environment, as
well as the help and explanation in the assembly of equipment [5]. Another project,
GunnAR [6], allows a remotely transmitted firing order to appear on the visor of the
helmet intended for machine gun operators aboard ships. Also, for land forces there
are helmet projects for aiding and simplifying tactical scenarios, making training
more realistic [7].
In the specific area of navigation, AR applications were developed for navigation
aids (see Fig. 1). With the common objective of making the navigation more secure
and avoiding accidents at sea, these programs mainly aim to identify dangers and
ships in transit, allowing a better clarification of the situation. This type of aids
facilitates the work of the ship, mainly the larger ones, especially in situations of
greater traffic such as the entry and exit of ports [8]. Another project is the one of
building a ship bridge equipped with AR technology, capable of notifying warnings
to navigation, dangers in the area and meteorological warnings, in order to guarantee
the safety and facilitate the crossing of the ships, especially in situations of increased
danger as in arctic navigation [9].
In areas important for navigation and subsistence of a ship at sea, assistance can be
provided with the support of AR goggles allowing technicians an efficient installation
or assembly of intended equipment (e.g., antennas) [11].
Frequent meetings were held with the project coordinator to monitor the work.
At the end of each sprint, a meeting was held with all the elements that contributed
to the sprint, team and users, where the result obtained in the sprint was presented.
Finally, the completed solution was been demonstrated to users for experimentation
and feedback. This feedback will contribute to the subsequent development of the
work in order to improve, in the following sprints and in a new cycle, aspects less
achieved in the solution to date.
3 Solution Development
The AR application being build was intended to be a proof of concept for learning
ship maneuvers in orderly formations, according to ATP I Vol. II [14]. The aim of
the application was also, besides teaching the trainees about maneuvers of ships, a
demonstration of the potential of AR on naval training.
In order to ensure that the requirements of the solution were aligned with the
needs of the learning process, a requirements’ collecting was made among seasoned
students of a navy academy. The information was collected through brainstorming
sessions with answers obtained, validated later through a questionnaire.
The collected requirements, for the application of AR, to be developed were as
follows: (a) the minimum number of vessels, in order to make the movement of
vessels and the final formation disposition noticeable, should be 3 vessels; (b) the
perspective (position and viewing angle) to observe the evolution of the formation
should be flexible, allowing different positions and angles (bow, stern, and cross);
(c) the virtual image should emerge from a sheet, allowing to be observable from all
angles; (d) the user should be able to interact with the virtual objects; (e) it should be
possible to select different weather conditions without affecting the visibility of the
objects in the scenario or the response time of the application; (f) the representation
of the guide vessel should be different from the other ships of the formation, since the
latter takes different behaviors from the other vessels in the different formations; (g)
before the ships move, they should take a position at an initial in-line formation and
the virtual ships maneuver, adopting trajectories to occupy the selected formation,
with each vessel acting independently; (h) the type of mark used to trigger the display
of the virtual formation should be a mark inserted imperceptibly in the scenario; (i)
the characteristics of the devices that users prefer to use are head-mounted displays
and handheld displays (smart phones), because they are portable.
Based on the user requirements raised, sketches, on the form of use cases, were
drawn up regarding the maneuvers of the virtual vessels in formations. The movement
of the ships was to be triggered after the reading, by the smart phone, of artificial
mark specific of each use case.
An example of a use case, the outline of which is shown in Fig. 3 is the FORM
E formation, where the vessels maneuver in order to arrive at the depicted final
formation. Starting from a straight formation, ships will slightly open the bow and
hold it, passing to a final position on the front ship’s wing. The first ship of the
Using Augmented Reality for Learning Naval Operations 481
formation, which will be the guide ship, keeps its movement and bow. Paired vessels
will be placed on the port side of the guide, with a 4° opening in the wing. The
odd ships will form with a 2° aperture in the starboard wing of the guide ship. In
the sketch presented in Fig. 3, the ships appear viewed from above; however, in the
developed application, they can be seen from all positions, including the vertical.
Based on the Scrum methodology, the solution was built through several sprints,
in which it was possible to improve the functionality and graphic design of the
application, with the contribution and feedback received from the users.
The requirements collected were implemented in an AR application developed
with the support of the Unity platform with Vuforia [15]. This integrated development
environment (IDE) supports multimedia development and possesses a wide range of
functionalities that facilitate the creation of AR/VR products.
The implementation of the solution was based on the following technical options:
(a) creation of the ship formation by mixing the real and virtual scenarios (see Fig. 4);
(b) recognition of the marks of the formations residing in a database (see Fig. 5);
(c) movement of vessels in the formations; (d) precipitation and rough sea in pre-
defined scenarios (see Fig. 6); (e) observation of the formation within the mark
detection distance (see Fig. 4).
4 Results’ Validation
In the end of the development process, it was intended to verify if the built solution
satisfies the requirements defined by the users. For this purpose, data obtained from
a survey of 40 respondents were analyzed, most of them, seasoned students from the
naval academy. Most of the respondents had already accompanied naval operations on
the bridge of a ship, where they can have a better visual perception of the maneuvers
of the ships.
In an initial phase of the survey, the knowledge of the respondents was scored
regarding how well they knew the maneuvers and evolutions, without consulting any
supporting material. Through a set of questions, where one could visualize images of
Using Augmented Reality for Learning Naval Operations 483
different naval formations, it was intended that the respondents were able to match the
images and the name of the formation. Most of the answers were incorrect, revealing
lack of consolidated knowledge, of the sample of respondents, regarding the depicted
maneuvers and evolutions of ships.
The following questions of the survey were answered after a previous visualization
of the AR solution and observation of the evolution of the formations evolving. It
was intended to verify whether the respondents understood the operation with the AR
solution, had seized the presented information, and improved their knowledge on the
subject. After viewing the solution, the correct response rate increased considerably.
The percentage of correct answers was above 80%. The results seemed to indicate
effectiveness in the transmission of the concepts through the AR solution and greater
knowledge capture by the respondents.
In order to statistically validate the respondents’ answers, we proceeded to the
development of hypothesis tests. It was intended to test, if it is right to generalize to
the overall population, the average opinion of the answers obtained in the sample.
As random variable of the statistical distribution, it was considered the answer to
questions posed questions, with values ranging from 1 (weak) to 6 (very good). For
the questions posed, it was intended to validate statistically if the mean of responses
was above the value 3 (satisfies).
In the presence of a sample and ignoring the mean and the variance of the popu-
lation, the t-test was used in hypotheses tests. The tests were unidirectional, with an
alpha significance level of 0.05. With these assumptions, we tested the hypothesis
regarding the question: Is the AR built solution effective for learning naval opera-
tions?
In order to evaluate the statistical significance of the results, hypothesis tests were
performed (see Table 1), to the answers obtained to the following questions in the
484 A. Correia et al.
survey: (1P) the visualization of the images in the AR application improves the
knowledge about the movement of ships in formations? (2P) the realism of the AR
application improves the learning of formations? (3P) the AR solution demonstrates
with quality the evolution of the formations?
To reject H 0 (α ≤ 3), it would be necessary to have t > critical value, that
is, t > 1.685, which happens for all the questions, so H 0 was rejected. Like-
wise, P one-tailed must be less than alpha (0.05) to reject H 0 , which is also
true for the three questions. It can therefore be concluded that for the col-
lected sample, H 0 should be rejected for the three questions, and therefore,
H 0 should also be rejected for Q1. The results allowed to conclude that one
cannot reject the hypothesis that the constructed AR solution is effective for the
teaching of naval operations.
5 Conclusion
This paper describes the work carried out in order to build an AR application to
support the teaching and learning of vessel maneuvers in naval formations. In the
context of the present work, a handheld display (smart phone) was used as an AR
visualization device, due to the versatility of this type of equipment for its purpose,
namely to be able to withstand AR technology with acceptable quality and good user
experience. In order to collect user requirements and develop the AR solution, the
agile methodology Scrum was used, given its versatility, namely for the construction
of multimedia applications. As a platform for the development of the AR solution,
was used Unity with Vuforia, due to the functionalities that it makes available for the
construction of games and multimedia applications. The built solution was validated
through a survey of a sample of 40 users. The answers obtained were the object of
Using Augmented Reality for Learning Naval Operations 485
Acknowledgements The work was funded by the Portuguese Ministry of Defense and by the
Portuguese Navy/CINAV.
