Developments and Advances in Defense and Security 2020
Developments and Advances in Defense and Security 2020
Álvaro Rocha
Manolo Paredes-Calderón
Teresa Guarda Editors
Developments and
Advances in Defense
and Security
Proceedings of MICRADS 2020
123
Smart Innovation, Systems and Technologies
Volume 181
Series Editors
Robert J. Howlett, Bournemouth University and KES International,
Shoreham-by-sea, UK
Lakhmi C. Jain, Faculty of Engineering and Information Technology,
Centre for Artificial Intelligence, University of Technology Sydney,
Sydney, NSW, Australia
The Smart Innovation, Systems and Technologies book series encompasses the
topics of knowledge, intelligence, innovation and sustainability. The aim of the
series is to make available a platform for the publication of books on all aspects of
single and multi-disciplinary research on these themes in order to make the latest
results available in a readily-accessible form. Volumes on interdisciplinary research
combining two or more of these areas is particularly sought.
The series covers systems and paradigms that employ knowledge and intelligence
in a broad sense. Its scope is systems having embedded knowledge and intelligence,
which may be applied to the solution of world problems in industry, the environment
and the community. It also focusses on the knowledge-transfer methodologies and
innovation strategies employed to make this happen effectively. The combination of
intelligent systems tools and a broad range of applications introduces a need for a
synergy of disciplines from science, technology, business and the humanities. The
series will include conference proceedings, edited collections, monographs, hand-
books, reference books, and other relevant types of book in areas of science and
technology where smart systems and technologies can offer innovative solutions.
High quality content is an essential feature for all book proposals accepted for the
series. It is expected that editors of all accepted volumes will ensure that
contributions are subjected to an appropriate level of reviewing process and adhere
to KES quality principles.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, SCOPUS, Google Scholar and Springerlink **
Teresa Guarda
Editors
123
Editors
Álvaro Rocha Manolo Paredes-Calderón
Departamento de Engenharia Informática Centro de Investigación Científica y
Universidade de Coimbra Tecnológica del Ejército (CICTE)
Coimbra, Portugal Universidad de las Fuerzas Armadas ESPE
Sangolqui, Ecuador
Teresa Guarda
Universidad Estatal Península de Santa
Elena
La Libertad, Ecuador
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore
Pte Ltd. 2020
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether
the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and
transmission or information storage and retrieval, electronic adaptation, computer software, or by similar
or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Preface
This book contains a selection of papers accepted for presentation and discussion at
the 2020 Multidisciplinary International Conference of Research Applied to
Defense and Security (MICRADS’20). This conference had the support of ESPE
(University of Armed Forces) of Ecuador, IME (Military Institute of Engineering)
of Brazil and AISTI (Iberian Association for Information Systems and
Technologies). It took place in Quito, Ecuador, during May 13–15, 2020.
The 2020 Multidisciplinary International Conference of Research Applied to
Defense and Security (MICRADS’20) is an international forum for researchers and
practitioners to present and discuss the most recent innovations, trends, results,
experiences and concerns in several perspectives of defense and security.
The Program Committee of MICRADS’20 was composed of a multidisciplinary
group of more than 200 experts from 40 countries around the world and those who
are intimately concerned with research applied to defense and security. They have
had the responsibility for evaluating, in a ‘double-blind review’ process, the papers
received for each of the main themes proposed for the conference: (A) systems,
communication and defense; (B) strategy and political-administrative vision in
defense and (C) engineering and technologies applied to defense.
MICRADS’20 received 119 contributions from 11 countries around the world.
The papers accepted for presentation and discussion at the conference are published
by Springer (this book) and by AISTI and will be submitted for indexing by ISI,
EI-Compendex, SCOPUS and/or Google Scholar, among others.
We acknowledge all of those who contributed to the staging of MICRADS’20
(authors, committees, workshop organizers and sponsors). We deeply appreciate
their involvement and support that were crucial for the success of MICRADS’20.
v
Contents
vii
viii Contents
Defense Engineering
A Portable GSM Base Station Solution for Military Communications
in Hostile Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Carlos Daniel Altamirano, Santiago Barragán, Felipe Grijalva,
and Manolo Paredes
Characterization and Simulation of a Propagation Model
to Determine the Secondary Effects that Generate High Power
and Frequency Electromagnetic Signs When Impact on Electronic
Systems and Surface of Vehicles Family AMX13
of The Land Force . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Jorge Damian Alvarez, Pablo Albán, Jonathan Lopez,
and Yéssica Fernández
Public Order Disruption Event Detection Based on IoT Technology.
An Approach for the Improvement of Public Security Conditions . . . . . 343
Pablo Albán, López Roberto, Alexander Mejía, Isaac Vallejo, Itaty Alban,
Shakira Cofre, and Esteban Molina
Vibration Effects of the Fixed-Wing Aircraft of the Army Aviation
from Ecuador on the Human Body . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Víctor Yépez, Isabel Arcentales, María León, and Pablo Caiza
Determination of Optimal Procedures for Maintenance
and Repair Operations of the GDU-620 Garmin Applied
to the DA20C-1 Aircraft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
Margarita Palma, Flor Garcés, Samaniego Julio, and Pablo Albán
Álvaro Rocha holds the title of Honorary Professor, and holds a D.Sc. in
Information Science, Ph.D. in Information Systems and Technologies, M.Sc. in
Information Management, and Bachelor in Computer Science. He is a Professor of
Information Systems at the University of Coimbra, researcher at CISUC (Centre for
Informatics and Systems of the University of Coimbra), and a collaborator
researcher at both LIACC (Laboratory of Artificial Intelligence and Computer
Science) and CINTESIS (Center for Research in Health Technologies and
Information Systems). His main research interests are information systems planning
and management, maturity models, information systems quality, online service
quality, intelligent information systems, software engineering, e-Government,
e-Health, and information technology in education. He is also President of AISTI
(the Iberian Association for Information Systems and Technologies), Chair of the
IEEE Portugal Section Systems, Man, and Cybernetics Society Chapter, and
Editor-in-Chief of both JISEM (Journal of Information Systems Engineering &
Management) and RISTI (Iberian Journal of Information Systems and
Technologies). Moreover, he has served as Vice-Chair of Experts for the European
Commission’s Horizon 2020 program, and as an Expert at the Government of
Italy’s Ministry of Education, Universities and Research, at the Government of
Latvia’s Ministry of Finance, at the Government of Mexico’s National Council
of Science and Technology, and at the Government of Polish’s National Science
Centre.
xiii
xiv About the Editors
Teresa Guarda received her Ph.D. in Systems and Information Technologies from
Minho University in 2015. She is currently a researcher at the ALGORITMI
Research Centre, Minho University, Portugal, where she is a member of the
Intelligent Data Systems (IDS) research team and the Information Systems and
Technologies (IST) R&D group. She has published extensively in the following
areas: pervasive systems, marketing intelligence, crowdsourcing, data mining
and knowledge discovery, Internet of Things, knowledge management, and
cyber-security. She has also served as a reviewer for many prominent journals, and
as a Professor and researcher at various academic institutions in Portugal since
1991; currently, she is the Director of the CIST Research Center of the Santa Elena
Peninsula State University (Ecuador) and a Visiting Professor at the Security and
Defense Department of Universidad de las Fuerzas Armadas (Ecuador).
Cybersecurity and Cyberdefense
Cyber Security Vulnerabilities
in Colombia’s Maritime Critical
Infrastructure (MCI)
Abstract This study identifies the threats that affect the cyber security of the mar-
itime critical infrastructure in Colombia. Specifically, four Colombian ports were
analyzed. Based on a descriptive and qualitative analysis, the operational and security
resources of this sample were compared with the guidelines and recommendations
of the International Maritime Organization (IMO) contained in Circular 3 of 5 July
2017. The diagnosis shows negative results in terms of the current preparation of
ports for possible cyber threats. It is proposed to adopt the IMO recommendations in
harmony with the five strategic lines indicated by the Joint Cyber Command of the
Colombian Military Forces (2017), and in compliance with the measures that reg-
ulate the navigation of ships in innocent passage through the Colombian territorial
sea.
1 Introduction
© The Editor(s) (if applicable) and The Author(s), under exclusive license 3
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_1
4 Y. B. G. Gamboa et al.
of peace, and provided that its passage does not adversely affect peace, security, and
proper order. In maritime traffic, each State has the role of a coastal State regarding
its territorial sea and in accordance with international law, but also, because of the
nature of the situations in matters of maritime safety that arise in such traffic, it is
included the flag State or the port State. For any of these situations, the world of mar-
itime security simply includes the identification of risks, vulnerabilities and threats,
and not only for the navigation of the ships but also for the conditions of installation,
maintenance and operation of the port infrastructure of a coastal State. One of the
critical elements in terms of security and protection is the computer infrastructures
from which the computer systems allow the operation of ships and ports, integrating
such critical aspects as the ship–port interface. The access of foreign ships to the
territorial waters of the coastal State demands the implementation of controls and
restrictions that allow it to govern and manage everything that may affect the secu-
rity of its ships, ports, population and territories. One way in which international law
allows each State to design and implement these controls and restrictions is through
the regulation and enforcement of the passage of ships through its waters, in a man-
ner that responds to advances in the State of navigation and maritime safety. The
IMO, through its directives and recommendations, specifies certain conditions for
maritime and port activities to unify such controls and restrictions, so that activities
at sea can flourish in conditions of peace, security and proper order. However, even
though the IMO instruments are present, the Colombian State has yet to regulate
aspects that particularly affect maritime safety when foreign ships make use of the
right of passage through its territorial waters. Thereupon, as part of the research
project, COLCIENCIAS—ARC No. 64905, which aims to propose standards for
the regulation of the right of innocent passage of foreign ships in Colombia, the
progress of a study on the aspects that should be considered in the area of maritime
cyber security is presented.
2 Problem Statement
The use of information and communication technologies is necessary tools for daily
maritime operations. In the Colombian State’s territorial sea, controls on maritime
operations have been gradually evolving, thanks to the adoption of IMO recommen-
dations and the dynamism of port activities in recent years. However, it is necessary
to observe the entire area of the Colombian territorial sea, including its air space,
and the needs that arise in maritime traffic not only through the access of ships in
Colombian ports but also through the passage that some foreign ships make in the
territorial waters without berthing in a port. There is an increasing reliance on infor-
mation and communication technologies both in the crossing and in the berthing of
ships in port facilities.
Cyber Security Vulnerabilities in Colombia’s Maritime Critical … 5
The vast majority of ships and platforms that access Colombian waters use a wide
range of sensors, such as meteorological (RFID),1 Wi-Fi and satellite internet sensors.
These sensors communicate critical information to different systems that allow the
navigation of ships, such as the Automatic Identification System (AIS), the Electronic
Chart Display and Information System (ECDIS), the Global Navigation Satellite
System (GNSS) and the Global Positioning System (GPS). Also, very vulnerable
to any form of external interception, both ships and port facilities, are the alarms,
LEDs, display and general force drivers (actuators) [1].
Technologies used in maritime activities also present increasing risks due to net-
work interceptions and the proliferation of malware. Most of these risks have been
classified as a result of cyber-attacks [2]. Studies of individual cyber-attacks have led
to the proper identification of cyber risks. For example, the most emblematic recent
cases have been the White Rose of Drax yacht (2013), the Ransomware-type block-
ade of the management and control systems of the ships of the MAERSK shipping
company (2017), and the disruption of operations on oil drilling platforms (2010,
2012 and 2014), the attack on the servers of the shipping company IRISL (2011),
the cargo control system of the Australian customs (2012), and the alteration of the
information of the containers in the port of Antwerp in Belgium between 2011 and
2013. As a result of these studies, the IMO has set a deadline of 2021 for owners
and administrations to incorporate cyber security measures on tankers subject to
OCIMF2 controls. However, it is also necessary to consider that many cyber risks
cannot become publicly known for justified reasons of national security and, com-
mercially, because of speculation that may arise from the values of cybersecurity
services and premiums on the marine insurance market.
The identification of cybernetic risks both in ships and in port facilities has been
prevented through guidelines that the IMO defined in 2002 through the regulations
known as ‘ISPS Code’ in Spanish, known as the ISPS Code [3]. In the development
of the ISPS and under the SOLAS Conventions, States have been regulating specific
matters such as, for example, the entry of goods into air and sea terminals, which may
include cyber risks. On the part of the Colombian State, the regulation of the ISPS is
adopted in consideration of its commitments acquired by the SOLAS Conventions,
and not in a complete and formal way, leaving to the discretion of the Government and
the development of the maritime authorities the possibility of advancing regulations
according to opportunity criteria for partial aspects. Thus, for example, there is a
presidential decree 2155 of 2014 [4] that defines the unified standards of technology
of non-intrusive inspection equipment, certainly applicable to the equipment that
supports the port activities and the ships. This decree creates an administrative body
with a cross-sector composition for the implementation of non-intrusive inspection
1 RFID (Radio Frequency Identification) is a technology similar, in theory, to bar code identifi-
cation, but this technology employs electromagnetic or electrostatic waves for the transmission
of the signal containing the information. RFID is also known as DSRC (Dedicated Short Range
Communications).
2 OCIMF is an advisory body to the IMO, constituted as an international marine forum for oil
companies to promote the safe and environmentally responsible transportation of oil and oil
products.
6 Y. B. G. Gamboa et al.
systems, which could establish guidelines for port operators to take more control.
However, if it only regulates the conditions of unification of the inspection teams, it
leaves a precedent that encourages the dispersion of regulations, in order to diversify
the subjects, and not to concentrate those elements that are integrated into the intrusive
cyber risk, especially necessary in the ports of the States as in the case of Colombia.
It is necessary not to forget that these risks make the maritime ports a critical focus
of vulnerabilities not only of cyber-attacks but also of spontaneous or not allowed
intrusions, which can affect both the security conditions in the port activities as well as
the access to the infrastructure interconnected with the ports. There is also a particular
need for State regulation to contain correction criteria that are more appropriate
to the needs of maritime cybersecurity. These criteria are the result of relations
between owners, shipping agents, ship managers and providers for cybersecurity
risk management.
In the event that the regulation of States is dispersed, the IMO will issue recom-
mendations in 2016 in Circular 1525 of 1 June 2016 [5]. Within the organization of
the Colombian maritime public administration, and the powers that its bodies legally
have, Circular 1525 specifies some of the following recommendations, which can be
included in the Colombian regulations for the management of maritime cyber risk:
1. Specify the powers to be exercised by officials, in particular regarding inspection,
testing of ship and port facility security measures and procedures, together with
the possible application of enforcement measures to correct instances of non-
compliance.
2. In maritime security measures for cybercrime risk, differentiate matters to be
regulated by so-called ‘primary regulation’ (i.e. laws and decrees) from what
is called ‘secondary regulation’ (regulations, instructions, manuals, adopted in
pursuance of powers granted by primary regulation).
3. Distinguish between provisions that are mandatory for taking maritime protection
measures and those which are merely indicative or optional for certain needs of
optimization of the resources employed.
4. Determine the conditions for issuing Declarations of Security when they are
required for the assessment of cyber risk in a ship/port interface operation or
ship-to-ship activity that may affect people, property or the environment.