References
1. Azuma, R.T.: A survey of augmented reality. Presence: Teleoper. Virtual Environ. 6(4),
355–385. ACM Digital Library (1997)
2. Peddie, J.: Augmented Reality, Where We all Live. Springer International Publishing, Tiburon
(2017)
3. Bimber, O., Raskar, R.: Spatial Augmented Reality: Merging Real and Virtual Worlds. AK
Peters/CRC Press (2005)
4. Aukstakalnis, S.: Pratical Augmented Reality. Addison-Wesley, Crawsfordville (2016)
5. Wheeler, D.: U.S. Navy developing new augmented-reality diver’s helmet. https://bit.ly/
2SG0L4J. Accessed Apr 2018 (2016)
6. Owens, K.: The Navy tests new augmented reality helmet, automation. https://bit.ly/2GA4oCQ.
Accessed Apr 2018 (2017)
7. Seck, H.: Augmented reality training systems destined for marine schoolhouses. https://bit.ly/
2E6EncD. Accessed Apr 2018 (2016)
8. Baldauf, M., Procee S.: Augmented reality in ships bridge operation. In: ISIS 2014—Interna-
tional Symposium Information on Ships, Hamburg (2014)
9. Wingrove, M.: Augmented reality is coming to ship bridges. https://bit.ly/2DsXD2E. Accessed
Apr 2018 (2018)
10. Azadux: The UX development story. http://azadux.com/sailing/. Accessed Apr 2018 (2018)
11. Russel, K.: Cobham explores augmented reality for maritime satcom. https://bit.ly/2I4ZFLC.
Accessed Apr 2018 (2017)
12. Schwaber, K., Sutherland, J.: The Scrum Guide. Scrum Alliance (2011)
13. Medlock, J.: A short introduction to the scrum methodology. https://bit.ly/2THpnqV. Accessed
Apr 2018 (2018)
14. NATO, ATP I Vol. II, Allied Maritime Tactical Signal and Maneuvering Book (2016)
15. Unity. https://unity3d.com. Accessed Apr 2018 (2018)
16. Elvas, F.: Realidade Aumentada Aplicada a Panoramas Táticos. M.Sc. Thesis, Portuguese Naval
Academy. https://bit.ly/2Ducn10. Accessed Dec 2018 (2018)
Communication of the Quality of Higher
Education Institutions of Ecuador
Guillermo Santa María, Carina Rey, Lilian Molina and Arturo Clery
Abstract The objective of this work was to determine the fulfillment of the attribu-
tions and functions of the Ecuadorian agency, which regulates the management of
quality assurance of higher education, declared in its Communication Plan, through
an exploratory investigation of the web pages of all regulated universities. For this
purpose, standards were designed from the Plan, which collected the pertinent infor-
mation through a scale. The results are classified based on six elements that the
Plan itself highlighted, namely communication management, its dissemination and
positioning, the image of the authorities, links with other universities, management
with international institutions and the empowerment of the mission and institutional
vision. Each of these elements presents its own characteristics and is analyzed in the
present work.
1 Introduction
G. S. María
Universidad de Guayaquil, Guayaquil, Ecuador
e-mail: guillermo.santamarias@ug.edu.ec
C. Rey
Universidad de Barcelona, Melcior de Palau, Barcelona, Spain
e-mail: carina.rey@ub.edu
L. Molina (B) · A. Clery
Universidad Estatal Península de Santa Elena, Santa Elena, Ecuador
e-mail: lmolina@upse.edu.ec
A. Clery
e-mail: clery@upse.edu.ec
articulation between the bachelor’s degree or its equivalent and higher education,
seeking only the entrance of students that meet minimum standards.
With the validity of the LOES, the State regains control of the university system,
while initiating efforts for the public policies to constitute instruments of communi-
cation between the State and universities [3], and a way through which rulers seek to
change the direction, in a positive way, of the conditions of poverty and marginality
of the population [6].
The LOES enforceable, from 2010 to August 2018, defines the principle of quality
in its Article 93, as “the constant and systematic search for excellence, relevance,
optimal production, transmission of knowledge and development of thought through
self-criticism, external criticism and permanent improvement.”
The CEAACES until 2018, in addition to organizing the processes of improve-
ment, had in its task a clear orientation toward the purification. The purge ended
with the approval by the National Assembly of the Organic Law of Extinction of
Universities and Polytechnic Schools, suspended by CEAACES.
The CES, motivated by the resolution that approved the regulation for the des-
ignation and powers of the board members of the trust called “Mandate 14—more
quality,” defined that period as the final closure of a stage that represented the exis-
tence of institutions that did not meet the quality parameters [9], was also considered
a way to guarantee the right to quality higher education and establish mechanisms
to ensure social accountability, distribution and efficient use of public resources in
favor of the institutions of the higher education system.
In a second reform to the LOES (the first one was carried out in December 2016),
promoted by a new Government in August 2018, quality is redefined as “the contin-
uous, self-reflective search for improvement, assurance and collective construction
of the culture of higher educational quality with the participation of all levels of
higher education institutions and the higher education system, based on the balance
of teaching, research and innovation and the link with society, guided by relevance,
inclusion, the democratization of access and equity, diversity, responsible autonomy,
integrality, democracy, the production of knowledge, the dialogue of knowledge, and
citizen values.”
This new definition establishes that quality should be guided by the principles,
which are already determined by the norm as natural to the system: relevance, respon-
sible autonomy, integrality and dialogue of knowledge, and also incorporates new
guiding principles of quality: inclusion, equity, diversity, democracy, and citizen
values.
This definition is close to that of the United Nations Educational, Scientific and
Cultural Organization—UNESCO, which at its Regional Conference, held in the city
of Havana in 1996, agreed to define quality as “the adequacy of the being and the to
do of higher education, to its duty to be.” Where the being must be understood as
contained in the vision, mission, principles, and values of the university and what to do
corresponds to the operative and procedural aspects. These last approach universities
to the proposed ideals, through systems of learning, research, management, self-
evaluation, and external evaluation, linked to the context [5].
490 G. S. María et al.
This new system is integrated by the CES, the CACES, and the IES. The self-
evaluation is given a permanent role and turned into the cornerstone, which must be
carried out in reference to the purposes of the institutions. Thus, it must be understood
that the missions and visions of the universities would become the referents of the
aforementioned self-process. The process will be accredited by CACES, who will
plan and coordinate the operations.
In this way, the State remains at the forefront of the system even when the
self-evaluation processes, which are initiatives of the university institutions, acquire
centrality.
Harmonizing the dynamics of state agencies with universities will be a process
to be built. Internal processes, such as self-evaluations, and external ones, such as
accreditations, must interact, mesh, and function effectively. This interaction is on
the horizon of the Ecuadorian system.
3 Quality Assurance
The CONUEP in 1989 carried out the first diagnostic study of the Ecuadorian uni-
versity, and one of the basic problems detected was the lack of a higher education
system; instead there existed a set of independent institutions, with weak cooperation
mechanisms.
The island scenario of university institutions to which the previous study alludes
had in the defense of university autonomy a unifying link: Defending autonomy was
indispensable and there ones that when, invoking it, attributed to it thaumaturgical
properties and associated it with quality were few.
Nine years passed so that, in the Constitution issued in 1998, the constitutional
norm warns that to ensure quality objectives, universities should perform an account-
ability; for its fulfillment, an evaluation and accreditation system is formed.
This is the first normative evidence of concern for quality and its assurance.
Two years later, in 2000, the Higher Education Law ratifies that the objective
of the evaluation and accreditation system is to ensure quality, encourage ongoing
processes to improve academic quality and management, and to do so, appeals to
the processes of institutional self-evaluation, external evaluation, and accreditation
[12].
The following objective, established in the Law, was for Ecuadorian society to
be informed of the institutional performance of higher education establishments in
order to guarantee quality, promoting their depuration and improvement.
The wording of the norm’s text suffers from lack of clarity; however, its concern
for the depuration and improvement is noticed. The 14th Mandate, in 2008, includes
this intention and expresses it in its resolutions.
After the 21 universities, which in 1989 had been subject to evaluation by the
CONESUP, the creation of private and public universities had been approved in a
number close to 70. An increase of more than 200%.
Communication of the Quality of Higher Education Institutions … 493
In June 2006, only the Universidad del Azuay had fulfilled all the requirements
and was accredited.
A context of application of neoliberal policies in the university system, of com-
mercialization of higher education and indifference of the State in relation to defini-
tions and regulations, had introduced chaos and discredit [7]. Reconciling with the
concepts of quality was urgent as well as the need for depuration and improvement.
Reality, the political and economic context imposed their logic, while the
norm remained a dead letter and organisms limited themselves to contemplate the
decadence.