5. Determine the procedures to be followed for the identification and reporting
of incidents, with a classification appropriate to the cyber risk, while allowing
for prompt notification to local law enforcement agencies, when the ship is in
Colombian territorial waters.
Since there is a pressing need to identify such risks in advance, the IMO sub-
sequently issued Circular 3 of 5 July 2017 [6], providing some recommendations
that serve as guidelines for the management of maritime cyber risks, especially with
regard to the controls that can be implemented by governments that are both in the
position of flag State and coastal State.
Afterwards, the IMO Maritime Safety Committee developed, on 11 March 2019,
the Maritime Industry Guidelines on Shipboard Cybersecurity in version 3 (MSC
101/4/1) [7]. These guidelines are considered necessary for port structures because
Cyber Security Vulnerabilities in Colombia’s Maritime Critical … 7
between ships and ports, there is a principle established since the ISPS Code (ISPS)
making parity between the structural elements of risk management of a ship with the
elements contained in the port, or vice versa, mandatory. Because of this principle,
the guidelines on cyber security on board ships apply mutatis mutandis to ports. If
a State imposes certain cybersecurity conditions as a requirement for flagging in a
ship, these conditions will eventually be replicated in ports which the coastal State
must necessarily provide with the same conditions for the ships it expects to receive
in its ports.
In summary, the vulnerability from cyber-attacks is concentrated in the so-called
maritime critical infrastructure (MCI): port terminals, ships and their cargo, and
maritime control stations. The various infrastructures that are subject to the greatest
protection and defense care have also been called cyber critical infrastructures or
digital critical infrastructures (Fig. 1) [8].
From the controls that can be carried out by the maritime administrations of the
governments, the infrastructures can be supported by two classes of technologies:
information technologies (IT) and operation technologies (OT). The above distinc-
tion makes it possible to specify the conditions from which the type of threats and
vulnerabilities to MSI must be identified. Thus, for example, while the former (IT)
supports information systems for port operation that could generate errors that delay
or paralyze traffic, the latter could support automatic controls of gantry cranes with
the risk of generating accidents in the movement of cargo on the ship or within the
port.
A review of all the rules of domestic law in Colombia shows that there is currently
no regulation that precisely allows for greater control of maritime operations in its
jurisdictional waters in the face of cybernetic risks in its port facilities. This study
specifies how the vulnerabilities in Colombian port infrastructure are currently dealt
with in the face of possible cyber-attacks, with the aim of creating a regulation for
maritime activities that is more in line with the needs that arise from the use of
8 Y. B. G. Gamboa et al.
ICTs, so that the exchange of information can flow and so that the implementation
of protection measures against this type of attack is in line with the good maritime
practices encouraged by the IMO.
3 Methodology
In order to identify the vulnerabilities of Colombian ports, the main ports were
sampled, and in order of importance those located in the cities of Cartagena, Bue-
naventura, Barranquilla and Santa Marta. In each of the ports, the equipment directly
related to ICTs was identified, especially the control and cargo equipment of each
of the corporations that own the port operation. In the study, each port is evaluated
according to its greater or lower capacity to receive container ships and the flow
of its logistics operation in relation to the security systems that each port has. The
equipment of the port terminals in the sample registers common characteristics even
though they were built by different companies and operated by different corporations.
These common structural characteristics facilitated an analysis of their vulnerabili-
ties to cyber-attacks. Indeed, the characteristics of the equipment directly related to
ICTs have an architecture based mainly on PLC (Programmable Logic Controller)
devices, data packet transport protocols such as TCP (Transmission Control Proto-
col) and network protocols such as IP (Internet Protocol). These combinations make
the systems susceptible to affectation through cybernetic attacks (Fig. 2).
The analysis of vulnerabilities in the port facilities of the main ports included in
the sample is presented specifying the equipment with its characteristics obtained
through a survey applied to the respective port operators (Table 1).
The survey applied in 2019 revealed the results (Tables 2, 3, 4 and 5).
Regarding the systems for the management and control of cargo and for security
in the port, the survey also provided the results (Table 6).
On the other hand, the Colombian Maritime Authority exercises traffic control
through the ports by means of a system that allows the coordination of reaction
operations in the event of situations that may affect the security of the ports, and under
the action of the units of the National Navy Coast Guard. The system is known as
SICTVM (Integrated System for Traffic Control and Maritime Surveillance), which
interconnects sensors, servers and administration consoles [9].
The architecture of this system employs RADAR, ECDIS, GPS and AIS inform-
ing the servers and computers used for administration, and communicating through
Cyber Security Vulnerabilities in Colombia’s Maritime Critical … 11
Table 6 Management and control of cargo at the port versus existing security technological tools
at the port
Systems for management and control of cargo at the Technological implements of security at
port the port
SPRC It has the capacity to simultaneously It has state-of-the-art technology to
receive up to five Neo-panamax type protect and safeguard cargo, motor
vessels because it has the latest versions vessels, terminals, operation equipment
of systematized technology such as an and users, through information systems
information management system for that alert to potential risks that arise in
port management which, together with the development of port operations. The
the equipment described in Fig. 1, following security controls are in place:
allows a constant flow in the logistics 1. Access control through intelligent
operation chain identification credentials
2. Closed-circuit television (CCTV)
3. High-tech scanners to verify the
content of containers entering or
leaving the port
SPRBUN Logistical capacity relies on seasonal There is a coordination of the security
restrictions due to climatic conditions, teams employed with a high standard,
especially rainfall, occasional sediment through an integrated electronic security
from river mouths in the bay, and high system, which allows to provide the
traffic by artisanal fishers. It also shipowners, logistic agencies and
depends on the timely arrival of cargo workers’ personnel, security during the
collection vehicles, which make land development of any procedure inside
trips from the centre of the country. The the port. The following systems are
teams mentioned in the figure carry out available and regularly used:
the maritime operations inside the port 1. Biometric readers for access control
facility to the facilities
2. Full and half body swivel mounts
3. Vehicle access points, all controlled
by a server containing detailed data on
the port population
4. Closed-circuit TV
5. Special system to monitor the
internal navigation channel under any
visibility condition, which includes an
average recording time of 75 days
SPRB It is equipped with an information The latest technology systems used in
management system for port the port include non-intrusive X-ray
management connected to the inspection equipment, which allows the
equipment mentioned in the figure detection of explosive and narcotic
chemicals on board containers entering
or leaving the port terminal
SPSM The equipment indicated in the figure The logistics operation chains are
has been the result of recent protected by the following elements:
modernization and technification Human heat detection cameras
processes of the port Closed-circuit TV
Non-intrusive X-ray inspection
equipment, which allows the detection
of chemical, explosive and narcotic
substances on board containers entering
and/or leaving port facilities
12 Y. B. G. Gamboa et al.
commercial protocols, due to this they can be affected through cyberspace, for exam-
ple, with a cyber-attack that affects the control of ship traffic, completely paralyz-
ing the port, an access channel or trigger discharges of pollutants into the marine
environment.
The towers of the maritime traffic control stations located in each port regulate the
traffic in and out of national ports. The towers transmit information to the National
Navy units that carry out operations to ensure the safety and security of ships entering
and/or leaving the port. In the event of a cyber-attack, errors would result in accidents
within the port access channels. With the intrusion, the manipulation and/or degrada-
tion of the security systems controlled by the Coast Guard would facilitate criminal
activities such as drug trafficking, smuggling and human trafficking. It could also
affect the automatic control of weapons on board the National Navy’s units afloat
[9].
Because of existing vulnerabilities, the Joint Cybernetic Command of the Gen-
eral Command of the Colombian Military Forces adopted a National Protection and
Defense Plan for Colombia’s Critical Cybernetic Infrastructure [10]. The Plan aims
to develop an information resilience capacity through five strategic lines, tending
to strengthen the cyber security of MSIs throughout the country: Identify, Protect,
Detect, Respond and Recover.3 The Plan includes the implementation of guidelines,
certification and awareness programs, the strengthening of response capacities and
the recovery from threats directed from the National Protection Centre. However,
although the Plan does not contradict the proposals of the guide on cybersecurity
on board ships, the guide is more specific, especially in what it establishes as strate-
gic circular phases of cyber risk management: identify threats, identify vulnera-
bilities, assess risk exposure, develop protection and detection measures, establish
contingency plans, respond to recover from cyber security incidents [11].
3 The aspects contained in the proposal, seek to be part of the aspects to require vessels to make
use of the right of innocent passage in Colombian territorial waters, in a state of normal navigation.
Its scope is given for the critical infrastructure of ships with components of OT/IT or hybrids and
are based on the guidelines of the National Center for Critical Infrastructure Protection of Spain
CNPIC, the twenty critical security controls SANS and the five functions of the NIST framework
“Improving Critical Infrastructure Cybersecurity”, which are Identify, Protect, Detect, Respond and
Recover, which is also adopted by the Joint Cybernetic Command of the General Command of the
Military Forces of Colombia, in the first version of the publication of the National Plan of Protection
and Defense for the Critical Cybernetic Infrastructure of Colombia.
Cyber Security Vulnerabilities in Colombia’s Maritime Critical … 13
5 Conclusions
Based on the five main ports studied and referenced at the national level, it was possi-
ble to determine that the use of IT/OT systems for loading and unloading operations
may be subject to a cyber-attack in terms of operating and cargo control equipment.
Therefore, the concept of cybersecurity within the framework of the relationship
between maritime authorities and stakeholders in the management and control of
national maritime security is a point to be included within the regulation and control
of maritime activity.
E The Colombian maritime sector has not fully implemented the recommendations
and guidelines of the IMO to reduce maritime cyber risk, as it is not aware of any
type of Plan, program and/or effort that the Colombian Maritime Authority has
managed to create guidelines to strengthen a culture of cyber risk awareness in the
critical infrastructure of the maritime sector. There is no known IMO orientation,
4A company that owns the largest maritime databases in the world, developed from the Lloyd’s
Register of Ships, which has been published continuously since 1764. It has extensive databases
of ships, ship movement, casualties, ownership, ports and news, as well as research and consulting
services.
14 Y. B. G. Gamboa et al.
References
10. Comando Conjunto Cibernético CCOC: Plan Nacional de Protección y Defensa para la
Infraestructura Crítica Cibernética de Colombia. Imprenta de las FFMM, Bogotá, Colombia
(2017)
11. Reiskind, A.: Seguridad Cibernética y Transporte Comercial Marítimo: ¿Todo está en Orden?
Global Technologies for Defense and Security. Asociación Canadiense para la OTAN (NAOC)
(2018)
Cyberspace and Innocent Passage:
Regulations for the Security
of the Coastal State
Abstract This research identifies the actors, interests, and situations involved in
the development of cybernetic operations that can affect the peace, good order, and
security of the coastal State in its territorial sea. Particularly, special emphasis is
placed on the right of innocent passage of foreign ships navigating in such space.
Each of the activities of this legal concept is studied in order to determine whether or
not the passage complies with the condition of innocence and its close relationship
with the use of cyberspace for such purposes. Fifteen interests and their implications
for security are recorded and analyzed from the perspective of cyberspace. The
study concludes that in the absence of an international regime for the governance
of cyberspace and the legal obsolescence of customary international law to regulate
activities related to innocent passage, it recommends that States should empower
themselves with laws and regulations to ensure their security in cyberspace.
1 Introduction
© The Editor(s) (if applicable) and The Author(s), under exclusive license 17
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_2
18 F. Ramírez-Cabrales and J. A. Machado Jiménez
2 Methodology
It was considered necessary for this study to first analyze the concepts, scope, and
definitions of cyberspace and the right to the innocent passage of foreign ships in the
territorial sea. Once the theoretical framework of this proposal had been identified,
each of the situations in which the passage of a foreign vessel would be considered to
be detrimental to the peace, good order, or security of the coastal State was analyzed.
To this end, 15 interests and the actors that motivate a behavior or action that according
to the objective can be considered an undesirable act for the security of the State in
its territorial sea were identified. Specifically, this phase analyses the connection
between the security of international maritime traffic and the use of cyberspace
for civil or military purposes. The results obtained in this phase allowed partial
conclusions to be drawn because of the constant evolution of this complex problem
associated with the use of cyberspace and its relationship with the territorial sea to
regulate the activity of innocent passage by foreign ships.
The increase in international maritime trade by sea and the digital economy, as well
as the projection of new routes for international navigation, require the strengthening
and modernization of national legislation to regulate the right of innocent passage of
foreign vessels through the territorial sea, including island territories. The right of
innocent passage may be exercised on condition that it does not disturb the peace,
order or security of the State. Innocent Passage means the act of sailing through the
territorial sea for the purpose of crossing that sea without entering the internal waters
and without making a stopover or going into or out of internal waters, or calling at
a port facility, or leaving it.
The passage of a foreign vessel shall be deemed to be prejudicial to the peace,
good order, or security of the State if that vessel infringes the sovereignty, territorial
integrity, or political independence of the State. In this regard, customary interna-
tional law compiles a list of activities that are deemed to be prejudicial to the peace,
good order or security of the coastal State and that result in the passage of a foreign
vessel being not innocent.
Under customary international law, the passage of a foreign vessel shall be deemed
to be prejudicial to the peace, good order or security of the coastal State if that vessel
engages in any of the following activities in the territorial sea: (a) Any threat or
use of force against the sovereignty, territorial integrity or political independence of
the coastal State or in any other manner violating the principles of international law
embodied in the Charter of the United Nations; (b) Any exercise or practice with
weapons of any kind; (c) Any act aimed at obtaining information to the detriment
of the defense or security of the coastal State; (d) Any act of propaganda aimed at
undermining the defense or security of the coastal State; (e) The launching, receiving
Cyberspace and Innocent Passage: Regulations for the Security … 21
or loading of aircraft; (f) The launching, receiving or loading of military devices; (g)
The embarkation or disembarkation of any product, currency or person in contraven-
tion of the customs, tax, immigration or sanitary laws and regulations of the coastal
State; (h) Any act of intentional and serious pollution contrary to this Convention; (i)
Any fishing activities; (j) The conduct of research or hydrographic surveys; (k) Any
act aimed at disrupting the communication systems or any other services or facilities
of the coastal State; (l) Any other activity not directly related to the passage.
This diversity of activities can guide the State’s action in its national interest to
reduce the margin of uncertainty in estimating the harmlessness or otherwise of the
passage. Furthermore, Hakapää and Molenaar [14] argue that the list is not absolute
because of paragraph (l) which refers to any other activities not related to innocent
passage. Therefore, the coastal State may adopt, in accordance with customary inter-
national law, laws and regulations concerning innocent passage through the territorial
sea on some or all of the following matters: (a) The safety of navigation and regula-
tion of maritime traffic; (b) The protection of aids to navigation and other services
and facilities; (c) The protection of cables and pipelines; (d) The conservation of the
living resources of the sea; (e) The prevention of violations of its fisheries laws and
regulations; (f) The preservation of its environment and the prevention, reduction and
control of pollution thereof; (g) Marine scientific research and hydrographic surveys;
(h) The prevention of violations of its customs, immigration, and sanitary laws and
regulations.
Currently, each of these activities can be said to be embedded in a cyber-
environment that links States, organizations, users, networks, devices, all types of
software, processes, stored or circulating information, applications, services and sys-
tems that are directly or indirectly connected to networks [15]. According to Bejarano
[16], the actors involved (including States, businesses, organizations, groups or indi-
viduals) will compete to control it. This inevitably leads to conflicts in cyberspace.
Cyber conflict is a confrontation between two or more parties, and at least one of
these parties will resort to cyber-attacks to attack the other. The context will differ
from the nature and objectives of the actors. Therefore, the territorial sea and the
regulation of the innocent passage of ships do not escape the threat of cyberspace as
a means of affecting the peace and security of the coastal State.
Table 2 Criteria for determining cyber operations harmful to the security of the coastal State in its
territorial sea
Criteria Determination Classification
Severity Cause physical damage Harmful
Immediacy Produce imminent damage Harmful
Directness Associate illegal behaviors Harmful
Invasiveness Interfere State interests Harmful
Measurability of effects Generate effects similar to the use of force Harmful
Military nature Articulate military and cyber operations Harmful
State participation Establish links between a State and cyber operations Harmful
Alleged legality Articulate military and cyber operations Harmful
Source Prepared by the authors, based in [18]
to build an ethical consensus in this field and to mark the limits of what has been
understood in this area as cyberwar, armed aggression, and the use of force [25].
In this context, the question that arises for international law is how it is determined
whether a cyber-operation can constitute a threat to the peace and security of the
coastal State during the innocent passage of foreign ships through the territorial sea.
For this purpose, the analysis model proposed by Schmitt [26] was considered. This
author proposes guidelines that allow States to identify tools to determine if a cyber-
operation has reached the parameters to be considered a use of force. This criterion
has been adopted by the Tallinn Manual in rule 11.
This approach is useful because it allows to define when there is a use of illicit force
in the field of cyber operations. The criteria to determine whether the foreseeable
consequences of such an activity can affect the peace and security of the coastal State
in its territorial sea respond to six factors indicated in Table 2.
These factors are not absolute. This, taking into account the characteristics of this
space, particularly its intangibility, makes its appropriation impossible and as a result
makes it impossible for a State to exercise sovereignty in this area [27]. However,
despite the fact that the State does not have sovereignty over cyberspace per se, it
does have sovereignty over cyber infrastructure and over any activity that is related
to these infrastructures, since these are over its territory. Therefore, these criteria
constitute a first approximation to establish the guidelines that contribute to regulate
the use of cyberspace to guarantee the security of the coastal State in its territorial
sea and the activities associated with the right of innocent passage.
5 Conclusions
The maintenance of the peace and security of the coastal State and the advancement
of new information technologies require a reconsideration of the use of cyberspace
and its impact on activities related to the right of innocent passage of foreign vessels
26 F. Ramírez-Cabrales and J. A. Machado Jiménez
over the territorial sea. This is in accordance with the fact that customary international
law in no waypoints to the fifth element called cyberspace. Therefore, international
law should review the issue of sovereignty and the jurisdiction applied to cyberspace.
These elements are essential when determining the powers of the State to regulate
cyber operations linked to the right to innocent passage through the territorial sea.
Regarding sovereignty, it is demonstrated that, despite the impossibility of exer-
cising unilateral domination of cyberspace, this does not preclude a State from exer-
cising its authority in this area. Specifically, at least 15 national interests associated
with the innocent passage of ships and their interactions with cyber operations that
jeopardize the security of the coastal State were identified. Therefore, the imminent
need to regulate these activities from the sovereign power of the State is inferred. For
this purpose, international organizations, conventions, manuals, and initiatives that
study cybercrime issues and their treatment from the judicial sphere were registered.
These sources of law constitute inputs for the regulation of activities associated with
the innocent passage and their interaction with cyber operations. In this regard, the
Tallinn Manual was highlighted as a non-binding academic document that describes
how to interpret international law in the context of cyber operations and cyber war-
fare. This manual provides six criteria, not exhaustive. Under these guidelines, the
State can evaluate and consider the hostile behaviors of various actors who intend to
generate cyber-attacks. Therefore, the document is a valuable contribution that can
influence the approaches and positions of States and organizations on how to deal
with this problem.
As far as the regulation of the innocent passage is concerned, the document
constitutes a reference of obligatory consultation to determine the legal regime of
cyberspace—v. g. if it is a space that can be appropriated or if a particular legal
regime is established to determine State competences both on the space itself con-
sidered and on the activities related to the innocent passage. In this way, it will be
feasible to determine the responsibility of the State regarding the prosecution of
criminal activities that take place in cyberspace.
However, it should be noted that the regulation of innocent passage focuses exclu-
sively on the activities of ships as a factor of instability for the security of the coastal
State. This indicates that the international regime of maritime spaces in terms of
regulating the right of innocent passage of ships does not respond to the interests
and situations of conflict that may originate in cyberspace. This implies the need
to seek an international consensus on the part of States in order to establish limits
to the actions and interests of this new scenario. However, the rational condition of
States in guaranteeing their survival in the international environment and maintain-
ing the power of information delegitimizes any intention to create an international
regime for the governance of cyberspace. Consequently, the trend is for each State
in its sovereign capacity to be concerned with its own security and to issue laws
and regulations that will make it possible to identify the types of activities that vio-
late national sovereignty in controlling the security of international maritime traffic
in the territorial sea and its undeniable relationship to the use and exploitation of
cyberspace for the maintenance of national interests.
Cyberspace and Innocent Passage: Regulations for the Security … 27
References
1. Ocon, A.L., Gastaldi, S.: Ciberespacio y Defensa Nacional: Una Reflexión Sobre El Dilema
Libertad-Seguridad En El Ejercicio De La Soberanía 1, p. 89. Revista Científica de la UNDEF
(2019)
2. Dalbello, M.: Digital convergence: the past in the present. In: Spence Richards, P., et al. (eds.)
A History of Modern Librarianship: Constructing the Heritage of Western Cultures. Libraries
Unlimited Ed., California (2015)
3. Valeriano, B., Jensen, B., Maness, R.: Cyber Strategy. The Evolving Character of Power and
Coercion. Oxford University Press, Oxford (2018)
4. Zekos, G.I.: State cyberspace jurisdiction and personal cyberspace jurisdiction. Int. J. Law
Inform. Technol. 15, 1 (2007)
5. Ottis, R., Lorents, P.: Cyberspace: definition and implications. In: Proceedings of the 5th Inter-
national Conference on Information Warfare and Security, pp. 267–270. Academic Publishing
Limited (2010)
6. Joyanes, L.: Cibersociedad, Los retos sociales ante un nuevo mundo digital. Ed. McGraw-Hill
(1997)
7. Nye, J.S.: Cyber Power, p. 94. Belfer Center for Science and International Affairs, Cambridge
(2010)
8. U.S. Cyber Comand: Beyond the Build: Delivering Outcomes Through Cyberspace. Maryland.
https://www.hsdl.org/?view&did=787006 (2015). último acceso 2019/12/11
9. Organización Marítima Internacional: Directrices sobre ciberseguridad a bordo de los buques,
MSC 96/4/1. London. Homepage: http://www.imo.org (2016). último acceso 2019/12/11
10. Organización Marítima Internacional: Guidelines on Maritime Cyber Risk Managment.
MSC-FAL 1/Circ.3. OMI, London. Homepage: http://www.imo.org (2017). último acceso
2019/12/11
11. Organización Marítima Internacional: Directrices del sector sobre ciberseguridad a bordo de
los buques (versión 3). MSC 101/4/1. London. Homepage: http://www.imo.org (2019). último
acceso 2019/12/11
12. Robles Carrillo, M.: El ciberespacio: Presupuestos para su ordenación jurídico-internacional,
en Revista Chilena de Derecho y Ciencia Política, 7 que cita a RYAN et al. (2010): “International
Cyberlaw: A Normative Approach”. Georget. J. Int. Law 42(2010–2011), 1161–1197 (2016)
13. Satola, D., Judy, H.: Towards a dynamic approach to enhancing international cooperation and
collaboration in cybersecurity legal frameworks: reflections on the proceedings of the workshop
on cybersecurity legal issues at the 2010 United Nations internet governance forum. William
Mitchell Law Rev. 37(4), 1744–1804 (2010)
14. Hakapää, M., Molenaar, E.J.: Innocent passage: past and present. Mar. Policy 23(2), 131–145
(1999). https://doi.org/10.1016/S0308-597X(98)00032-3
15. UIT, Rec. UIT-T X.1205: Sector de Normalización de las Telecomunicaciones de la UIT
(04/2008). Serie X: Redes de Datos, Comunicaciones de Sistemas Abiertos y Seguridad.
Seguridad en el ciberespacio—Ciberseguridad. Aspectos generales de la ciberseguridad.
Ginebra-Suiza (2009)
16. Bejarano, M.J.C.: Alcance y ámbito de la seguridad nacional en el ciberespacio. Cuadernos
estrateg. 149, 47–82 (2011)
17. Raboin, B.: Corresponding evolution: international law and the emergence of cyber warfare.
J. Natl. Assoc. Adm. Law Judic. 31, 2 (2011)
18. Llorens, M.P.: Los desafíos del uso de la fuerza en el ciberespacio. Anu. mex. der. int. 17,
785–816 (2017)
19. Kanuck, S.: Sovereign discourse on cyber conflict under international law. Texas Law Rev. 88,
1571–1597 (2010)
20. Shackelford, S.J.: From nuclear war to net war: analogizing cyber attacks in international law.
Berkeley J. Int. Law 27(1), 193–251 (2009)
21. Vergara, M.D.A.: Ciberataques: La influencia del individuo como actor no estatal en riesgo a
la seguridad nacional. Rev. Chil. Relac. Int. 3(55) (2019). ISSN 0719-8256
28 F. Ramírez-Cabrales and J. A. Machado Jiménez
22. Schmitt, M.N. (ed.): Tallinn Manual on the International Law Applicable to Cyber Warfare.
Cambridge University Press (2013)
23. Ferrer, J.A.: Incidencia de la ciberguerra en las operaciones navales. In: Cuadernos de
pensamiento naval: Suplemento de la revista general de marina, no. 15, pp. 87–102 (2013)
24. Loredo González, J.A., Ramírez Granados, A.: Delitos informáticos: su clasificación y una
visión general de las medidas de acción para combatirlo. Celerinet, 44–51 (2013)
25. Domínguez, J.: La ciberguerra como realidad posible contemplada desde la prospectiva. Rev.
Pensamiento Estratég. Seguridad CISDE 1(1), 18–32 (2016)
26. Schmitt, M.N.: Cyber operations and the jus ad bellum revisited. Villanova Law Rev. 56,
578–581 (2011)
27. Jensen, E.T.: Cyber sovereignty: the way ahead. Texas Int. Law J. 50(2), 275–304 (2015)
Security Versus Usability
in E-Government: Insights
from the Literature
© The Editor(s) (if applicable) and The Author(s), under exclusive license 29
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_3
30 F. H. Monzón et al.
1 Introduction
The electronic government is defined as the adoption of ICTs in the public adminis-
tration structures such as channels interconnecting and interacting with organizations
and people through webs, electronic mail, mobile applications, intranet, extranet, etc.
[9]. A similar concept is established by the Organization of American States (OAS),
including the objective of the technology used by the government, i.e., qualitatively
improving services and information available to citizens, increasing the efficiency
and efficacy of the public managements and improving substantively transparency
of the public sector and citizens participation [10].
Furthermore, information security is defined as the set of processes and activities
allowing maintaining information assets (part of an organization) free of dangers
and hazards due to incidents or attacks [11]. Today information (physical, printed,
digital) has become a key resource for organizations [12]. The concept of security
has also been applied to information, with information security being defined as the
preservation of confidentiality, integrity, and availability of information [13].
Usability is the characteristic of systems that is known as “the degree in which a
product may be used by specific users to achieve specific objectives in a context of
specific use” [14]. It is also established as an attribute in terms of software quality,
which assesses how easy to use user interfaces may be. Usability is defined in terms
Security Versus Usability in E-Government: Insights from … 31
Databases to be used for the systematic review are the following: SCOPUS, ACM,
IEEE, and Springer. Table 1 shows PICOC criteria [23] that can be used in the
systematic review.
The comparison criterion is not applicable because the systematic review purpose
is to evidence the main progress in researches, and not compare such results.
For the search process of primary papers the following steps are shown below:
1. PICOC criteria were used as search terms and both synonyms and abbreviations
have been included.
2. For the search chain Boolean operators have been used (OR, AND).
The search chain used for the systematic review of literature has been customized
to match the syntaxes of each database chosen as shown in Table 3.
The study identified a total of 1866 primary papers. After verifications, 1812 arti-
cles were ruled out because they did not comply with the inclusion criteria, whose
summary is shown in Table 4.
The remaining 54 papers are the studies approved for this review, with an extract
thereof seen in Table 5.
Based on the research questions that were previously posed and following the PICOC
methodology, the results obtained from the selected papers are introduced below,
classified by a question. Furthermore, for the sake of order and grouping the following
results organization has been generated and introduced below, and they are covered
in the Discussion topic (Table 6).
Results of Question 1
For question 1 Are information security and usability part of the requirements in
the implementation of electronic government services? a total of 23 papers were
identified and then classified into 3 groups.
P1G1—Need in the Electronic Government.
The first group P1G1 evidences information security and usability as critical
requirements for electronic government services. Table 7 lists the results.
P1G2—Electronic Government Evaluation.
The second group P1G2 contains papers in which Electronic Government services
quality evaluation has been conducted and security and usability have been taken
into account as part of the parameters to be evaluated. It is relevant to point out that
this group of papers evidences the significance of these two factors in electronic
government services. Table 8 shows partial results.
Results of Question 2
Question 2 How information security relates to usability in electronic government
services? intends to identify those researches proposing a way to link both factors
at the same level or in the father–son relationship. Table 10 lists some of the papers
providing an answer to this question 2.
Results of Question 3
Question 3 How to configure information security and usability in applications or
specific solutions of electronic government? intends to identify those applications
or technological solutions which involved security and usability requirements (by
each context or stage). This group aims at finding out manners in which the relation
of both factors can materialize within an electronic government solution. Table 11
shows another extract of papers answering this question.
Security Versus Usability in E-Government: Insights from … 37
4 Discussion
As a result of the Systematic Review, 54 papers were identified, and then organized
and classified as follows:
In group P1G1 (4 papers)—Need in the Electronic Government—electronic gov-
ernment services showed that they need to be usable and secure at present [29],
because the future trend asks for these two factors because, for example, citizens’
personal information is involved [16, 17, 30].
In group P1G2 (13 papers)—Electronic Government Evaluation—security and
usability were discussed among the evaluation variables. Government websites [50],
electronic government services at municipal level [31, 32] and assessments under the
SERVQUAL model [33] were assessed. In addition, electronic government assess-
ments were conducted in India [18, 34], Lithuania [35], Romania [36, 37], Malaysia
[38], Kyrgyzstan [39], Oman [40], and a global assessment [41] as well.