The 14th Mandate reflects the disappointment of the process entrusted to CONE-
SUP and CONEA and obliges CONESUP to prepare a report on the academic and
legal situation [2], and CONEA is required to submit a technical report to comply
with the depuration and the improvement as established in Article 91 of the Law of
Higher Education of that time.
In November 2009, CONEA delivers its report, which consists of an initial classi-
fication of Ecuadorian universities and a radical recommendation: Purge the Ecuado-
rian university system of the group of universities that did not meet the basic con-
ditions of a university institution [4]. These universities had been created during the
1990s and the early years of the twenty-first century.
The LOES of 2010 establishes for these universities identified in the 14th Man-
date, type E, the prohibition of offering new academic programs and/or postgraduate
courses; at the same time, they have to be evaluated within a period of 18 months.
This new evaluation was in charge of the new body that the LOES created in substitu-
tion of the CONEA: the Council of Evaluation, Accreditation and Quality Assurance
of Higher Education—CEAACES.
The assurance of quality defines it as actions that guarantee efficient and effective
management. And this definition extends to the Councils and accrediting bodies.
4 Final Considerations
Quality assurance appears as a component of the name of the new body; it is assumed
as one more process of the system. The concern in the previous stage had been:
evaluation and accreditation. Now, the assurance is constituted in a process to be
implemented, it stops being an objective without concretion. It is essential to shield
what has been achieved in order to avoid backing down, and in parallel, it is forced
to reach new levels of improvements.
In the period from 2010 to 2018, CEAACES carries out evaluations of careers,
exams for qualification of professional practice, depurates extensions, participates in
interventions in universities, re-categorizes, and accompanies processes of improve-
ment plans, institutional strengthening, and quality.
And finally, in 2018, we find ourselves with a quality assurance which results
show an asymmetric reality hidden in the accreditation of 55 universities out of a
total of 59, extensions 39, and 56 evaluated careers. The qualification exams for
494 G. S. María et al.
professional practice have been applied in careers that could compromise the public
interest, putting at risk essentially the life, health, and safety of the citizens; between
2015 and 2018, the qualification exams for professional practice—EHEP have been
applied on nine occasions for students of medical careers, seven times for the career
of dentistry, and twice for students of the nursing career.
The reform introduced, in August 2018 to the LOES, has the HEIs whose quality
has been accredited from the asymmetry, as a base line. Thus, on the official website
of CEAACES, there are 18 universities in category C, 28 in category B, and 8 in
category A.
The universities categorized C, which correspond to 30% of the HEIs, should
accelerate their improvement processes in order to narrow the existing gap; in a
similar situation are categorized B of the A.
On the other hand, the norm did not contemplate or contemplates a reassurance
process for the system. Neither CONEA nor CEAACES from 2010 to 2018 have
been evaluated technically by independent bodies to ensure that their work effectively
meets acceptable standards.
Acknowledgements Thanks are due to the Universidad de Guayaquil and the Universidad Estatal
Península de Santa Elena for their administrative and economic contributions to the development
of this research, through its Public and Social Policy Observatories.
References
1. Cielo, C., Ospina, P., Vega, C.: Reforma y renacimiento: conversacones docentes sobre la
reforma universitaria en Ecuador. Universidad Andina Simón Bolívar, Quito (2016)
2. Ecuador: Legislación comparada de nueve países de América Latina y españa. Consejo
Nacional de Educación Superior, Quito (2009)
3. Ecuador: Ley Orgánica de Educación Superior (2010)
4. Ecuador: La evaluación de la calidad de la Universidad ecuatoriana: la experiencia del Mandato
14. Consejo de Evaluación, Acreditación y Aseguramiento de la Calidad de la Educación
Superior—CEAACES, Quito (2014)
5. Gutiérrez-García, R., Sainz-Venegas, P., Contreras-Cornejo, A., Lugo-Carvajal, M., Preciado-
Alatorre, T., Ornelas-Jiménez, J.: Universidad Sustentable. Instituto Tecnológico y de Estudios
Superiores de Occidente, Jalisco (2017)
6. López, M., Cifuentes, L., Palma, A.: La gestión de las políticas públicas en las universidades:
una aproximación a su caracterización en el Ecuador. Dominio de las Ciencias, 447–464 (2018)
7. Lucas, K.: De los bancos de papel a las universidades de garaje: impactos de las políticas
neoliberales en la educación superior en Ecuador. Consejo de Educación Superior CES, Quito
(2015)
8. Martínez, A., Vásquez, P.: La importancia de la evaluación en las instituciones educativas con-
forme a la nueva Ley Orgánica de Educación Superior en el Ecuador. Revista Iberoamericana
de Evaluación Educativa, 174–180 (2012)
9. Molina, L.: Evaluación de las biblotecas universitarias ecuatorianas: análisis del entorno y
propuesta de un catálogo de indicadores. Universidad Estatal Península de Santa Elena, La
Libertad (2015)
10. Rama, C.: La educación a distancia y virtual en Ecuador. Universidad Técnica Particular de
Loja UTPL-Virtual Educa, Loja (2015)
Communication of the Quality of Higher Education Institutions … 495
11. Toscanini, M., Aguilar, A., García, R.: Diagnóstico de las políticas públicas de la educación
superior en el Ecuador. Revista Cubana de Educacaión Superior, 161–178 (2016)
12. Valdés, M., Villegas, T.: Responsabilidad social universitaria: fundamento para la gestión socio-
cultural. Revista Cubana Educación Superior, 55–62 (2017)
13. Villarroel, C.: Gerencia, planificación y evaluación universitarias. La Revista Venezolana de
Educación Educere, 513–522 (2005)
14. Villavicencio, A.: De la universidad funcional a la universidad de la razón. Universidad Andina
Simón Bolívar, Quito (2013)
The Four Dimensions of the GDPR
Framework: An Institutional Theory
Perspective
Abstract The EU general data protection regulation (GDPR) is the most important
change in data privacy regulation in 20 years. The regulation will fundamentally
reshape the way in which data are handled across every sector. The organizations
had two years to implement it. Despite this, it has been observed that, in several
sectors of activity, the number of organizations having adopted that control is low.
This study aimed to identify the factors which condition the adoption of the GDPR
by organizations. Methodologically, the study involved interviewing the officials in
charge of information systems in 18 health clinics in Portugal. The factors facilitating
and inhibiting the implementation of GDPR are presented and discussed. Based
on these factors, a set of recommendations are made to enhance the adoption of
the measures proposed by the regulation. The study used Institutional Theory as a
theoretical framework. The results are discussed in light of the data collected in the
survey, and possible future works are identified.
1 Introduction
In recent years, data protection has become a forefront issue in cybersecurity. The
issues introduced by recurring organizational data breaches, social media and the
Internet of Things (IoT) have raised the stakes even further [1, 2]. The EU GDPR,
enforced from May 25, 2018, is an attempt to address such data protection. The
GDPR makes for stronger, unified data protection throughout the EU.
Not all data is protected by the GDPR, it is only applicable to personal data. This
is defined in Article 4 as follows [3]:
“personal data” means any information relating to an identified or identifiable natural per-
son (‘data subject’); an identifiable natural person is one who can be identified, directly
or indirectly, in particular by reference to an identifier such as a name, an identification
number, location data, an online identifier or to one or more factors specific to the physical,
physiological, genetic, mental, economic, cultural or social identity of that natural person.
In a study [4] conducted in 57 health clinics (the survey was sent to 190 clinics,
but only 57 gave an effective answer) about whether they had started or completed
the process of implementation of the measures laid down in the GDPR, 39 (69%)
gave a negative answer and 18 (31%) said to have started or completed the adoption
of such measures. Among the 18 clinics which are in the implementation stage, 7
(39%) consider that the process is completed, while the remaining 11 (61%) still
have some measures to implement. These figures seem insufficient when bearing in
mind that the GDPR had already come into force six months before the conduction
of this study.
Thus, the following two research questions were formulated in order to guide the
research work:
1. Which dimensions condition the adoption of the GDPR?
2. Which recommendations might be put forward so as to enhance the adoption of
the GDPR by health clinics?
The answer to the first question aims to know the positive and negative con-
ditioning dimensions influencing the adoption of the GDPR by health clinics. In
possession of these elements, it will be relevant to produce a set of recommendations
which enable the adoption of the GDPR measures by clinics.
The structure of the present work consists of an introduction, followed by a desk
review on the general data protection regulation and the desk review of Institutional
Theory. Section 4 focuses on the research methodology, identifying the target popu-
lation and the structure of the survey. The results of the study are presented in Sect. 5,
and Sect. 6 consists of the conclusions drawn from the study. Finally, the limitations
of this research work are identified and possible future studies are proposed.
The Four Dimensions of the GDPR Framework: An Institutional … 499
Personal data are owned by a natural person and are as such inalienable. However,
with the development of technology and the Internet, personal data are becoming
increasingly exposed and accessible to those who could use them for their own,
unlawful purposes [5]. The GDPR is a cornerstone regarding personal data treatment
regulation, which aims to respond to the new challenges in the field of data protection
generated by the evolution of technology and the globalization of markets.
It originated from the European Union package on the reform of data protection
and came into force directly and mandatorily on May 28, 2018, impacting signifi-
cantly the life of organizations.
Both the European Parliament and the Council of the European Union saw the
need to implement a more coherent and solid data protection framework, anchored
in a rigorous application of the rules, since it is crucial to generate the trust needed
for the development of digital economy in the whole internal market.
The obligatory adaptation of the organizations to the GDPR will imply a set of
legal, technological, and functional changes with a direct impact on the daily life of
the organizations, as a result of their increased responsibility with the data protection
subjects, which has been reinforced by the new legislation. On the other hand, the
transfer of responsibilities from national authorities to the organizations obliges them
to prove, at all times, full compliance with the legislation. Organizations are subject
to high fines when non-compliance is detected [6].
The GDPR aims to protect the personal data of EU residents and not just secure it.
There is no single solution for the GDPR due to its complex remit and enterprise-wide
impact. The GDPR compliance requires a 360° perspective [7]:
1. There is no silver bullet to the GDPR:
• The GDPR is the most complex piece of regulation in recent times, and it
impacts everybody.
• The depth and breadth of activity required to demonstrate and maintain com-
pliance are significant.
• There is no single solution to the GDPR.
2. The GDPR impacts the enterprises:
• The GDPR is an enterprise-wide business problem, and it requires enterprises
solutions.
• Approached in the right way, the GDPR will allow organizations to build trust
with customers/stakeholders and positively differentiate within the digital age.
3. Fragmented Approach:
• The GDPR requires a 360° perspective, and organizations that approach this
regulation from a single viewpoint are liable to an increased risk exposure.
• There are over 20 defined areas to the GDPR, all of which require a distinct
solution.
500 I. M. Lopes et al.
• Cognizant has a comprehensive framework that covers all the required GDPR
areas and which can be traced back to each individual component of the leg-
islation.
The GDPR implementation program covers four distinct dimensions which are
critical to the GDPR compliance: technology, data, process, and people (see Fig. 1).
Organizations must work on these four dimensions, each of which having its own
specificities, starting the process by “preparing,” followed by “protecting,” and finally
by “maintaining,” so that the GDPR adoption can be a reality and organizations can
be in compliance with the regulation.
3 Institutional Theory
adopted, and adapted throughout time and space, as well as the way they fall into
decline and disuse [9]. Institutions may be conceived as high resilient social structures
that enable and constrain the behavior of social actors and that provide stability and
meaning to social life [10–12].
The authors [13] outlined the processes inherent to institutionalization as consist-
ing of four stages, namely innovation, habitualization, objectification, and sedimen-
tation. The institutionalization process starts at “Innovation,” which occurs due to
external forces such as technological change, legislation, or market forces. In this
sense, the word innovation means structural rearrangements or new organizational
practices aimed at solving organizations’ problems. Following this comes a sequen-
tial process of three stages which enables the evaluation of the institutionalization
degree of a certain social reality.
In an organizational context, the process of “Habitualization” involves the creation
of new structural arrangements in response to specific organizational problems or
sets of problems, shaped through policies and procedures of a specific organization or
set of organizations with similar problems. Hence, this is the pre-institutionalization
stage.
After the solution for the problem has been generated, it is possible to move
on to the “Objectification” process, which accompanies the spreading of the new
structure, expanding its use. Objectification implies the development of a certain
degree of social consensus regarding the structure and its growing adoption, based
on that consensus, by the organization. This process configures the semi-institutional
stage.
The stage in which institutionalization is complete is called “Sedimentation,” and
it is characterized by the adoption of the structure or organizational practice by the
whole organization for a long period of time.
Figure 2 presents a diagram with a summarized overview of the causal critical
forces in the institutionalization process.
To better understand this diagram, we applied another concept also proposed by
[14] to the stages of institutionalization to observe the institutionalization process
across different stages or levels. For those authors, the institutionalization process
4 Research Methodology
The survey (first study) was sent to 190 clinics, but only 57 gave an effective reply,
which corresponds to a response rate of 30%. The sample subjects were selected
randomly based on the kind of clinic and their location distributed throughout the 18
inland Portuguese districts as well as Madeira and the Azores [4].
Considering the research questions previously formulated, and in articulation with
the selected research method (Institutional Theory), a primary data collection tool
emerged: the interview.
For a better understanding of the results, we can group the clinics into three
clusters (Table 1):
5 Results
Compliance with the GDPR must be a priority and must be seen by organizations
as an opportunity. Since we are talking about health clinics, therefore, dealing with
“sensitive data,” such priority becomes even more pressing.
From the work conducted within the 18 clinics under study, the following measures
can be recommended in order to improve the adoption of the propositions laid down
in the regulation, as far as the components of the institutionalization process are
concerned (Fig. 3).
The major challenge is faced in the habitualization stage, since it is when a bigger
quantity of factors considered to be critical occurs within the institutionalization
process as far as effort, cost, and complexity are concerned.
With regard to the four dimensions presented in Fig. 1, their taking into account
increases the patients’ trust toward the health clinic.
The dimension—technology, responsible for data architecture, is crucial in order
to monitor activities in an automatized way, managing and protecting contents and
data. Thus, compliance with the GDPR implies the implementation of data protection
technology.
504 I. M. Lopes et al.
In the dimension—data, where management and security are conducted, and bear-
ing in mind that most data treatment activities are based on the use of information
systems and automatized means, it is necessary to assess the systems used, the levels
of access and the security measures implemented.
In the dimension—process, responsible for the consent of rights, the processes
are honed so as to respond to the data holders’ rights and manage data processing.
In the dimension—people, responsible for governance and oversight, it is manda-
tory to involve all the stakeholders a cultural change toward data protection by
all—with well-defined rules and responsibilities.
The conjunction of these actions to enhance the implementation of the GDPR in
the health clinics can be summarized in six essential points:
1. Review periodically—data protection is not a destination, it’s a journey! So,
review on a regular basic and correct your course accordingly.
2. Raise awareness—conduct staff training and awareness sessions. Most breaches
occur due to staff ignorance so make them aware and mitigate the risk.
The Four Dimensions of the GDPR Framework: An Institutional … 505
3. Review policies and related documents—review existing policies and create new
ones where needed. These policies allow you to formulate processes and proce-
dures for staff to follow.
4. Make a plan—based on the audit and risk assessment, determine a roadmap
to achieve compliance. While it is important to address high-risk areas, do not
ignore the low hanging fruit. Small, easy wins can get the project off to a positive
start!
5. Identify and assess privacy-related risks—assess the risks associated with how
data are being processed. Compile a risk register.
6. Conduct an audit—know your data—how you got it; who can access it; where it
is stored; how long you keep it, etc. Create a list of recommendations to address
areas of concern.
6 Conclusions
This paper brought forward guidelines which are believed to enhance the institution-
alization of measures imposed by the GDPR in organizations. We also argue that the
use of Institutional Theory as a support to the interpretation of the adoption stage
of implementation by organizations and as a support to the projection of guidelines
which enhance the institutionalization of these GDPR measures in organizations
represents a promising means for research.
In Portugal, there is still some vagueness concerning some of the issues regard-
ing data protection, due to the fact that the Portuguese legislation has not yet been
approved (note that although the GDPR is a EU regulation and therefore is directly
enforced in Portugal and in all member states, the truth is that certain issues demand
a legal definition by the Portuguese legislator).
A considerable effort is being made by companies to be in compliance with the
GDPR. However, it is a long path and the instructions regarding the four dimensions
(technology, data, process, and people) must be properly implemented and, above all,
maintained bearing in mind that periodic improvements are necessary. This process
is never completely closed, and reviews must be conducted whenever necessary.
As a possible future work, we suggest assessing how far the certification of the
information security management system by ISO 27001 grants companies’ compli-
ance with the GDPR, since the implementation of an information security manage-
ment system by a company must ensure that all the relevant controls of risk contain-
ment associated with confidentiality, integrity, and availability are implemented and
kept functional.