In group P1G3 (9 papers)—Electronic Government success factors—security and
usability were identified as success factors for the services design [18], optimiza-
tion [42], user-focused designs [43], as well as the implementation of electronic
participation [19], electronic voting [20], electronic signature [21], and electronic
identification [22], and in specific scenarios such as in Saudi Arabia [44] and Jordan
[45].
In group P2G1 (4 papers)—Security and usability relation—risk models [25]
and models for the development of mobile electronic government services [46] were
identified including certain security and usability aspects as part of their components.
In addition, two papers including security as a factor to improve usability [28, 47]
as a father–son relationship since it seeks with an independent factor to improve the
dependent one.
38 F. H. Monzón et al.
References
1. Nixon, P.G., Koutrakou, V., Rawal, R.: Understanding E-Government in Europe. Routledge,
London (2010)
2. Alguliev, R., Imamverdiyev, S.: e-Government gestión de seguridad de la información desafíos
de investigación. Bakú, Azerbaiyán, s.n. (2009)
3. Wang, J.-F.: E-Government Security Management: Key Factors and Countermeasure (2009)
4. Youngblood, N.E., Youngblood, S.A.: User experience and accessibility: an analysis of county
web portals. J. Usabil. Stud. 9(1), 25–41 (2013)
5. Nariman, D.: Assessing the Impact of E-Government on Users: A Case Study of Indonesia.
Palermo, Italy (2012)
6. Cranor, L.F., Buchler, N.: Better together: usability and security go hand in hand. IEEE Secur.
Priv. 12(6), 89–93 (2014)
7. Lassmann, G.: Some Results on Robustness, Security and Usability of Biometric Systems.
Lausanne, Switzerland, Switzerland, s.n. (2002)
8. Ferreira, A., Rusu, C., Roncagliolo, S.: Usability and Security Patterns. Cancun, Mexico (2009)
9. Criado, J.I., Ramilo, M.D.C.: ¿Un reto o una nueva moda? Problemas y perspectivas de futuro
en torno a Internet y las tecnologías de la información y la comunicación en las administraciones
públicas del siglo XXI (2001)
10. OEA: Organización de los Estados Americanos: Democracia para la paz, la seguridad y el
desarrollo. http://www.oas.org/es/cidh/indigenas/proteccion/cautelares.asp (2009)
11. Bosworth, S., Kabay, M.E.: Computer Security Handbook. Wiley. https://dl.acm.org/citation.
cfm?id=560494 (2002)
12. ISACA: COBIT® 5 for Information Security (2012)
13. ISO: Information Technology—Security Techniques—Information Security Management
Systems—Overview and Vocabulary. ISO/IEC 27000:2018 (2018)
14. ISO: ISO 9241-11:2018—Ergonomics of Human-System Interaction—Part 11: Usability:
Definitions and Concepts (2018)
15. Nielsen, J.: Usability Engineering (1993)
16. Noor, Z.M., Kasimin, H., Aman, A., Saharai, N.: An adoption model of electronic government
services in Malaysia: electronic labor exchange (ELX). J. Pengurusan, 87–97 (2011)
17. Zaaba, Z.F., Furnell, S., Dowland, P.: Usability and Security Patterns. London, UK, s.n. (2011)
18. Bhattacharya, D., Gulla, U., Gupta, M.: An assessment study of Indian state government portals.
In: E-Government Website Development: Future Trends and Strategic Models, pp. 130–152.
IGI Global, India (2010)
19. Panopoulou, E., Tambouris, E., Tarabanis, K.: eParticipation Initiatives in Europe: Learning
from Practitioners. Lausanne, Switzerland (2010)
20. Alkhakani, S.B., Hassan, S.M.: Suggest trust as mediation to adopt electronic voting system
in Iraq. J. Theor. Appl. Inf. Technol. 96(17), 5729–5739 (2018)
21. Zefferer, T., Zwattendorfer, B., Tauber, A., Knall, T.: Secure and Reliable Online-Verification
of Electronic Signatures in the Digital Age. Rio de Janeiro, Brazil (2011)
22. Axelsson, K., Melin, U.: Citizens’ Attitudes Towards Electronic Identification in a Public E-
Service Context—An Essential Perspective in the eID Development Process. Kristiansand,
Norway (2012)
23. Brereton, P., Kitchenham, B., Budgen, D., Turner, M., Khalil, M.: Lessons from applying the
systematic literature review process within the software engineering domain. J. Syst. Softw.
80, 571–583 (2007)
24. Shayganmehr, M., Montazer, G.A.: Identifying Indexes Affecting the Quality of E-Government
Websites. Tehran, Iran, Iran, s.n. (2019)
25. Chen, X., Wen, N.: Information Security Risk Assessment Model Based on OCTAVE for
E-Government, pp. 1–5. IEEE, Wuhan, China (2010)
26. Priyambodo, T.K., Prayudi, Y.: Information security strategy on mobile device based
e-government. ARPN J. Eng. Appl. Sci. 10(2), 652–660 (2015)
Security Versus Usability in E-Government: Insights from … 41
27. Yang, Y., Song, Z.: LBACWeb: A Lattice-Based Access Control Model for Mobile Thin Client
Based on Web OSes, pp. 103–109. Kuala Lumpur, Malaysia (2019)
28. Pandes, T.L.O., Omorog, C.D., Medrano, R.B.: LeMTrac: Legislative Management and
Tracking System. IEEE, Baguio City, Philippines (2018)
29. Carstens, D.S., Kies, S., Stockman, R.: E-government transparency and citizen engagement
increasing accountability. In: Information Resources Management Association (USA) (ed.)
Digital Solutions for Contemporary Democracy and Government, pp. 189–214 (2015)
30. Zseby, T., Zinner, T., Tutschku, K., Shavitt, Y., TranGia, P., Schwartz, C., Rafetseder, A.:
Multipath routing slice experiments in federated testbeds. In: The Future Internet Assembly,
FIA 6656, pp. 247–258 (2011)
31. Schatteman, A., Mohammed-Spigner, D., Poluse, G.: Citizen participation through municipal
websites: a global scorecard. In: Active Citizen Participation in E-Government: A Global
Perspective, pp. 403–414. Information Science Reference, Illinois, USA (2012)
32. Manoharan, A., Zheng, Y., Melitski, J.: Global comparative municipal e-governance: factors
and trends. Int. Rev. Publ. Adm. 22(1), 14–31 (2017)
33. Balushi, T.H.A., Ali, S.: Exploring the Dimensions of Electronic Government Service Quality,
s.l., s.n. (2016)
34. Bhattacharya, D., Gulla, U., Gupta, M.: E-service quality model for Indian government portals:
citizens’ perspective. J. Enterp. Inf. Manag. 25(3), 246–271 (2012)
35. Domarkas, V., Laukaityte, A., Mačiukas, V.: Assessment of development level of municipal
websites of the Republic of Lithuania. Public Policy Adm. 11(1), 23–36 (2012)
36. Stoica, V., Ilas, A.: Explaining the underdevelopment of rural e-government: the case of Roma-
nia. In: E-Government Implementation and Practice in Developing Countries, pp. 331–348
(2013)
37. Stoica, V., Ilas, A.: An assessment of rural e-government in Romania. In: E-Government
Implementation and Practice in Developing Countries. Como, Italy, s.l.:s.n. (2013)
38. Eskandar, A.A., Raman, M.: State e-government portals in Malaysia: an empirical investigation.
Int. J. Electron. Gov. Res. 9(2), 19–46 (2013)
39. Ismailova, R.: Web site accessibility, usability and security: a survey of government web sites
in Kyrgyz Republic. Univ. Access Inf. Soc. 16(1), 257–264 (2017)
40. Bulushi, T.A.: Quality of E-Government Services in Oman: A Perspective of E-Government
Services Providers. Spain, Madrid (2017)
41. Holzer, M., Manoharan, A., Fudge, M.: Global trends in digital governance: a longitudinal
study. Int. J. Technol. Diffus. 2(2), 32–46 (2011)
42. Li, Z.H., Wu, Y.X., Xu, S.H., Zhang, W.: E-Government Application Adaptation and
Optimization Based on the Domestic Foundational Software. Zhuhai, China, s.n. (2013)
43. Kő, A., Molnár, T., Mátyus, B.: A User-centred Design Approach for Mobile-Government
Systems for the Elderly. Phnom Penh, Cambodia, Cambodia, s.n. (2018)
44. Aljarallah, S., Lock, R.: An Empirical Study of Sustainable E-Government Characteristics in
Saudi Arabia. Santiago de Compostela, Spain (2018)
45. Abu-Shanab, E., Baker, A.N.A.: Evaluating Jordan’s e-government website: a case study.
Electron. Gov. 8(4), 271–289 (2011)
46. Nkosi, M., Mekuria, F.: Mobile Government for Improved Public Service Provision in South
Africa. IEEE, Durban, South Africa (2011)
47. Kureerung, P., Ramingwong, L.: Factors Supporting User Interface Design of Mobile
Government Application, pp. 115–119. Tokyo, Japan (2019)
48. Zefferer, T., Krnjic, V.: Towards User-Friendly E-Government Solutions: Usability Evaluation
of Austrian Smartcard Integration Techniques. Vienna, Austria (2012)
49. Zefferer, T., Krnjic, V., Stranacher, K., Zwattendorfer, B.: Measuring usability to improve the
efficiency of electronic signature-based e-government solutions. In: Public Administration and
Information Technology, pp. 45–74. Springer, New York (2014)
50. Lenz, T., Alber, L.: Towards Cross-Domain eID by Using Agile Mobile Authentication. Sydney,
NSW, Australia, s.n. (2017)
42 F. H. Monzón et al.
51. Piuri, V., Scotti, F.: Biometrics Privacy: Technologies and Applications. Seville, Spain, s.n.
(2011)
52. Theuermann, K., Tauber, A., Lenz, T.: Mobile-Only Solution for Server-Based Qualified
Electronic Signatures. Shanghai, China, China, s.n. (2019)
53. Neubauer, T., Heurix, J.: A Roadmap for Personal Identity Management. IEEE, Menuires,
France (2010)
54. Alotaibi, S.J., Wald, M.: Towards a UTAUT-Based Model for Studying the Integrating Physical
and Virtual Identity Access Management Systems in E-Government Domain. London, UK
(2012)
55. Alotaibi, S.J., Wald, M.: Evaluation of the UTAUT Model for Acceptable User Experiences in
Identity Access Management Systems. London, UK, s.n. (2013)
56. Verzeletti, G.M., de Mello, E.R., Wangham, M.S.: A National Mobile Identity Management
Strategy for Electronic Government Services. New York, NY, USA, s.n. (2018)
57. Verzeletti, G.M., de Mello, E.R., Wangham, M.: A mobile identity management system to
enhance the Brazilian electronic government. IEEE Lat. Am. Trans. 16(11), 2790–2797 (2018)
58. Zefferer, T., Teufl, P.: Leveraging the Adoption of Mobile eID and e-Signature Solutions in
Europe. Spain (2015)
59. Zwattendorfer, B., Tauber, A.: Secure single sign-on authentication using eIDs across public
clouds. Int. J. Internet Technol. Secur. Trans. 5(4), 291–306 (2014)
60. Gorelik, S., Lyaper, V., Bershadskaya, L., Buccafurri, F.: Breaking the Barriers of e-
Participation: The Experience of Russian Digital Office Development. Munich, Germany
(2014)
61. Zefferer, T., Krnjic, V.: Usability Evaluation of Electronic Signature Based E-Government
Solutions. Madrid, Spain (2012)
62. Krnjic, V., Stranacher, K., Kellner, T., Fitzek, A.: Modular Architecture for Adaptable
Signature-Creation Tools Requirements, Architecture, Implementation and Usability. Koblenz,
Germany (2013)
63. Zefferer, T.: A Server-Based Signature Solution for Mobile Devices. New York, NY, USA, s.n.
(2014)
64. Raghunathan, V., Raj, V.C., Eswaran, S., Ambika, A., Sangeetha, R.U.: Optimization of dig-
italized document verification using E-Governance service delivery platform (E-SDP). Int. J.
Appl. Eng. Res. 11(4), 2535–2543 (2016)
65. Zwattendorfer, B., Tauber, A.: Secure Cross-Cloud Single Sign-On (SSO) Using eIDs. London,
UK, s.n. (2012)
66. Buzzi, M., Gennai, F., Petrucci, C., Vinciarelli, A.: E-Government Services: Italian Certified
Electronic Mail. Porto, Portugal (2014)
67. Liu, L., Piao, C., Jiang, X., Zheng, L.: Research on Governmental Data Sharing Based on Local
Differential Privacy Approach. Xi’an, China, s.n. (2018)
68. Alshamsi, A., Andras, P.: User perception of Bitcoin usability and security across novice users.
Int. J. Hum. Comput. Stud. 126, 94–110 (2019)
Simulation and Computer Vision
in Military Applications
Ackermann UGV with 2D Mapping
for Unknown Environments
Abstract UGVs have been used to replace humans in high-risk tasks such as explore
caverns, minefields or places contaminated with radiation but also, they are used to
research path planners in order to replace human intervention to drive a car. UGVs can
be controlled remotely from a safety place to avoid injuries, lethal damage and reduce
fatal accidents. However, in order to acquire information about vehicle surroundings,
it is necessary to use sensors or cameras that provide information to the remote
operator in order to make the best decision of the vehicle course. Correspondingly,
the information acquired by the sensors can be used to build an environment map,
which will be useful for future applications, or to save a register of the explored area.
The work proposed develop and build a vehicle with an Ackermann steering that can
be controlled remotely by an operator using a portable computer, with the purpose
of explore unknown environments using stereo vision cameras and build a map with
information about the surroundings.
1 Introduction
Nowadays, UGVs are used in investigations due to its utility at the time of replac-
ing the human factor to execute high-risk tasks, such as exploring unknown envi-
ronments, reconnaissance of dangerous routes or conflict area surveillance [1, 2].
© The Editor(s) (if applicable) and The Author(s), under exclusive license 45
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_4
46 W. G. Aguilar et al.
2 Our Approach
W
cot δ2 − cot δ1 = (1)
L
On the other hand, this model represents trajectory having as a reference one of
the two front wheels, for that reason an equivalent wheel is defined as shown in
Fig. 3, also it helps to simplify the mathematical model. The equivalent angle can be
defined as shown in Eq. (2) and the Ackermann angle is shown in Eq. (3).
cot δ2 + cot δ1
cot δ = (2)
2
L
δACK = (3)
R
Now we can assume that the Ackermann angle is approach to the sum of the
turning angles as shown in Eq. (4).
δ1 + δ2 ≈ δ ≈ δACK (4)
48 W. G. Aguilar et al.
The stereo camera uses stereoscopic vision that captures two images of the same
scene, but is separated by a known distance, then the saturation points are identified
in both images and finally, the points are matched [20]. The number of displacement
pixels is directly related to the depth distance as shown in Fig. 4.
The stereo camera delivers a cloud of points that describe the depth of the envi-
ronment, each point has information of its position on the cartesian axis; however,
The communication between the vehicle and the operator is established by a LAN
network as shown in Fig. 7 where the laptop sends commands using ROS topics and
nodes [20] to the processing card inside the vehicle, allowing the operator to control
vehicle direction, the velocity of displacement and angle of curvature [21].
The code that receives the commands from the operator is shown below (Algorithm
1). To control the vehicle the program reads constantly input data each 100 ms in
order to establish a real-time communication, where the operator sets the direction
parameters, however, to visualize the vehicle perspective the processing card streams
camera images that are visualized in the laptop used by the operator.
50 W. G. Aguilar et al.
This paper shows a UGV with Ackermann steering that can be controlled remotely
by a LAN network using a laptop with a simple interface (HMI) that sends control
messages using ROS nodes and topics to control actuators inside the vehicle in order
to acquire information of the environment, process that information and building a
2D map, where the amount of sensors has been reduced to the minimum required to
perceive the surroundings. Results show that the vehicle control is acceptable due to
commands time response that also improves operator experience while the mapping
is running, also the real-time transmission of camera information allows the operator
to guide the vehicle through the best path. In addition, the built map shows the empty
spaces and obstacles in the vehicle’s trajectory that can be used to develop a path
planner for Ackermann vehicles, considering its kinematics restrictions.
Acknowledgements This work is part of the project perception and localization system for
autonomous navigation of rotor micro aerial vehicles in GPS-denied environments, VisualNav-
Drone, 2016-PIC-024, from the Universidad de las Fuerzas Armadas ESPE, directed by Dr. Wilbert
G. Aguilar.
52 W. G. Aguilar et al.
References
1. Bellutta, P., Manduchi, R., Matthies, L., Owens, K., Rankin, A.: Terrain Perception for DEMO
III. Retrieved from https://ieeexplore.ieee.org/abstract/document/898363 (2000)
2. Aguilar, W.G., Morales, S.G.: 3D environment mapping using the Kinect V2 and path planning
based on RRT algorithms. Electronics 5(4), 70 (2016)
3. Eynard, D., Vasseur, P., Demonceaux, C., Frémont, V.: UAV Altitude Estimation by Mixed
Stereoscopic Vision. Retrieved from https://ieeexplore.ieee.org/abstract/document/5652254
(2010)
4. Aguilar, W.G., Angulo, C.: Real-time model-based video stabilization for microaerial vehicles.
Neural Process. Lett. 43(2), 459–477 (2016)
5. Fong, T., Thorpe, C.: Vehicle Teleoperation Interfaces. Retrieved from https://link.springer.
com/article/10.1023/A:1011295826834 (2001)
6. Aguilar, W.G., Cobeña, B., Rodriguez, G., Salcedo, V.S., Collaguazo, B.: SVM and RGB-D
sensor based gesture recognition for UAV control. In: International Conference on Augmented
Reality, Virtual Reality and Computer Graphics, pp. 713–719 (2018)
7. Krückel, K., Nolden, F., Ferrein, A., Scholl, I.: Intuitive Visual Teleoperation for UGVs Using
Free-Look Augmented Reality Displays. Retrieved from https://ieeexplore.ieee.org/abstract/
document/7139809 (2015)
8. Aguilar, W.G., Luna, M.A., Ruiz, H., Moya, J.F., Luna, M.P., Abad, V., Parra, H.: Statistical
abnormal crowd behavior detection and simulation for real-time applications. In: International
Conference on Intelligent Robotics and Applications, pp. 671–682 (2017)
9. Lee, J.P.: Future Unmanned System Design for Reliable Military Operations. Retrieved from
http://article.nadiapub.com/IJCA/vol5_no3/13.pdf (2012)
10. Orbea, D., Moposita, J., Aguilar, W.G., Paredes, M., León, G., Jara-Olmedo, A.: Math model
of UAV multi rotor prototype with fixed wing aerodynamic structure for a flight simulator.
In: International Conference on Augmented Reality, Virtual Reality and Computer Graphics,
pp. 199–211 (2017)
11. Matthies, L., Rankin, A.: Negative Obstacle Detection by Thermal Signature. Retrieved from
https://ieeexplore.ieee.org/abstract/document/1250744 (2003)
12. Aguilar, W.G., Casaliglla, V.P., Polit, J.L.: Obstacle avoidance based-visual navigation for
micro aerial vehicles. Electronics 6(1), 10 (2017)
13. Mitchelle, W., Staniforth, A., Scott, I.: Analysis of Ackermann Steering Geometry. Retrieved
from https://www.sae.org/publications/technical-papers/content/2006-01-3638/ (2006)
14. Aguilar, W.G., Salcedo, V.S., Sandoval, D.S., Cobeña, B.: Developing of a video-based
model for UAV autonomous navigation. In: Latin American Workshop on Computational
Neuroscience, pp. 94–105 (2017)
15. Peynot, T., Underwood, J., Scheding, S.: Towards Reliable Perception for Unmanned
Ground Vehicles in Challenging Conditions. Retrieved from https://ieeexplore.ieee.org/
abstract/document/5354484 (2009)
16. Aguilar, W.G., Manosalvas, J.F., Guillén, J.A., Collaguazo, B.: Robust motion estimation based
on multiple monocular camera for indoor autonomous navigation of micro aerial vehicle.
In: International Conference on Augmented Reality, Virtual Reality and Computer Graphics,
pp. 547–561 (2018)
17. Phan, C., Lui, H.: A Cooperative UAV/UGV Platform for Wildfire Detection and Fighting.
Retrieved from https://ieeexplore.ieee.org/abstract/document/4675411 (2008)
18. Sathiyanarayanan, M., Azharuddin, S., Kumar, S.: Four Different Modes to Control Unmanned
Ground Vehicle for Military Purpose. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/
summary?doi=10.1.1.670.9990 (2014)
19. Sokolov, M., Afanasyev, I., Lavrenov, R., Sagitov, A., Sabirova, L., Magid, E.: Mod-
elling a Crawler-Type UGV for Urban Search and Rescue in Gazebo Environment.
Retrieved from https://www.researchgate.net/profile/Ilya_Afanasyev/publication/313344082_
Modelling_a_crawler-type_UGV_for_urban_search_and_rescue_in_Gazebo_environment/
Ackermann UGV with 2D Mapping for Unknown Environments 53
links/5c546cf6a6fdccd6b5da5331/Modelling-a-crawler-type-UGV-for-urban-search-and-
rescue-in-Gazebo-e (2017)
20. Yang, C., Jun-Jian, P., Jing, S., Lin-Lin, Z., Yan-Dong, T.: V-disparity Based UGV Obsta-
cle Detection in Rough Outdoor Terrain. Retrieved from http://www.aas.net.cn/fileZDHXB/
journal/article/zdhxb/2010/5/PDF/100506.pdf (2010)
21. Zhao, Y., Li, J., Li, L., Zhang, M., Guo, L.: Environmental Perception and Sensor Data Fusion
for Unmanned Ground Vehicle. Retrieved from https://new.hindawi.com/journals/mpe/2013/
903951/ (2013)
Visual-Based Real-Time Detection Using
Neural Networks and Micro-UAVs
for Military Operations
1 Introduction
UAVs can recognize land or sea areas, conduct surveillance on military units, support
troops through recognition, contributing to the security of strategic areas. The armies
of countries with potential in military technology, everyday demand greater needs
in operations for which they use unmanned aerial systems as effective support for
their troops [1], causing an evolutionary change within the spatial air ordering where
observation and attack practices take greater control of airspace [2]. The use of UAVs
is linked to public safety, becoming an observation strategy for decision-making
within the military field [3]. The Ecuadorian Armed Forces have UAVs, whose code
is partially open [4, 5], which invites research to improve their capabilities based on
the development of applications that allow access to their configuration and operation.
Detection missions must be executed in real-time, and are subject to the adequate
performance of UAV sensors and resources, mainly in the acquisition of images [4].
For the development of a UAV objective detection system, it is essential to establish
a real-time communication system that allows total control from a ground station [6,
7]. At present, there is the possibility of creating applications through an SDK (Soft-
ware Development Kit acronym), where the conditions for accessing UAV resources
from the ground station are programmed. In the case of Parrot Bebop UAVs, the
official SDK is the ARDroneSDK3.
Vision-based objective detection must be established in real-time by means of
algorithms integrated into intelligent autonomous systems [8, 9]. The YOLO algo-
rithm (your only look once) is used, which uses deep learning and convolutional
neural networks to classify images in real-time [4]. The detection algorithm must
be implemented at the ground station, then communicate remotely with the UAV to
execute the actions [10].
The use of UAVs (acronym in English of unmanned aerial vehicles) in military
operations presupposes an advantage in operating within the Theater of Operations.
The most powerful Armed Forces in the world are coupling UAV systems within their
employment doctrine, in this context research is carried out where the use of these
devices is determined in an integral way [11]. Being a technology in global expan-
sion, the research developments in military applications are oriented to autonomous
systems with sufficient capacities to fulfill all kinds of missions [12]. UAV systems
have in recent years been an axis within the technological changes applied to security
and defense [13].
In the Ecuadorian Armed Forces, the use of UAV systems occurs in security
and surveillance operations at a tactical level [14]. All the actions carried out by
UAVs are carried out by teleoperation, therefore, there are no autonomous systems
implementations to fulfill specific missions within an operation. Research is currently
underway for autonomous systems within the CICTE Military Applications Research
Center, with excellent results, however, employment in military operations is still in
process.
The success of the missions entrusted to UAVs depends on the ability to perform
functions in support of operations that pose a danger to people, UAVs act in their
replacement with increasingly automated systems that are increasingly sophisticated.
UAVs in the theater of operations are used with constant evolution, mainly in the
operations of intelligence, surveillance, recognition, at the strategic operational, and
tactical levels [11–14].
The contribution to military action with the use of UAVs in the theater of operations
will increase when a fully automated system with route planning and specific missions
assigned from a ground station is available, thus leaving the operator’s dependence
on UAV control. In this way, greater precision is achieved in the mission to be
accomplished, in addition it can be monitored in real-time. Currently, the use of UAVs
in the Ecuadorian Armed Forces is subject to operations that help improve the state’s
Visual-Based Real-Time Detection Using Neural Networks … 57
capacity to respond to threats and internal and external risks, but through manual
teleoperation. This project presents an innovative and zero-cost proposal, aimed at
achieving complete automation of UAVs, optimizing the detection capabilities with
which these vehicles are equipped, thus allowing the fulfillment of specific missions.
Developing a vision-based detection system for MICRO-UAVs allows to fulfill
missions in support of military reconnaissance operations. In the first instance, the
research project proposes to establish the communication of the Micro-UAV with a
ground station, replacing the manual control by a computer, in which access to the
UAV resources is available. For this purpose, bebop_autonomy will be used, which
is a ROS (an acronym for Robotic Operating System) controller for the Parrot Bebop
drone, based on the software development kid ARDroneSDK3.
During navigation towards the objective and upon reaching the exact coordinates,
the detention continues using the YOLO vision-based algorithm that uses convolu-
tional neural networks [4, 8], allowing the processing of the information provided
by the on-board camera in real-time.
Computer vision is the method used for target detection, in this sense a computer can
detect an image based on the variation of colors, the camera becomes a sensor that
provides images with a set of values to which denominate pixels and represent as a
whole the dimension of photography. The representation of an image in grayscale
can be observed in Fig. 1, each pixel has a value in numbers that varies proportionally
according to the intensity of the color; the identification of the numerical value is
done by means of a software programmed for the detection of an image in pixels
[15–18].
The characteristics of the image with its representation in pixels are the first
function to start with computer vision. This function is called features here different
Fig. 1 ConvNet organizes its neurons in three dimensions (width, height, depth), as visualized in
one of the layers. Each layer of a ConvNet transforms the 3D input volume into a 3D output volume
of neuronal activations
58 M. Calderón et al.
w-h represent the size and position of the bounding boxes vectors of the object to be
identified are indicated
[20]. If the cell is displaced from the upper left corner of the
image by C x , C y and the previous bounding box has width and height pw and ph ,
this prediction is determinate for these equations [20]:
bx = σ (tx ) + C x (1)
by = σ ty + C y (2)
bw = pw etw (3)
bh = ph eth (4)
YOLOv3 predicts an objectivity score for each bounding box using logistic regres-
sion. It should be 1 if the previous bounding box overlaps an object of fundamental
truth more than any previous bounding box, we will show a diagram where the
prediction method is observed using bounding boxes [20] (Fig. 2).
The metrics evaluated in the detection of the objects are oriented towards the ability
of the system to identify people and vehicles, obtaining sensitivity and specificity.
Sensitivity considers two variables, True Positive people or vehicles detected by the
system and false-negative people or vehicles not detected by the system, then:
60 M. Calderón et al.
VP
Sensibility = (5)
VP + FN
The algorithm has been programmed to detect vehicles throughout the trajectory
from takeoff to mission return. Initially, the tests focus on takeoff until reaching
30 m high, during this trajectory the camera remains at 45° and the detection system
is active. Under the same conditions of height and angle of the camera, detection is
performed during GPS-based navigation. Finally, upon reaching the coordinate from
which the target should be detected, the third test is performed by taking 10 images
processed with the detection system.
Visual-Based Real-Time Detection Using Neural Networks … 61
There is an image at 10 m high, with a camera angle of 45°, in the building of the
ESPE research center, in Fig. 3 vehicles are detected, a vehicle not detected by the
system is observed.
In the tests carried out during the execution of the takeoff, the data of True Positive
of the image are 7, False Negative 1, True Negative 0, and False Positive 0, with this
the percentage of sensitivity and specificity of the system is obtained (Table 1).
Sensitivity reaches 91% and specificity 70%. It is concluded that the system works
correctly in the detection of vehicles at a low height.
For the detection of the final objective the UAV remains at 30 m high in a stationary
position after the GPS navigation is completed, it takes 10 frames with a camera
angle of 45°.
62 M. Calderón et al.
In Fig. 5, 17 vehicles are detected as True Positive and 10 false negatives, the
detection of 3 False Positive and 1 True Negative is observed (Table 3).
In the objective detection tests, the sensitivity reaches 71% and the specificity
71%. It is concluded that the system works correctly in the detection of vehicles,
the sensitivity decreases with respect to takeoff by 20%, however, with respect to
the detection during navigation it rises by 14%. The specificity regarding takeoff is
maintained, but it improves 15% with respect to the result during GPS navigation.
References
1. Orbea, D., Moposita, J., Aguilar, W.G., Paredes, M., León, G., Jara-Olmedo, A.: Math model
of UAV multi rotor prototype with fixed wing aerodynamic structure for a flight simulator.