Acknowledgements UNIAG, R&D unit funded by the FCT—Portuguese Foundation for the
Development of Science and Technology, Ministry of Science, Technology and Higher Education.
Project n.º UID/GES/4752/2019.
This work has been supported by FCT—Fundação para a Ciência e Tecnologia within the Project
Scope: UID/CEC/00319/2019.
506 I. M. Lopes et al.
References
1. Mäkinen, J.: Data quality, sensitive data and joint controller ship as examples of grey areas in
the existing data protection framework for the Internet of Things. Inf. Commun. Technol. Law
24(3), 262–277 (2015)
2. Nurse, J.R.C., Creese, S., De Roure, D.: Security risk assessment in Internet of Things systems.
IEEE IT Prof. 19(5), 20–26 (2017)
3. European Parliament and Council, Regulation (EU) 2016/679 of the European Parliament and
of the Council of 27 April 2016, Official Journal of the European Union (2016)
4. XXXX
5. Skendzic, A., Kovacic, B., Tijan, E.: General data protection regulation—protection of personal
data in an organization. In: 41st International Convention on Information and Communication
Technology, Electronics and Microelectronics, pp 1370–1375 (2018)
6. Da Conceição Freitas, M., Mira da Silva, M.: GDPR in SMEs, vol. 2018, pp. 1–6. In: 13th
Iberian Conference on Information Systems and Technologies (2018)
7. West, I.: The big scan thing!—How the EU General Data Protection Regulation (GDPR) will
affect your business! https://www.slideshare.net/CraigShipley1/digital-enterprise-festival-
birmingham-130417-ian-west-cognizant-vp-data-management-the-implications-of-the-eu-
global-data-protection-regulation-on-every-business-and-their-digital-service-providers. Last
accessed 1 Dec 2018
8. Brown, S.L., Eisenhardt, K.M.: Competing on the edge: strategy as structured chaos. Harvard
Business School Press, Boston (1998)
9. Scott, W.: Institutional Theory. Encyclopedia of Social Theory, pp. 408–414. Thousand Oaks,
Sage (2004)
10. DiMaggio, P. Powell, W.: Introduction. In: Powell, W.W., DiMaggio, P.J. (eds.) The New
Institutionalism in Organizational Analysis, pp. 1–38. University of Chicago Press, Chicago
(1991)
11. North, D.: Institutions, Institutional Change and Performance. Cambridge University Press,
Cambridge (1990)
12. Scott, W.R.: Institutions and Organizations: Ideas and Interests, 3rd edn. Sage, Thousand Oaks
(2008)
13. Tolbert, P.S., Zucker, L.G.: The institutionalization of institutional theory. In: Handbook of
Organization Studies. Sage, London (1996)
14. Tolbert, P.S., Zucker, L.G.: A institucionalização da teoria institucional. In: Clegg, S., Hardy, C.,
Nordy, W (eds.) Handbook de estudos organizacionais (pp. 196–219). Tradução de Humberto
F. Martins e Regina Luna S. Cardoso, v.1. Atlas, São Paulo (1999)
Metrics and Indicators of Information
Security Incident Management:
A Systematic Mapping Study
Abstract The number of threats and vulnerabilities has increased rapidly in recent
years. For this reason, organizations are in need of providing improvements in their
computer security incident management (CSIM), in order to safeguard their intel-
lectual capital. Therefore, the identification and use of both metrics and indicators
are a crucial factor to manage security incidents. In this context, organizations try to
improve their level of CSIM based on standards or only according to their criteria
based on their experience. This article aims at carrying out a systematic mapping
study of academic articles conducted in this research area, in order to present a doc-
ument that describes metrics and indicators of security incidents in organizations.
The results of this work show and describe several key indicators and metrics related
to the cost, quality, and service (time) involved in dealing with such incidents. Also,
it is expected that this study serves as a strategic reference for organizations.
1 Introduction
In order to frame the research on the problematic raised, research questions (RQs)
were established, which were defined following the objectives of this study: to ana-
lyze and define metrics and indicators of information security incidents employing
this SMS. In this way, we follow the respective guidelines leading to the RQs pre-
sented below:
RQ1: What are the metrics related to information security incidents in organizations?
RQ2: Are there indicators related to information security incidents?
RQ3: Are there Key Performance Indicators (KPI’s) related to cost, quality, and
service?
RQ4: In most metrics, what standards apply to information security incident man-
agement?
RQ5: Are there studies on SMS aimed at Information Security Incidents?
This information will lead to obtaining the metrics and key indicators of informa-
tion security incidents as well as a formal study that validates all the data shown.
For the selection of the studies, the corresponding titles and abstracts were taken into
account in which the following inclusion criteria will be denoted:
– Studies in the field of computer security;
– Studies in the field of information security;
– Articles published since 2010;
– Scientific articles and conference papers.
Within the exclusion criteria, the following parameters were considered:
510 A. Cadena et al.
The following digital libraries were considered for the literature review: IEEE Xplore,
ACM Digital Library, and Springer Link. The reason for selecting them is because
they cover a wide range of publications in the field of engineering science maintain-
ing a complete and consistent database. For conducting the initial search, we used
keywords and search terms closely related to:
– “Security information management”;
– “Security incident metrics and indicators”;
– “Key performance indicators or KPIs.”
Then, to determine the optimal search string for research, several options have
been considered taking into account that they conform with the terms as mentioned
above. The proposed inclusion and exclusion criteria were also applied generating
diverse possibilities. The first search approach can be seen in Table 1.
Finally, once the search string was optimized, we selected the one that contains
the most significant amount of relevant information and that returned a manageable
number of documents for the research. The optimized search string is shown in
Table 2.
Aiming at refining the information obtained from the search string, an information
crossing was performed in two ways: manually and using the academic databases.
By doing so, the amount of literature obtained for reviewing was reduced to 10
relevant articles as shown in Table 3. This result can also be visualized in Fig. 1
which illustrates the number of articles selected from each academic database for
conducting this study. In addition, Fig. 2 depicts the mechanism for determining the
relevance of each study. This was done by means of validation of the researchers, by
simple selection and equitable weights selection.
Note that we also analyzed the years in which the articles were indexed. This
information can be seen in Fig. 3. It reflects that, in the year 2015, a greater emphasis
was made in the generation of scientific articles focused on the analysis of metrics
and indicators of CSIM in the organizations. Then, it decreases until the year 2018
in which the tendency to study this subject increases again.
Table 3 Metrics and indicators of information security incidents: systematic mapping study
Item study title
S1 [7] “A practical experience on evaluating intrusion prevention system event data as
indicators of security issues”
S2 [2] “Forewarned is forearmed: indicators for evaluating information security incident
management”
S3 [8] “A comprehensive survey on machine learning for networking: evolution,
applications and research opportunities”
S4 [9] “Adoption of security as a service”
S5 [1] “Security operations centers for information security incident management”
S6 [10] “Information security considerations for protecting NASA mission operations
centers (MOCs)”
S7 [11] “Establishing national cyber situational awareness through incident information
clustering”
S8 [12] “The β-time-to-compromise metric for practical cybersecurity risk estimation”
S9 [13] “Integration of IT frameworks for the management of information security within
industrial control systems providing metrics and indicators”
S10 [14] “Application of security metrics to instrument systems that use distributed
processing”
512 A. Cadena et al.
2
SpringerLink
19
0
ACM
3
8
IEEE Xplore
44
0 10 20 30 40 50
Selected Articles All Articles
S8 S4
S7 S5
S6
3.5
3 3
Number of publications
2.5
2 2 2
1.5
1 1 1 1
0.5
0
2010 2011 2012 2013 2014 2015 2016 2017 2018 2019
Publication year
The selected documents, result of the SMS, were used to answer the research ques-
tions posed in Sect. 2.1, which are the focus of this research.
Regarding the research questions RQ1 and RQ2, several metrics and indicators
related to information security incidents were analyzed. However, a significant num-
ber of articles focused solely on information security were found through the search;
therefore, an exhaustive analysis was carried out, and the results are presented in
Table 4. It is worth noting that the metrics and indicators considered by the studies
analyzed are based on standards such as [14]. On the other hand, [13] is based on
the metrics proposed by other authors as [15–18]; in the same way, [12] is based on
[19], and [9] is based on indicators proposed by various authors. Conversely, articles
were found that support their indicators or metrics throughout their research process
as is the case of [1, 7, 8, 10]. However, there are several studies that use indicators
based on the REWI method [20] (e.g., [2]) and that present metrics in the form of
facts (e.g., [11]).
Regarding the research question RQ3, cost, quality, and service are three entities
of great importance in organizations, which is why the work of [1, 2, 13] focuses
on these attributes. With regard to the research question RQ4, both the metrics and
indicators of information security incidents analyzed in the standards were proposed
by their authors based on ISO/IEC 27035 [21] or NIST SP 800:61 [22], among others.
However, the indicators presented in [14] are based on the ANSI/ISA-99.01.0 1-2007
[23] and ISA-99.02.01-2009 [24] standards.
Finally, regarding the research question RQ5, there are studies on SMS, as is the
case of [2], where the authors present a method to evaluate an organization’s capacity
to manage security incidents. They mention that this method is based on the form of
response to change (resilience) and describe how to identify, select, and implement
early warning indicators for the management of information security incidents.
4 Proposal
System
Time until discovery
Time until report
Vulnerability date
Business area
[12] Time-to-compromise No indicators
(continued)
515
Table 4 (continued)
516
objective evaluation of the incident records in order to find useful information that
feeds their knowledge. Based on the above, according to a study presented in 2017
by Consortium for Advanced Internet Development (CEDIA) in its article “State of
Information and Communication Technologies in Ecuadorian Universities,” in the
area of ICT security, 70% of HEIs are supported by CEDIA’s CSIRT, 8% have their
Committee, and 22% none. Similarly, 54% of the HEIs surveyed rely on CEDIA’s
vulnerability analysis tools, 22% on their own, and 24% none [27]. This shows evi-
dent shortcomings in HEIs concerning CSIM. Besides, there is a lack of studies
on information security incidents in HEIs and how these could benefit management
decision-making and the continuous improvement of the IS.
For this reason, it is proposed to perform a study on the incidents aiming at achiev-
ing cognitive learning that allows analyzing the problem from another perspective.
On the one hand, the generation of dashboards of the preeminent indicators related
to security incidents is highly advised. Besides, the discovery of behavioral patterns
of incidents through data mining techniques will provide relevant information. This
information will be transformed into knowledge that will drive better business strate-
gies that will translate into a competitive advantage for any organization. It is for
this reason that some research is planned where metrics and key indicators will be
established in the management of security incidents in HEIs in order to improve their
management, using benchmark surveys (KPI benchmark surveys). Additionally, a
business intelligence model required to evaluate these metrics and indicators will be
implemented through the “cross-industry standard process for data mining” (CRISP-
DM) or through Ralph Kimball’s methodology and where the effectiveness of the
model will finally be evaluated, leveraged with the action research methodology, to
determine the confidence level of the results.
5 Conclusions
The objective of this study was to conduct a systematic literature review of academic
articles focused on security incident management, in order to identify and describe
metrics and indicators of security incident management in organizations. To achieve
this, an empirical study was carried out on three indexed databases: IEEE, ACM,
and Springer.
The articles found were then analyzed along with their metrics and indicators.
The methodological procedure consisted of a systematic mapping study with their
respective research questions, inclusion and exclusion criteria, selection of digital
libraries, and analysis of the respective search strings. Among the main findings
were metrics and key indicators focused on cost, quality, service, products, incident
management, resilience, and early warning indicators. It should be noted that some of
them were paired with the following international standards: ISO/IEC 27035, NIST
SP 800:61, ANSI/ISA-99.01.0 1-2007, and ISA-99.02.01-2009. This information
could serve for the analysis of their behavior as input for decision-making in the
context of information security incident management in organizations. All this will
518 A. Cadena et al.
result in reducing threats, vulnerabilities, and computer risk, which will influence
the increase in the level of information security in institutions. As a future work,
we have planned to create a knowledge database to design and develop a decision
support system of the management of security incidents.
Acknowledgements The authors would like to thank the financial support of the Ecuadorian Cor-
poration for the Development of Research and the Academy (RED CEDIA) in the development of
this work, under Research Team GT-II-Cybersecurity.
References
1. Miloslavskaya, N.: Security operations centers for information security incident management.
In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud),
pp. 131–136 (2016)
2. Bernsmed, K., Tondel, I.A.: Forewarned is forearmed: indicators for evaluating information
security incident management. In: 2013 IEEE Seventh International Conference on IT Security
Incident Management and IT Forensics, pp. 3–14 (2013)
3. Hajdarevic, K., Allen, P.: A new method for the identification of proactive information security
management system metrics. In: 2013 IEEE 36th International Convention on Information &
Communication Technology Electronics & Microelectronics (MIPRO), pp. 1121–1126. (2013)
4. Thomson, W., Kelvin, L.: Baltimore Lectures. CJC a. Sons, Ed., London (1904)
5. Petersen, K., Vakkalanka, S., Kuzniarz, L.: Guidelines for conducting systematic mapping
studies in software engineering: an update. Inf. Softw. Technol. 64, 1–18 (2015)
6. Elberzhager, F., Münch, J., Nha, V.T.N.: A systematic mapping study on the combination of
static and dynamic quality assurance techniques. Inf. Softw. Technol. 54(1), 1–15 (2012)
7. Miani, R.S., Zarpelao, B.B., Sobesto, B., Cukier, M.: A practical experience on evaluating
intrusion prevention system event data as indicators of security issues. In: 2015 IEEE 34th
Symposium on Reliable Distributed Systems (SRDS), pp. 296–305 (2015)
8. Boutaba, R., Salahuddin, M.A., Limam, N., Ayoubi, S., Shahriar, N., Estrada-Solano, F.,
Caicedo, O.M.: A comprehensive survey on machine learning for networking: evolution, appli-
cations and research opportunities. J. Internet Serv. Appl. 9(1), 16 (2018)
9. Senk, C.: Adoption of security as a service. J. Internet Serv. Appl. 4(1), 11 (2013)
10. Takamura, E., Mangum, K., Wasiak, F., Gomez-Rosa, C.: Information security considerations
for protecting NASA mission operations centers (mocs). In: 2015 IEEE Aerospace Conference,
pp. 1–14 (2015)
11. Skopik, F., Wurzenberger, M., Settanni, G., Fiedler, R.: Establishing national cyber situational
awareness through incident information clustering. In: 2015 IEEE International Conference on
Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), pp. 1–8 (2015)
12. Zieger, A., Freiling, F., Kossakowski, K.P.: The β-time-to-compromise metric for practical
cyber security risk estimation. In: 2018 IEEE 11th International Conference on IT Security
Incident Management & IT Forensics (IMF). pp. 115–133 (2018)
13. Bustamante, F., Fuertes, W., Díaz, P., Toulkeridis, T.: Integration of IT frameworks for the
management of information security within industrial control systems providing metrics and
indicators. In: 2017 IEEE XXIV International Conference on Electronics, Electrical Engineer-
ing and Computing (INTERCON), pp. 1–4 (2017)
14. Munro, J.K.: Application of security metrics to instrument systems that use distributed pro-
cessing. In: Future of Instrumentation International Workshop (FIIW), 2011, pp. 5–8 (2011)
15. Stouffer, K., Falco, J., Scarfone, K.: Guide to industrial control systems (ICS) security. NIST
Spec. Publ. 800(82), 16 (2011)
Metrics and Indicators of Information Security Incident … 519
16. Rose, K.H.: A guide to the Project Management Body of Knowledge (PMBOK® Guide)—Fifth
Edition. Proj. Manag. J. 44(3), e1–e1 (2013)
17. Lloyd, V.: ITIL Continual Service Improvement (Best Management Practices). The Stationery
Office (2011)
18. ISACA: COBIT 5: A business framework for the governance and management of enterprise
IT. ISACA (2012)
19. McQueen, M.A., Boyer, W.F., Flynn, M.A., Beitel, G.A.: Time-to-compromise model for cyber
risk reduction estimation. In: Quality of Protection, pp. 49–64. Springer (2006)
20. Øien, K., Massaiu, S., Tinmannsvik, R.K.: Guideline for implementing the REWI method;
Resilience based Early Warning Indicators. SINTEF report A 22026 (2012)
21. Information Technology—Security Techniques—Information Security Incident Management.
Standard, International Organization for Standardization, Geneva, CH (2011)