In: International Conference on Augmented Reality, Virtual Reality and Computer Graphics,
pp. 199–211 (2017)
2. Kleinschmidt, J.: Drones y el orden legal internacional. Tecnología, estrategia y largas cadenas
de acción (2015)
3. Oviedo, J.: Uso de los drones en la seguridad privada (2016)
4. Aguilar, W.G., Angulo, C.: Real-time model-based video stabilization for microaerial vehicles.
Neural Process. Lett. 43(2), 459–477 (2016)
64 M. Calderón et al.
5. Aguilar, W.G., Salcedo, V.S., Sandoval, D.S., Cobeña, B.: Developing of a video-based
model for UAV autonomous navigation. In: Latin American Workshop on Computational
Neuroscience, pp. 94–105 (2017)
6. Aguilar, W.G., Cobeña, B., Rodriguez, G., Salcedo, V.S., Collaguazo, B.: SVM and RGB-D
sensor based gesture recognition for UAV control. In: International Conference on Augmented
Reality, Virtual Reality and Computer Graphics, pp. 713–719 (2018)
7. Ritchie, M., Fioranelli, F., Borrion, H., Griffiths, H.: Classification of loaded/unloaded micro-
drones using multistatic radar. Electron. Lett. [Internet] 51(22), 1813–1815. Available from
https://digital-library.theiet.org/content/journals/10.1049/el.2015.3038 (2015). Cited 2020 Jan
2
8. Aguilar, W.G., Casaliglla, V.P., Polit, J.L.: Obstacle avoidance based-visual navigation for
micro aerial vehicles. Electronics 6(1), 10 (2017)
9. Vetrella, A.: On GF-2016 I 2nd IF, 2016 undefined. Cooperative UAV navigation under nominal
GPS coverage and in GPS-challenging environments. ieeexplore.ieee.org [Internet]. Available
from https://ieeexplore.ieee.org/abstract/document/7740606/. Cited 2020 Jan 5
10. Aguilar, W.G., Morales, S.G.: 3D environment mapping using the Kinect V2 and path planning
based on RRT algorithms. Electronics 5(4), 70 (2016)
11. Campanelli, H.: La utilización conjunta de los Sistemas Aéreos no Tripulados en el Teatro
de Operaciones [Internet]. Available from http://190.12.101.91:80/jspui/handle/1847939/138
(2014). Cited 2019 Dec 21
12. Ortuño, N., María, J., Cuquerella, J.L.: Desarrollo de un sistema de control para UAV con
capacidad ATOL entre lanchas de instrucción de la Escuela Naval Militar. Available from
http://calderon.cud.uvigo.es/handle/123456789/124 (2016). Cited 2019 Dec 21
13. Riola, J.M., Rodríguez, M.: Tecnologías del Siglo XXI TECHNOLOGIES OF THE XXI
CENTURY, vol. 4 (2018)
14. Baquero Montoya, P., Briones, R.V.: EMPLEO DE LOS UAV, EN OPERACIONES DE
SEGURIDAD Y VIGILANCIA EN LAS ÁREAS ESTRATÉGICAS EN EL ECUADOR,
vol. IV [Internet]. Available from www.altiuas.com (2019). Cited 2019 Dec 22
15. Aguilar, W.G., Luna, M.A., Ruiz, H., Moya, J.F., Luna, M.P., Abad, V., Parra, H.: Statistical
abnormal crowd behavior detection and simulation for real-time applications. In: International
Conference on Intelligent Robotics and Applications, pp. 671–682 (2017)
16. Aguilar, W.G., Manosalvas, J.F., Guillén, J.A., Collaguazo, B.: Robust motion estimation based
on multiple monocular camera for indoor autonomous navigation of micro aerial vehicle.
In: International Conference on Augmented Reality, Virtual Reality and Computer Graphics,
pp. 547–561 (2018)
17. Planells, P., Blasco, F.: DESARROLLO DEL MODELO DINÁMICO DE UN CUA-
TRIRROTOR Y DISEÑO DE LOS SISTEMAS DE CONTROL DE ESTABILIZACIÓN
Y SEGUIMIENTO AUTÓNOMO DE TRAYECTORIAS [Internet]. Universidad Politéc-
nica de Valencia. Available from https://riunet.upv.es/bitstream/handle/10251/52791/TFG_
14340178461876400573981960261481.pdf?sequence=2 (2015). Cited 2020 Jan 10
18. Aguilar, W.G., Angulo, C.: Real-time video stabilization without phantom movements for
micro aerial vehicles. EURASIP J. Image Video Process. 2014(1), 46 (2014)
19. Pusiol, P.D.: Redes Convolucionales en Comprension de Escenas [Internet]. Available from
http://creativecommons.org/licenses/by-sa/2.5/ar/ (2014). Cited 2020 Jan 12
20. Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You Only Look Once: Unified, Real-Time
Object Detection [Internet]. Available from http://pjreddie.com/yolo/ (2016). Cited 2020 Jan
13
Visual and Inertial Data-Based Virtual
Localization for Urban Combat
© The Editor(s) (if applicable) and The Author(s), under exclusive license 65
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_6
66 W. G. Aguilar et al.
1 Introduction
The present research project focuses on the estimation of egomotion in internal envi-
ronments [1], GPS denied [2], for locating military personnel during urban combat
operations using monocular images and inertial information. The system will be
developed in the programming environment Unity 3D and executed on the operating
system for mobile phones, android. The acquisition of images will be done with a
monocular camera [3], incorporated in the mobile device (smartphone). Addition-
ally, inertial data provided by the IMU of the device will be used in order to improve
the accuracy in locating the military personnel.
The location of the military elements will be visualized in a virtual environment,
which will be a digital version of a controlled environment. This will be executed in
a computer designed to monitor military personnel.
The criminal acts are not carried out only in the jungle area as it has been in the last
decade; now they have moved to an urbanized zone with terrorist acts. These events
have motivated the participation of military personnel in operations to support the
National Police to safeguard citizen security, and it is in this field where urban combat
operations become important. These combat operations are aimed at neutralizing
hostile enemies, rescuing hostages, deactivating bombs, but above all, guaranteeing
peace and tranquility of citizens. They are carried out in internal environments that
hinder the monitoring of military personnel by the different commands and control
levels. The construction of an egomotion estimation system for military units that
allows monitoring military units during combat operations is proposed.
This project seeks to be useful for military personnel in operations in urban envi-
ronments, in which knowing the exact location is essential, since taking into account
recent events in our country, and the invasion of radical subversive groups, opera-
tions of rescue or surveillance can be carried out with a geolocation backup where
the trajectories of the military units and troops could be monitored, to monitor their
progress or eventual extraction of them.
2 Related Works
Urban combat operations are actions carried out by military forces in an environment
different from conventional scenarios (mountain, jungle, air, sea), which are carried
out in environments with the presence of goods, vehicles, people. These environments
are called “urban.” The elements of the urban distribution must be part of the defense
scheme of the zone so that the attacker can be neutralized and the effectiveness of the
weapons improved. However, in these operations, military actions are affected by the
morphology of urban buildings complicating the mobility of military personnel [4].
The location of military personnel is an important factor, within these operations,
that can be affected by the characteristics of the environment.
Visual and Inertial Data-Based Virtual Localization … 67
The latter is due to the fact that the most common positioning systems based on
satellites (GPS or Galileo) [5, 6] or on mobile telephony networks [7] are suitable for
outdoor environments where there is direct vision of satellites or of the base stations.
However, when these systems are used inside buildings, they present many problems
with the attenuation of the received signals and the multipath caused by the rebounds
of the signal.
In recent years, several alternatives have been developed for locating targets in
internal environments or denied GPS. One of them is the estimation of the egomo-
tion based on images obtained by the capture device from a first-person perspective,
which allows the calculation of the pose (position and rotation) of the capture device.
This estimation method can be done with the use of monocular cameras, stereo cam-
eras, RGBD cameras or 3D LIDAR sensors [8]. In the UK, an egomotion estimation
system was developed by using a monocular camera installed in a vehicle. In that
system, through methods such as feature matching and feature tracking, the speed
of the mobile was estimated. Although the instantaneous velocity values were noisy
and imprecise, the average velocity values were close to the real values demonstrat-
ing the system’s potential for estimating egomotion [9]. Another system on motion
estimation of a mobile vehicle was developed in 2006. It uses a monocular cam-
era, and through the method known as optical flow, it is possible to estimate the
movement of the vehicle [10]. A favorable point for the development of systems and
applications based on computer vision is the technological advance that smartphones
have had with high processing capabilities in conjunction with multiple sensors. An
example of this is the game called Mozzies [11] developed by Siemens being the
first application to use the video camera as a sensor to create an augmented reality
environment.
Parallel to the development of smartphones as processing devices, software devel-
opment has also taken important steps. Since 2000, the free license computer vision
library has been developed. Its main advantage lies in that being multiplatform allows
the development of applications in different programming softwares such as Phyton,
C++, MATLAB, Unity 3D, among others [12]. Taking this background into account,
this research project proposes the development of an application for mobile devices
based on computer vision algorithms in order to perform the estimation of egomotion
for military purposes during urban combat operations.
3 Our Approach
The system comprises two stages. The first stage is called visual-inertial system and
runs on a smartphone. It is responsible for capturing the images of the environment
and calculating the movement parameters. The second stage is the monitoring system.
This is executed on a computer. It allows the visualization of the path, estimated in
the first stage, on a building plan. It also allows to observe a simulation of movement
in a virtual environment.
68 W. G. Aguilar et al.
The feature points detection is based on the extraction of points from the initial image,
and then, the search of said points is made in the images subsequently captured. This
method is used for small movements [13–15]. In the detection of points what is
sought is that they are easily distinguishable and comparable There are two types of
detectors, corner detectors and texture detectors.
Shi-Tomasi [16] developed a method that allows to verify the quality of the feature
points between two consecutive images; for this, they use a measure of dissimilarity.
If the dissimilarity between a pair of points grows a lot, the point is discarded.
The OpenCV library integrates the goodFeaturesToTrack() function based on
the principle of dissimilarity developed by Shi-Tomasi for the selection of features.
The detection algorithm implemented in the function is a modification of the Harris
corner detector. It uses an altered version of the Harris detector scoring function that
determines whether or not the tracking window contains a corner [17, 18].
R = min(λ1 , λ2 ) (1)
where λ1 , λ2 are the eigenvalues of the matrix formed by the function of weights
and the derivatives of the image in the directions of x and y. The values for which a
Visual and Inertial Data-Based Virtual Localization … 69
characteristic is considered a corner are given when λ1 λ2 > λmin _min where λmin
is the characteristic quality threshold between [0, 1].
Algorithm 1 shows the implementation process of the Shi-Tomasi points of interest
detector.
Algorithm 1: Shi-Tomasi
1: Parameters of the descriptor
2: Image captured and converted to gray scale
3: Feature points detection and description
4: Feature points stored in a matrix of points (corners)
5: The detected points plotted to observe the functioning of the function: Imgproc.circle (mask,
P, 7, green); mask is the mask on which the point P is plotted, 7 is the radius of the point, and
green is the color in RGB code (0,255.0)
6: The process is repeated from Step 2.
After detecting the characteristic points, the next step is the calculation of the optical
flow between two consecutive images in order to find the point correspondences
and then be able to estimate the transformation matrix that allows determining the
movement of the person.
The technique consists of calculating the vector field where each vector is a
displacement vector that shows the movement of the characteristic points between
two consecutive frames. These displacement fields are calculated locally in the
environment of a characteristic point.
Figure 2 shows the relationship that exists in the displacement vector of an object
in the real world and the optical flow vector in the image plane. That is why, the field
of optical flow is defined as a projection of the movement of an object in space.
Equation 2 mathematically defines the optical flow method that relates the partials
of the image and velocity with respect to the x-axis and y-axis.
∂I ∂I ∂I
vx + vy + vt = 0 (2)
∂x ∂y ∂t
where vx = ∂∂tx and v y = ∂∂ty are the components of the velocity (optical flow) and
Ix = ∂∂ xI , I y = ∂∂ yI , It = ∂∂tI are the partial derivatives of the intensity of the pixels of
the image in the region surrounding a characteristic point. Restructuring
Ix , I y · Vx , Vy = −It
∇ I · v̌ = −It (3)
3.1.3 RANSAC
Algorithm 2: RANSAC
1: Select the minimum number of points, useful for generating the parameter model.
2: Resolution of the parameters in the model.
3: Defines the number of points in the set that fit according to the defined tolerance.
4: If the number of points that fit over the total number of points in the set exceeds the threshold,
recalculate the parameters of the model with the points that fit.
5: Otherwise, repeat Steps 1 to 4, N times.
The estimation of visual movement consists of calculating the essential matrix (E)
between two images captured in two consecutive instants of time that we will call
k and k − 1. The essential matrix describes the correspondence between the points
Visual and Inertial Data-Based Virtual Localization … 71
of an image at time k − 1 and the consecutive frame k. E contains the spin data
contained in the sub-matrix R and the translation data contained in the matrix t as
shown in Eq. 4.
E = tR (4)
This test was performed at 4 pm with an average illumination level of 70.57 lx. The
path introduces two rotations and a considerable distance in order to pro-bar the
accuracy of the system.
FAST Detector: The low illumination affects this method in a remarkable way; as
seen in Fig. 3, the estimated path is far from the real path. A percentage error of
35.6% was obtained. Figure 3 shows the estimated path on the smartphone screen.
Harris Detector: Despite the low illumination, Fig. 4 shows only a slight difference
between the two trajectories. A percentage error of 9.7% was obtained. Figure 4
shows the estimated path on the smartphone screen.
Shi-Thomas Detector: As in the previous tests, the path estimated by this method
turns out to be the most efficient. A percentage error of 1.3% was obtained. Figure 5
shows that there is hardly a slight difference between the two trajectories.
Relative and percentage error: Table 1 shows the results obtained in the third test.
72 W. G. Aguilar et al.
On this occasion, the FAST detector is presented as the most deficient with 35.6%.
In the same way, as in the previous test, SHI-TOMASI is the most efficient with a
percentage error of 1.3%.
The results show that corner detectors are more efficient when it comes to real-time
applications, because they require less computational resources and their execu-
tion time is less. Speaking on time, Harris and Shi-Tomasi detectors allow accurate
estimated trajectories to be obtained even when the ambient lighting levels are low.
In the experiments carried out, four characteristic point detectors were tested;
among them, the well-known SIFT detector within the field of visual odometry
was tested for its robustness and precision, however not much used in real-time
applications because it requires high levels of processing. With SIFT, percentage
errors of 65% were obtained with differences of up to 15 m with respect to the
actual distance traveled. When the levels of illumination fall considerably, in the
experiments, a variation of 557 lx was registered at 70 lx; the FAST algorithm showed
deficiencies in the estimation of the path with a difference of 10 m with respect to
the real one. However, the Harris and Shi-Tomasi detectors showed differences of
3 m for the Harris case and barely 30 cm for the Shi-Tomasi detector. In this way,
it is concluded that the ideal detector for the implemented system is the Shi-Tomasi
corner detector due to its precision and also allows to have an optimized algorithm
for an embedded system such as a smartphone. The algorithms of visual odometry
allow to estimate the translation and rotation of the camera attached to a mobile
agent.