22. Cichonski, P., Millar, T., Grance, T., Scarfone, K.: Computer security incident handling guide.
NIST Spec. Publ. 800(61), 1–147 (2012)
23. ANSI/ISA: Security for Industrial Automation and Control Systems Part 1: Terminology, Con-
cepts & Models. Tech. rep., American National Standards Institute/International Society of
Automation (ANSI/ISA) (2007)
24. ANSI/ISA: Security for Industrial Automation and Control Systems: Establishing an Industrial
Automation and Control Systems Security Program. Tech. rep., American National Standards
Institute/International Society of Automation (ANSI/ISA) (2009)
25. ISO/IEC: Information Technology—Security Techniques—Information Security Managemen-
t—Measurement (ISO/IEC 27004: 2009). ISO/IEC (2009)
26. Chew, E., Swanson, M., Stine, K., Bartol, N., Brown, A., Robinson, W.: NIST Special Publica-
tion 800–55 Revision 1. Performance Measurement Guide for Information Security, National
Institute of Standards and Technology, US Department of Commerce. Computer Division,
Gaithersburg, MD 20899, 8930 (2008)
27. Verdugo, R.P.: Estado de las tecnologías de la información y la comunicación en las universi-
dades ecuatorianas. CEDIA (2017)
Virtual Environment for Remote Control
of UGVs Using a Haptic Device
Abstract This paper presents a virtual reality environment designed for military
training personnel, focused on the remote control of unmanned land vehicles. The
environment design has been made in the V-REP software, where a prototype of
an explorer robot based on the kinematic model of a unicycle is presented. This
vehicle is attached with proximity sensors to detect obstacles and thus be able to
avoid them. Instead of operating with a conventional joystick that only allows the
use of push buttons, a haptic device with force feedback is used with which the
user experiences a more realistic immersive situation. In this context, the person can
manipulate the unmanned vehicle direction and perceive when there is a collision
with a nearby object as if it were on the site. To link the input device (Novint
Falcon) with the virtual interface, the device mathematical modelling is carried out,
and through MATLAB, the respective processing and the implementation of the
1 Introduction
In recent years, the advance of technology has brought with it several tools that facil-
itate the daily tasks of the human being [1]. He wants to acquire more knowledge,
explore, and innovate, and thanks to this, science expands covering more fields of
application [2]. This is how robotics was born, a topic of interest that has allowed us
to carry out several multidisciplinary researches [3]. The main interest of researchers
is to design robots with autonomy that can be used in health care, space explo-
ration, military, and rescue applications, among others [4]. Within mobile robotics,
the unmanned ground vehicles (UGV) stand out, and they can be teleoperated by
specialists and thus develop dangerous activities, where it would be risky to enter a
person [5]. Time and effectiveness, in addition to safety, of these robotic systems is
highly compared to actions developed by a human being where the aim is not intended
to supplant it, but complement it with an important instrument [6]. Additionally, by
attaching sensors and video devices to a robot, reconnaissance and exploration tasks
can be performed in known and unknown territories. The knowledge of space can
then be defined in two parts: structured spaces and unstructured spaces. On the one
hand, the path to be followed and the objects that must be avoided are already defined;
on the other hand, several characteristics that can change must be contemplated and
therefore must be studied to obtain satisfactory executions [7].
Whether directing a real or a simulated robot, the operator’s learning is very
important for the integration of new knowledge and skills. Traditionally, these vehi-
cles have been operated by control levers such as joysticks which only have push
buttons, but do not give the feeling of contact with the environment in question [8].
This is the reason why the use of haptic devices with force feedback allows the user
to feel the effect of being inside the environment where actions are executed through
a slave robot. Another important technological tool that is very popular is virtual
reality (VR). It consists in a platform that facilitates the implementation of interac-
tive environments, allowing the user to relate to objects and situations that simulate
the real world. Several areas of application of the VR are come to combine including
entertainment, education, research, rehabilitation, military applications, and others.
For example, in [9] a study is carried out in which the relationship between presence
and performance is evaluated, while a psychomotor task is executed in a virtual envi-
ronment. Although virtual simulation has been validated empirically to be effective
in the transfer of skills to the live environment, what is still unknown is the effect of
Virtual Environment for Remote Control of UGVs … 523
the user sense of presence in the simulation performance. In this way, it can be known
in a better way the behavior of the user before an immersive experience. For their part
in [10] using a VR application, war veterans with post-traumatic stress disorder are
trained so that they can obtain a job after serving in their military work. Preliminary
results showed that participants who attended 95% of the sessions showed improve-
ment in their abilities when facing a job interview and in their self-confidence.
In parallel, by merging graphic computing with other areas of knowledge, staff
can be trained to perform tasks that require hand–eye coordination, such as surgery,
maneuvers in dangerous spaces, or teleoperation. In medical area, there are some
researches like [11], where the application of virtual reality is described to optimize
the acquisition and retention of military medical skills. This system not only devel-
ops the surgical skills of the person, but also incorporates an intelligent mechanism
that recognizes the deficiencies of the skills and generates an optimal program of
adaptive training. In the proposal developed by Ibari et al. [12], a VR system is
presented for the remote control of a unicycle robot through an intuitive multimode
man–machine interface. This system manages the tracking of a path by the real robot
through the Internet and a wireless network. The result analysis shows the system
performance in terms of precision, stability and convergence, and the ability to run
from any machine connected to the Internet. In this context, the prior research car-
ried out by Tikanmäki et al. [13] presents a teleoperation system, where the user
can control semiautonomous mobile robots simulated by a joystick, replacing the
conventional video screens with an immersive virtual environment. The operator can
see and inspect the situation by collecting data from an appropriate perspective with-
out suffering motion sickness due to latency in traditional teleoperations. The user
experiences are positive when highlighting the possibility of having multiple virtual
screens to display images of the camera without experiencing dizziness and without
requiring prior knowledge. In the work of Lwowski et al. [14], two experiments were
carried out with unmanned ground vehicles (UGV). The first one is manually driven
in square form with a Vive Tracker where an estimated position error in average
odometry is visualized. Second experiment has a PID controller used to drive the
UGV in two different test patterns: a square and an eight figure. The usage of virtual
reality as a simulation environment shows as result the usefulness of the tool for
systems researchers.
Related works have shown the use of a joystick to drive simulated and real vehi-
cles but without obtaining a complete immersive experience. In this context, this
paper seeks to develop the skills and abilities of military personnel to maneuver
exploration UGVs in a semi-structured environment. To achieve this goal, a virtual
reality environment is presented, where objects that the vehicle must evade are found
in order to carry out the desired trajectory and task. In addition to having a visual
perception, it is required that the user determines the exact force that must be applied
to command a robotic mechanism based on the kinematic model of a unicycle, and
therefore, the Novint Falcon haptic device is used. For the connection between the
physical and virtual media, the MATLAB software is used, where through the kine-
matic study of the Falcon Master Robot its behavior can be simulated. Through a
PID control algorithm, the desired trajectory is tracked. The experimental tests and
524 F. Roberto Segura et al.
results demonstrate the validity of the proposal, since the control actions are executed
efficiently, thus representing an important teaching tool.
This project is divided into six sections, including the introduction in Sects. 1
and 2 presenting the description of system. Section 3 shows the elements of system.
Section 4 talks about the implementation; Sect. 5 shows the results; the conclusions
are presented in Sect. 6.
2 Methodology
The methodology used to solve the problems encountered follows a set of hierarchical
steps shown in Fig. 1. In this figure, all the sections that will contain the methodology
to solve the problem are detailed. First, a mathematical analysis of the equations
representing the Robotic Master System is considered, analyzing the kinematics of
the device. All the necessary libraries and drivers are also considered to connect
the haptic device to the computer, so it must have to be installed the corresponding
packages for the MATLAB and V-REP software. Mathematical modeling and the
implementation of a control method allow to simulate the behavior of the device in
MATLAB, prior to the execution of real tests. Also, the control method allows the
accomplishment of tasks by the unicycle-type mobile robot. This scenario contains
primary elements and/or equipment that represents a training scenario for the skill
of the user, where the acquired information is converted to forces. The conversion
to forces allows to fulfill the purpose of this work, which focuses on presenting a
clearer perspective of the interaction between the slave robot and the environment
with which it interacts.
3 Modeling
where the expression PID represents the control algorithm to compensate for the
error that occurs in carrying out the displacement task, and it is defined in (4).
t ∂
PID( P̃C ) = kp P̃C + ki P̃C dt + kd P̃C (4)
∂t
0
526 F. Roberto Segura et al.
The simulated object representing the Novint Falcon allows to validate both the
modeling and the proposed PID controller. Next, the operation of the controller
is demonstrated by tracking the trajectory described by: xd = r ∗ cos( p), yd =
(2 ∗ π ) ∗ 4, z d = π ∗ sin( p), components that form a circumference. To perform the
validation of the experimental control with the haptic device is considered a control
gain of k p = 0.1, and this gain is applied for the control of the errors in x, y, z.
Figure 2 shows the simulation of the stroboscopic movement of the robotic system
to fulfill the desired trajectory, where the path to be followed and the execution that
the operative end executes are shown.