References
1. Aguilar, W.G., Luna, M.A., Ruiz, H., Moya, J.F., Luna, M.P., Abadm V., Parra, H.: Statistical
abnormal crowd behavior detection and simulation for real-time applications. In: International
Conference on Intelligent Robotics and Applications, pp. 671–682 (2017)
2. Hofmann-Wellenhof, B., Lichtenegger, H., Collins, J.: Global Positioning System : Theory and
Practice. Springer, Berlin (2001)
74 W. G. Aguilar et al.
1 Introduction
The reason for the development of a sample collection system integrated to the
robotic outdoor platform is written. The problem is analyzed giving importance to the
© The Editor(s) (if applicable) and The Author(s), under exclusive license 75
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_7
76 O. Caiza et al.
respective resolution. For this, the study of the conditions of the existing platform is
planned and proceeded to condition it according to the dimensions of the manipulator
robot, define the objectives to be met and determine the scope of the project.
The Quality Matrix is developed for collecting information about the needs and
requirements of the system operator. According to the procedure described on [1],
the characteristics of the system to be developed are shown in Table 1.
Subsystems capable of fulfilling one or more defined technical characteristics are
specified in Table 2.
Fig. 1 Manipulator robot’s base (a). Selected profile for the robot’s base characteristics (b) [3]
According to [4], the first iteration diameter, employing a safety factor or 2.5 and
ED-Goodman criterion, is:
Considering the new diameter size of 20 mm and the recalculation of Marin size
factor, the safety factor obtained using ED-Goodman criterion is:
n = 515.54 (6)
Slot 1 Pincer
On Fig. 4 are drawn the maximum forces (F) and the position components (dx,
dy) of the CG with respect to the joint. A standard safety factor of 1.5 was used.
The minimum weight for avoiding rollover must be 3 kg, and the weight of the
real structure is 4 kg; so, it is enough for not rollover.
A sub-actuated mechanism is selected; it can handle high load objects. Its open-
ing–closing gripper’s time is about 15 s. It is economic and has less than 20
pieces.
In Table 6, the elements that conform the final effector are shown.
The final effector once assembled will look like the one shown in Fig. 5. PLA is
used for the most complex parts and acrylic for the simpler slots.
The general methodology for robots of n degrees of freedom described in [5] was
employed. It gives the anthropomorphic robot parameters shown in Table 7.
The following simulation was performed (Figs. 6 and 7).
The dynamic behavior of the robot increases the torque’s value when it reaches a
specific position. For the shoulder joint, shown in Fig. 7 (medium), maximum torque
is needed when the angle oscillates on high values respect to the vertical. For the
robot’s elbow, it does not require high torque, but, for low angles, with respect to the
vertical, the torque tends to maximize, Fig. 7 (Right).
Considering the kinematic effects over the grip force required by the pincer
described in [6] and following the formulae to find the torque when employing
square screws described in [7, 8], the following parameters are obtained employing
a safety factor of 1.5, Table 8.
According to the parameters required, the following actuators were selected
(Table 9).
The requirements for the microcontroller are shown on Table 10.
The most suitable development platforms are: Arduino, Raspberry and ODROID
because of their low cost, free software requirement and availability on the market.
Data transmission media requirements are shown in Table 11.
The chosen microcontroller was Arduino because it satisfies the requirements,
Table 10, and it possesses analogic capacity which Raspberry and ODROID do not.
Serial communication was chosen because it makes possible and effective to control
the robot [9].
The sensor to be employed is Kinect; it allows to create a closed-loop system by
using the object position visualization which permits to do the system main function,
object recollection. It is necessary to solve the object’s position in space using the
cameras and sensors available on the Kinect dispositive [10].
The main purpose of the algorithm is the identification of objects by colors. The
recognized colors are green and yellow; the operations that are done to convert RGB
to HSV are described in [11, 12], and the result of the algorithm for the artificial
vision control system is shown in Fig. 8.
For obtaining the angles of the joints and positioning the actuator, Denavit–Harten-
berg method and Inverse Cinematic are used. The fixed arguments of the manipulator
robot are shown in Table 12.
Articulation angles were obtained using the algorithm shown in Fig. 9 [13–16].
Python with the numpy and rospy libraries is used for programming on ROS envi-
ronment. D-H algorithm function is repeated the number of times necessary, so the
robot can reach the objective position.
Fig. 7 Theta 1 response of the model at T 1 = 28 N m (left). Theta 2 response of the model at T 2
= 16 N m (medium). Theta 3 response of the model at T 3 = 12 N m (right)
4 Conclusions
it can recollect samples even in a working area below the reference level of its base.
The artificial vision algorithm facilitates recognition of space position using specific
colors perception, such as yellow and green; the parameters for the proper positioning
of the manipulator robot also depend on environment light conditions. Positioning
algorithm provides the embedded system the ability to locate effector’s end in the
position obtained from the artificial vision system. Tests results are: repetitiveness
of 80%, positioning error 2%, and maximum load capacity is 0.5 kg meeting the
requirement raised by the user.
Kinect and Manipulator-Based Sample Collection … 85
References
© The Editor(s) (if applicable) and The Author(s), under exclusive license 89
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_8
90 D. Merizalde et al.
1 Introduction
This document emphasizes the autonomy of the UAV in external environments; since
for interiors, it requires more precision, adjustments and programming methods for
its best performance [11, 12]. For this, UAV requires very high precision and very
fast location to flight in any environment to complete any mission, through a flight
methodology that follows certain guidelines and steps ordered for proper execution
[1, 5, 11]. For the mission, in this case, it is necessary to have a GPS module with
which you can have a setpoint to follow a path in the space where you need to fly.
As for the landing, it can be seen that there are different methodologies to process
and execute this action, and the most option is the artificial vision that collects
data through its onboard camera and allows obtaining necessary information for the
process of executing an order. Successfully executing the orders and actions of the
UAV will depend on the type of programming and the control action that the user
can use, having enough freedom to occupy the tools that have been developed over
time.
Computer vision is the method used for target detection; in this sense, a computer
can detect an image based on the variation of colors, and the camera becomes a sensor
that provides images with a set of values which denominate pixels and represent as
a whole the dimension of photography. The representation of an image in grayscale
can be seen in the following figure; each pixel has a value in numbers that varies
proportionally according to the intensity of the color, and the identification of the
numerical value is done by means of a software programmed for the detection of an
image in pixels [13, 14].
The flight methodology for the fulfillment of the mission is established in four
important phases which we will mention: Link and Communication, Takeoff and
Navigation, Homework and Return Landing.
The first is related to the pairing of the unit with the PC which, through the use of
its connection resources, allows the connection and communication between devices
that, through software and firmware, allow the understanding between the hardware
to fulfill the tasks designated by the operator.
92 D. Merizalde et al.
To have a clearer idea of the system, in Fig. 1, we proceed to show the ground air
link with the UAV [15–18].
The second phase is the most important since it will largely allow the development
of the mission since reaching the objective corresponds to 50% of it; for this, the
UAV will use GPS as a spatial orientation since it allows access to the data of global
positioning that can be managed from the computer. The controller is a very important
part of this phase; since for track monitoring, it is necessary to maintain a global line
that will act as a setpoint for the controller whatever it is to follow the path drawn
by the operator since certain disturbances such as wind, the movement of the earth,
among others would change the positioning data if this did not have an optimal
controller.
The fulfillment of the task is essential because it constitutes in itself the reason
for automating the UAV, since it specifies what the UAV is going to do and why
it should reach the marked point; for this, it must be programmed in an adequate
manner respecting the rules of use for professional purposes or service for humanity.
As for the last phase, it constitutes the final part of the entire mission, since it is an
uncomplicated task, but of great weight in the requirement, since it is very important
that the unit returns in optimal conditions and with the information that it contains
to be extracted and used in future operations; the fundamental part of the landing is
that the UAV recognizes its site, and usually, it must be the same from where it took
off, so that by means of object detection, it can land safely in any established field.
Once these four important phases have been mentioned, it can be defined as a
complete autonomous navigation system, capable of fulfilling any type of mission
entrusted and being able to receive several missions one after another, always taking
Autonomous Navigation Based on Proportional Controller … 93
into account certain limitations in UAVs such as they can be the energy factor of
the batteries or the required fuel. Making a comparison between the two modes of
UAV management, autonomous flight would be more convenient since it has greater
precision and greater orientation in the field to be used, since in a flight controlled
by an operator on the ground, he cannot know its exact position in the airspace since
it would be difficult for you to orient your UAV from a ground base with a manual
control, instead with a computer-controlled flight it is possible to obtain real-time data
and thus send it to the machine in real time so control your flight direction, orientation
and positioning in space, thus achieving an almost immediate response when having
deviations due to accusations of the natural disturbances of the environment, thus
obtaining a safe navigation.
Each movement is controlled according to the rotation of the propellers, their
direction and speed, which is given by supplying current to the motors that support
the propellers, thus giving rise and fall vertical movements, as well as pitching that
allows to move laterally left and right and wink function to establish the frontal and
backward movements of linear form. The combination of these motors will allow
the propellers to work alternately, allowing turning movements on their own axis,
clockwise and counterclockwise.
The angular variables are: φ which means roll represents the swing angle, and
this rotates around the x-axis, allowing the lateral, left and right displacements of
the quadcopter; the symbol θ which means pitch is representing the pitch angle
that revolves around the y-axis, and this angle will allow the front and backward
movement of the quadcopter, and finally, the symbol ψ which means yaw represents
the angle of rotation and revolves around the z-axis whose angle determines the 360°
direction of the quadcopter. With all this information, the motion matrices of the
Bebop 2 can already be obtained based on its dynamic reference frame with respect
to its inertial reference frame; by matching the reference frames, we can determine
the matrices with this equation.
Replacing all the matrices, finally, a general matrix is obtained that will represent
the movement through space.
⎡ ⎤
cos y cos θ cos y sin θ sin φ − sin y cos φ cos y sin θ cos φ + sin y sin φ
R CO = ⎣ sin y cos θ sin y sin θ sin φ − cos y cos φ sin y sin θ cos φ + cos y sin φ ⎦
− sin θ cos θ sin φ cos θ cos φ
(2)
Once the UAV rotation matrix has been obtained, this matrix can be divided into
two subsystems that determine: The first is the position of the quadcopter at any point
in the three-dimensional space, and the second is the orientation of the quadcopter
in which it will determine the UAV course, always taking into account the UAV
reference frame with respect to its inertial reference frame. Taking into account the
94 D. Merizalde et al.
Yaw G(s) = 1
l z ∗s 2
principle of the mass system without damping, the transfer functions can be obtained
for each of the UAV axes, thus being able to control any system through its input.
The transfer functions are as mentioned in Table 1.
With these transfer functions, modeling can be performed, and a digital controller
can be made by means of any programmer and thus determine the behavior of the
system and the responses of the controller for each variable of the represented model,
thus giving way to the creation of the algorithm that allows controlling the variables
to precisely follow the setpoint set by the GPS system.
The proposed system has been tested and implemented in different environmental
scenarios obtaining adequate and increasingly optimal results in terms of navigation
accuracy, this being a reliable element to integrate a long distance mission where there
is no direct vision by the human being, navigating directly to the point, allowing the
user to save and optimize energy consumption for the fulfillment of any mission
safely. Before presenting the navigation trajectories, the algorithm has been set up
in quiet scenarios without wind and another with a certain amount of wind as proof
of the disturbances that nature causes and how the system responds to it.
Although the variables work together, the variables have been divided to represent
them independently; in order to visualize how the controller works, first, you will
obtain the graphical representations of height, latitude and length, respectively, and
verify how they change depending on flight time.
Here, we keep in mind the variable height where we can appreciate how it changes
as a function of time (Fig. 2; Table 2).
Here, we keep in mind the variable latitude where we can appreciate how it
changes as a function of time (Fig. 3; Table 3).
Here, we keep in mind the variable longitude where we can appreciate how it
changes as a function of time (Figs. 4, 5, 6 and 7; Tables 4, 5 and 6).
Allowing to determine that the controller allows a certain error threshold that is
noticeable in the face of wind disturbances (Fig. 8).
In the representation, it is observed that in favorable conditions, the system is of
smooth movement, but when wind disturbances are present, sudden movements can
be noticed in the flight; according to the analysis, the positioning correction due to
Autonomous Navigation Based on Proportional Controller … 95
Fig. 7 Comparison of trajectory in 2D latitude and longitude on stage without wind and winds
Fig. 8 Comparison of trajectory in 3D height latitude and longitude on stage without wind and
winds
98 D. Merizalde et al.
The implemented system allows to carry out a mission where human vision has
no reach thanks to the fact that it has a camera on board. Based on the graphical
representations of the movement variables in three-dimensional space analyzed in
Sect. 4, the navigation system by a proportional controller is reliable and valid for any
environment. Based on the tables in Sect. 4, it can be determined that the autonomous
flight is very precise to reach the desired point taking into account the scope it should
have in terms of communication with the UAV and the battery reserve that must be
calculated to integrate any mission. The problem of battery consumption remains
a limitation in terms of the use of UAVs, so the controller tries to design that its
response to disturbances is as smooth as possible, thus avoiding sudden movements
that tend to consume more amount of energy.
For a future job, a better control action can be performed since it will allow
smoother control of the system and thus have a better optimization of the batteries,
to perform complete perimeter routes. Another work in the future can be done a
graphical interface of the system that will allow monitoring the UAV and verify its
position in real time, allowing to be found in case of loss or fall due to shocks and
energy expenditure.
References
1. Venkatesh, G.A., Sumanth, P., Jansi, K.R.: Fully autonomous UAV. In: Proceedings: 2017
International Conference on Technical Advancements in Computers and Communications,
ICTACC 2017, pp. 41–44, Oct 2017
2. Orbea, D., Moposita, J., Aguilar, W.G., Paredes, M., León, G., Jara-Olmedo, A.: Math model
of UAV multi rotor prototype with fixed wing aerodynamic structure for a flight simulator.
In: International Conference on Augmented Reality, Virtual Reality and Computer Graphics,
pp. 199–211 (2017)
3. Rathbun, D., Kragelund, S.: IEEE Xplore—an evolution based path planning algorithm for
autonomous motion of a UAV through uncertain environments. Digital Avionics (2002).
Available from: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1052946%5Cnpapers2:
//publication/uuid/8479FE2D-6988-48FE-B714-669DA578E2E3
4. Aguilar, W.G., Morales, S.G.: 3D environment mapping using the Kinect V2 and path planning
based on RRT algorithms. Electronics 5(4), 70 (2016)
5. Sani, M.F., Karimian, G.: Automatic navigation and landing of an indoor AR. Drone quadrotor
using ArUco marker and inertial sensors. In: 1st International Conference on Computer and
Drone Applications: Ethical Integration of Computer and Drone Technology for Humanity
Sustainability, IConDA 2017, pp. 102–107, Jan 2018
6. Aguilar, W.G., Manosalvas, J.F., Guillén, J.A., Collaguazo, B.: Robust motion estimation based
on multiple monocular camera for indoor autonomous navigation of micro aerial vehicle.