The robot interaction with an environment limited by walls can allow the increase
in the dexterity of an operator located at a remote site. In this way, the use of V-REP
properties is proposed to create a room, in which multiple objects are located in
different positions. These are chairs, tables, columns, and different furniture that can
interfere with the path of the robot and should be avoided by the user.
Virtual Environment for Remote Control of UGVs … 527
In the application development, the main step is to adapt the configuration of the
simulation software and the mathematical software. Through this configuration, both
packages are intercommunicated to test the operation of the haptic device in the
control process. To maneuver the direction of the vehicle using the Falcon Novint,
the sending and receiving of feedback data is constant and its configuration is detailed
in Fig. 4.
In order to avoid collisions between the robot and the elements of the environment,
forces are fed into the operating end of the master robot when the proximity to an
obstacle exceeds a threshold. In order to carry out the proposed task, the position
differences between the robot and the neighboring elements are calculated through the
incorporation of a virtual laser. This information allows taking actions for evasion.
The implementation of a PID control algorithm allows to determine the feedback
force to the haptic device so that the operator can avoid collisions. This prevents
damage to the robotic mechanism through the injection of proportional speeds to
528 F. Roberto Segura et al.
each wheel (depending on the location of the obstacle in the plane). This process is
supervised by visual feedback, since a camera is placed on the front of the robot to
visualize the space where it moves, allowing to validate the feedback obtained by
the haptic device.
5 Experimental Tests
The aim to conduct a UGV within a semi-structured environment is the main require-
ment in order to carry out the teleoperation experimentation through the use of the
Falcon. Considering that the robot is in an initial position, it is proposed to perform
an exploration task and take it to a desired point. To do this, the operator must apply
linear and angular velocities through the haptic device, while experiencing force
feedback. If an object is close and a collision will be made, a force is generated,
informing the operator in a direct way, so that it makes the required corrections and
keeps getting closer to the desired point. The used hardware to perform these tests
has an Intel Core i7-7500U at a 2.7 GHz speed, with 16 GB RAM and an Ether-
net network device: NIC Fast Ethernet family RTL8101E, wireless network device:
Realtek RTL8187B supporting the Wireless 802.11g 54 Mbps. For the optical device,
it has been used the Novint Falcon with 3D Touch Workspace of 4 × 4 × 4, with
2 lbs. of force capabilities and 400 dpi of position resolution. Figure 5a shows the
system in execution, at the starting point, and in Fig. 5b, the user is shown performing
teleoperation tasks.
For the validation of this proposal, 10 tests were carried out with three different
users. The experimental data taken from the teleoperation task of the mobile vehicle
Virtual Environment for Remote Control of UGVs … 529
Fig. 5 a Virtual environment presented to the user, b Experimental tests performed by a user
are within a considerable margin of error; in each test, it is seen that the average
errors for x, y, z oscillate depending on the movement and position of the mobile.
Depending on the distance between the robot and nearby obstacles, the user modi-
fies the return forces to avoid collision. In Fig. 6, the correction force injected into the
haptic device is presented as a response to the interaction between the robot and the
environment on the X, Y, Z axes. Based on these variations, various errors in each of
the axes are calculated, as shown in Fig. 7. After users have completed the task, they
are given the ASQ test developed by Lewis [15] which consists of three questions,
with a rating of 1–7 each. The lower the selected score, the higher the satisfaction
of the usability of the user with his/her system. This is presented in Table 1. Results
are determined by calculating the average (arithmetic mean) of the three questions.
In this way, the test of this work obtains 1.33, 2, and 2, respectively, for three people,
so the general average was 1.78/7.
stress reduction to which they are constantly subjected. As the tests are developed,
the dexterity and self-motivation increase, which is evidenced in lower error values
when maneuvering the vehicle. Based on this, the authors are already working on
future research, where the first instance is to create new environments, which include
several types of obstacles, to prevent monotony. In addition, it is priority to use the
same principle to develop more military and industrial applications and thus cover
more areas.
References
1. Mosey, S., Guerrero, M., Greenman, A.J.: Technology entrepreneurship research opportunities:
insights from across Europe. J. Technol. Transfer 42(1), 1–9 (2017)
2. McCarthy, J., Wright, P.: The Enchantments of Technology. Human–Computer Interaction
Series, pp. 359–373. Springer (2018)
3. Zieliński, C., Winiarski, T., Kornuta, T.: Agent-based structures of robot systems. In: The 19th
Polish Control Conference, KKA 2017, pp. 493–502. Springer (2017)
4. Kunze, L., Hawes, N., Duckett, T., Hanheide, M., Krajník, T.: Artificial intelligence for long-
term robot autonomy: a survey. IEEE Rob. Autom. Lett. 3(4), 4023–4030 (2018)
5. Choi, S.Y.: Agent-based human-robot interaction simulation model for the analysis of operator
performance in the supervisory control of UGVs. Int. J. Precis. Eng. Manuf. 19(5), 685–693
(2018)
6. Aguilar, W.G., Rodríguez, G.A., Álvarez, L., Sandoval, S., Quisaguano, F., Limaico, A.: On-
board visual SLAM on a UGV using a RGB-D camera. In: 10th International Conference on
Intelligent Robotics and Applications, ICIRA 2017, pp. 298–308. Springer (2017)
7. Arbanas, B., et al.: Decentralized planning and control for UAV–UGV cooperative teams.
Auton. Rob. 42(8), 1601–1618 (2018)
8. Wang, H.: Adaptive control of robot manipulators with uncertain kinematics and dynamics.
IEEE Trans. Autom. Control 62(2), 948–954 (2017)
9. Stevens, J.A., Kincaid, J.P.: The relationship between presence and performance in virtual
simulation training. Open J. Model. Simul. 3(2), 41–48 (2015)
10. Smith, M.J., et al.: Virtual reality job interview training for veterans with posttraumatic stress
disorder. J. Vocat. Rehabil. 42(3), 271–279 (2015)
11. Siu, K.C., Best, B.J., Kim, J.W., Oleynikov, D., Ritter, F.E.: Adaptive virtual reality training to
optimize military medical skills acquisition and retention. Mil. Med. 181(5), 214–220 (2016)
12. Ibari, B., Ahmed-Foitih, Z., Reda, H.E.A.: Remote control of mobile robot using the virtual
reality. Int. J. Electr. Comput. Eng. 5(5) (2015)
13. Tikanmäki, A., Bedrník, T., Raveendran, R., Röning, J.: The remote operation and environment
reconstruction of outdoor mobile robots using virtual reality. In: 2017 IEEE International
Conference on Mechatronics and Automation (ICMA), pp. 1526–1531 (2017)
14. Lwowski, J., Joordens, M., Majumdar, A., Benavidez, P., Prevost, J.J., Jamshidi, M.: The
utilization of virtual reality as a system of systems research tool. In: 2018 IEEE 13th Annual
Conference on System of Systems Engineering (SoSE), pp. 535–540 (2018)
15. Lewis, J.R.: IBM computer usability satisfaction questionnaires: psychometric evaluation and
instructions for use. Int. J. Hum. Comput. Interact. 7(1), 57–78 (1995)
Author Index
B F
Barbosa, Jorge, 29, 65 Fernández, Rafael Caballero, 161
Barbosa, Joseane R., 425 Fernández-Villacañas Marín, Manuel A., 293
Barbosa Junior, José Ailton L., 149 Fonseca, Miguel, 321
Benavides, Eduardo, 51 Forero, Sergio Iván Rueda, 345
Brandão, Ana Paula, 257 Franklin Salazar, L., 231, 439, 521
Brito-Filho, Francisco A., 149 Fuertes, Walter, 51, 507
Buele, Jorge, 231, 439, 521
G
C Garcés, Andrés Gordón, 135
Cadena, Alyssa, 507 Gonçalves, António, 475
Canchignia, Christian, 205 Gonçalves, Rafael, 281
Carrera, Enrique V., 411 Gualoto, Franklin, 507
Carrillo, Juan M., 397 Guarda, Teresa, 87, 497
Carrillo, Sandra, 439 Guerra, Lesslie, 363
Carvalho, João Vidal, 39
Clery, Arturo, 487 H
Coelho, Maria Manuela Martins Saraiva Hallo, Vicente, 371, 383
Sarmento, 185 Huertas, Harley Lovato, 135
Correia, Anacleto, 321, 475
J
D Jácome, Richard Navas, 135
Daniel Tenezaca, B., 205 Jakomin, R., 363
de Barros Paes, Carlos Eduardo, 333 Jiménez, Arturo, 371, 383