In: International Conference on Augmented Reality, Virtual Reality and Computer Graphics,
pp. 547–561 (2018)
7. Rahman, M.F.A., Radzuan, S.M., Hussain, Z., Khyasudeen, M.F., Ahmad, K.A., Ahmad, F.,
et al.: Performance of loiter and auto navigation for quadcopter in mission planning application
using open source platform. In: Proceedings of 7th IEEE IEEE International Conference on
Control System, Computing and Engineering (ICCSCE), 2017, Nov 2017. pp. 342–347 (2018)
Autonomous Navigation Based on Proportional Controller … 99
8. Aguilar, W.G., Cobeña, B., Rodriguez, G., Salcedo, V.S., Collaguazo, B.: SVM and RGB-D
sensor based gesture recognition for UAV control. In: International Conference on Augmented
Reality, Virtual Reality and Computer Graphics, pp. 713–719 (2018)
9. Shang, J, Shi, Z.: Vision-based runway recognition for UAV autonomous landing. IJCSNS Int
J Comput Sci Netw Secur 7(3), 112 (2007). Available from: http://paper.ijcsns.org/07_book/
200703/20070317.pdf
10. Aguilar, W.G., Luna, M.A., Ruiz, H., Moya, J.F., Luna, M.P., Abad, V., Parra, H.: Statistical
abnormal crowd behavior detection and simulation for real-time applications. In: International
Conference on Intelligent Robotics and Applications, pp. 671–682 (2017)
11. Brockers, R., Hummenberger, M., Weiss, S., Matthies, L.: Towards autonomous navigation of
miniature UAV. IEEE Comput Soc Conf Comput Vis Pattern Recognit Work 645–51 (2014)
12. Aguilar, W.G., Salcedo, V.S., Sandoval, D.S., Cobeña, B.: Developing of a video-based model
for UAV autonomous navigation. Latin American Workshop on Computational Neuroscience,
pp. 94–105 (2017)
13. Imanberdiyev, N., Fu, C., Kayacan, E., Chen, I.M.: Autonomous navigation of UAV by using
real-time model-based reinforcement learning. In: 2016 14th International Conference on
Control, Automation, Robotics and Vision (ICARCV), Nov 2016, pp. 13–5 (2017)
14. Aguilar, W.G., Casaliglla, V.P., Polit, J.L.: Obstacle avoidance based-visual navigation for
micro aerial vehicles. Electronics 6(1), 10 (2017)
15. Aguilar, W.G., Angulo, C.: Real-time video stabilization without phantom movements for
micro aerial vehicles. EURASIP J. Image Video Process. 2014(1), 46 (2014)
16. Aguilar, W.G., Angulo, C.: Real-time model-based video stabilization for microaerial vehicles.
Neural Process. Lett. 43(2), 459–477 (2016)
17. Parrot. Dron Parrot Bebop 2 FPV|Sitio Web Official de Parrot [Internet]. 2019 [cited 2020 Jan
8]. Available from: https://www.parrot.com/es/drones/parrot-bebop-2-fpv
18. Roberts, C.: GPS guided autonomous drone, 32 (2016). Available from: https://www.evansville.
edu/majors/eecs/downloads/projects2016/CameronRobertsReport.pdf
Monte Carlo-Based Localization
for Kidnapped Robot Problem
Abstract In this paper, we propose an algorithm for kidnapped robot problem based
on Monte Carlo localization in known map using laser 360°, and initial sample in all
global localization. We present performance y real-time video results. Our proposal
is evaluated and compared with other works.
1 Introduction
© The Editor(s) (if applicable) and The Author(s), under exclusive license 101
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_9
102 W. G. Aguilar et al.
therefore has some modifications such as [15], there are also works that use new
algorithms such as MSAC [13].
In terms of odometry, investigations are carried out depending on the configura-
tions of the mobile robot, such as [9, 10], or methods with sensors such as odometry
using a laser sensor [17].
Our approach is resolve the kidnapped robot problem based on the Monte Carlo
location (MCL), on a known map using a 360° laser with the theory of beams sensors
model, and our theory about minimum sampling to start the MCL algorithm, to get
a minimum error in the final location.
This paper is organized as follows: our proposal for localization for kidnapped
robot problem is described in Sect. 2. In Sect. 3, we present the experimental results.
Finally, conclusions and future works are presented in Sect. 4.
2 Our Approach
Our proposal to recover the localization of the robot in 2D is use the algorithm Monte
Carlo localization (MCL) with KDL-Sampling and a 360° laser sensor with the beam
model sensor, and will create samples for all the map random with a simple sampling
theory to acquire the initial sample, which consists of creating 40 samples per square
meter of map.
Monte Carlo Localization with KDL-Sampling:
For resolving kidnapped robot problem, we use Monte Carlo localization (MCL)
algorithm, the basic idea is approximate the subsequent state of a set of sample states
or particles xt[m] , and in a summarized way, it consists of a two-step algorithm [18].
Initialization: At time t = 0, draw M particles according to p(x0 ) = X 0
Recursion: At time t > 0, generate
a particle
xt[m] for each particle xt−1
[m]
by drawing
[m]
from the actuation model p xt |u t , xt−1 = X t . Then, draw M particles from X t ,
draw with a probability proportional to measurement p(z t |xt[m] ). Call the resulting
set of X t .
For sampling, we use KDL-Sampling, the key idea is to bound the error introduced
by the sample-based representation of the particle filter. To derive this bound, we
assume that the true posterior is given by a discrete, piecewise constant distribution
such as a discrete density tree or a multidimensional histogram [19, 20]. If we choose
the number of samples n as [21]:
1 2
n= x (1)
2 k−1,1−δ
A good approximation of (1) is:
3
k−1 2 2
n= 1− + z 1−δ (2)
2 9(k − 1) 9(k − 1)
Monte Carlo-Based Localization for Kidnapped Robot Problem 103
where z1−δ is the upper 1 − δ quantile of the standard normal N(0, 1) distribution
and is upper bound on the K.
Combining these two analyzes we obtain the algorithm used in our proposal.
In line 9–11, the factor k is analyzed, and here, we assume that a bin of the
multinomial distribution has support if its probability is above a certain threshold.
This way the number k will decrease with the certainty of the state estimation. In
line 13, the number of samples needed by the process in its next stage is calculated
using the factors of the multinomial distribution, for our proposal, the maximum
error between the true distribution and the estimated distribution, should not exceed
0.05.
Then, on line 15–17, the weight of the sample is normalized, and the most prob-
able estimated x positions are analyzed according to the weight of the sample and
maintained and added to the X t positions, while the least probable ones are erased
and they are resampling in the most probable positions.
As the MCL is an algorithm that estimates the position according to the odometry
of the robot, it can present high positioning errors of the robot when problem have
been solved the problem, and give a false position, if it does not start with a number
of acceptable samples for the map. For tests carried out in this bibliography [12],
it is necessary to have more samples for greater precision, so infinite samples are
required, but since it is not possible in real world, a certain number of samples must
be given to start the problem to be resolved with great precision and at the same time
not force the processing of the robot.
Our approach for the number of initial samples in the MCL algorithm consists of
creating forty samples in each square meter of known map.
Minitial = 40 ∗ A (3)
n
Prand (z|x, m) = (6)
z max
n
Pmax (z|x, m) = (7)
z small
Monte Carlo-Based Localization for Kidnapped Robot Problem 105
⎛ ⎞T ⎛ ⎞
αhit Phit (z|x, m)
⎜ αunexp ⎟ ⎜ Punexp (z|x, m) ⎟
P(z|x, m) = ⎜ ⎟ ⎜
⎝ αmax ⎠ ⎝ Pmax (z|x, m) ⎠
⎟ (8)
αrand Prand (z|x, m)
αhit = 0.45
αunexp = 0.05
αmax = 0.05
αrand = 0.45
b = 0.2
λ = 0.1
For Algorithm:
Initial sampling dependent on the map area:
Minitial = 40 ∗ A
z 1−δ = 0.99
= 0.05
106 W. G. Aguilar et al.
The robot built to perform the tests has a linear velocity of 0.2 m/s, an angular velocity
of 2 rad/s, which also govern the update of the algorithm, since the algorithm is
updated with the movement of the robot. First, the results obtained by the tests in
different places with different surfaces are presented in the following sequence of
images of Fig. 1, where the time elapsed since the start of the recovery process of
the kidnapped robot problem is also described; the actual position of the robot is
presented, then a comparison of the results obtained from the time and the error is
presented at the end of the measurement, where the calculated error is:
e = |z real − x|
Totalerror position = ex2 + e2y = 0.158 m
Our proposal for the recovery of the position for kidnapped robot problem has a better
estimate with respect to single robot with respect to the position error, however, with
respect to the multi-robot, it has a lower estimate as shown in Table 2, but these
results are subjective because the number of samples of each algorithm must also be
measured and compared with the known map surface.
The algorithm works correctly, because it comes to converge in an estimated final
position, and thanks to the KLD-Sampling allows to reduce the number of dependent
Monte Carlo-Based Localization for Kidnapped Robot Problem 107
a.1) b.1)
a.1) Algorithm test on known map of size 9x6 m =>
b.1) Algorithm test on known map of size 12x10 m =>
a.2) b.2)
a.2) t=5s time after the process started
b.2) t= 24 s time after the process started
a.3) b.3)
a.3) t=19 s time after the process started
b.3) t=37s time after the process started
a.4) b.4)
a.4) t=23s time after the process started
b.1) t=49 s time after the process started
samples to the estimation of the robot, with that in the end the processing is much
smaller than at the beginning of the algorithm.
This algorithm can be combined with the adaptive Monte Carlo localization
(AMCL) which allows to generate random samples to recover the position of a
possible measurement error, given that, if the robot is misplaced, generating random
samples can allow finding a position with more likely than the current one.
Acknowledgements This work is part of the project perception and localization system for
autonomous navigation of rotor micro-aerial vehicle in GPS-denied environments, VisualNav-
Drone, 2016-PIC-024, from the Universidad de las Fuerzas Armadas ESPE, directed by Dr. Wilbert
G. Aguilar.
References
1. Royer, E., Lhuillier, M., Dhome, M., Lavest, J.-M.: Monocular vision for mobile robot local-
ization and autonomous navigation. Int. J. Comput. Vision 74(3), 237–260 (2007). https://doi.
org/10.1007/s11263-006-0023-y
2. Savaria, D. T., Balasubramanian, R. (2010). V-SLAM: vision-based simultaneous localization
and map building for an autonomous mobile robot. 2010 IEEE Conference on Multisensor
Fusion and Integration for Intelligent Systems (MFI), pp. 1–6. http://doi.org/10.1109/MFI.
2010.5604466
3. Aguilar, W.G., Casaliglla, V.P., Polit, J.L.: Obstacle avoidance based-visual navigation for
micro aerial vehicles. Electronics 6(1), 10 (2017)
4. Leonard, J. J., Durrant-Whyte, H. F. (1991). Simultaneous map building and localization for
an autonomous mobile robot. In: Proceedings IROS ’91: IEEE/RSJ international workshop
on intelligent robots and systems ’91, (91), pp. 1442–1447. http://doi.org/10.1109/IROS.1991.
174711
5. Garcia, M.A.P., Montiel, O., Castillo, O., Sepúlveda, R., Melin, P.: Path planning for
autonomous mobile robot navigation with ant colony optimization and fuzzy cost function
evaluation. Appl Soft Comput J 9(3), 1102–1110 (2009). https://doi.org/10.1016/j.asoc.2009.
02.014
Monte Carlo-Based Localization for Kidnapped Robot Problem 109
6. Aguilar, W.G., Morales, S.G.: 3D environment mapping using the Kinect V2 and path planning
based on RRT algorithms. Electronics 5(4), 70 (2016)
7. Ismail, A.-T., Sheta, A., Al-Weshah, M.: A mobile robot path planning using genetic algorithm
in static environment. J. Comput. Sci. 4(4), 341–344 (2008). Retrieved from http://thescipub.
com/abstract/10.3844/jcssp.2008.341.344
8. Ge, S.S., Cui, Y.J.: New potential functions for mobile robot path planning. IEEE Trans. Robot.
Autom. 16(5), 615–620 (2000). https://doi.org/10.1109/70.880813
9. Aguilar, W.G., Cobeña, B., Rodriguez, G., Salcedo, V.S., Collaguazo, B.: SVM and RGB-D
sensor based gesture recognition for UAV control. In: International Conference on Augmented
Reality, Virtual Reality and Computer Graphics, pp. 713–719 (2018)
10. Aguilar, W.G., Salcedo, V.S., Sandoval, D.S., Cobeña, B.: Developing of a video-based model
for UAV autonomous navigation. Latin American Workshop on Computational Neuroscience,
pp. 94–105 (2017)
11. Aguilar, W.G., Manosalvas, J.F., Guillén, J.A., Collaguazo, B.: Robust motion estimation based
on multiple monocular camera for indoor autonomous navigation of micro aerial vehicle.
In: International Conference on Augmented Reality, Virtual Reality and Computer Graphics,
pp. 547–561 (2018)
12. Orbea, D., Moposita, J., Aguilar, W.G., Paredes, M., León, G., Jara-Olmedo, A.: Math model
of UAV multi rotor prototype with fixed wing aerodynamic structure for a flight simulator.
In: International Conference on Augmented Reality, Virtual Reality and Computer Graphics,
pp. 199–211 (2017)
13. Majdik, A., Popa, M., Tamas, L., Szoke, I., & Lazea, G. (2010). New approach in solving the
kidnapped robot problem. In: 41st International Conference on Robotics, pp. 1–6. Retrieved
from http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=5756811
14. Dellaert, F., Fox, D., Burgard, W., Thrun, S.: Monte Carlo localization for mobile robots.
In: Proceedings 1999 IEEE International Conference on Robotics and Automation (Cat. No.
99CH36288C), vol. 2, pp. 1322–1328 May 1999. http://doi.org/10.1109/ROBOT.1999.772544
15. Thrun, S., Fox, D., Burgard, W., Dellaert, F.: Robust Monte Carlo localization for mobile robots.
Artif. Intell. 128(1–2), 99–141 (2001). https://doi.org/10.1016/S0004-3702(01)00069-8
16. Fox, D., Thrun, S., Burgard, W., Dellaert, F.: Particle filters for mobile robot localization.
Sequential Monte Carlo Methods in Practice, 401–428 (2001). http://doi.org/10.1007/978-1-
4757-3437-9_19
17. Censi, A.: An ICP variant using a point-to-line metric. In: Proceedings—IEEE interna-
tional conference on robotics and automation, pp. 19–25. http://doi.org/10.1109/ROBOT.2008.
4543181
18. Aguilar, W.G., Angulo, C.: Real-time model-based video stabilization for microaerial vehicles.
Neural Process. Lett. 43(2), 459–477 (2016)
19. Moore, A. W., Schneider, J., Deng, K.: Efficient locally weighted polynomial regression
predictions. In: Proceedings of International Conference on Machine Learning, pp. 236–244
20. Aguilar, W.G., Luna, M.A., Ruiz, H., Moya, J.F., Luna, M.P., Abad, V., Parra, H.: Statistical
abnormal crowd behavior detection and simulation for real-time applications. In: International
Conference on Intelligent Robotics and Applications, pp. 671–682 (2017)
21. Fox, D.: KLD-sampling: adaptive particle filters. Adv. Neural Inf. Process. Syst. 14(1), 713–720
(2002). https://doi.org/10.1.1.21.5786
22. Fox, D., Thrun, S., Burgard, W., Dellaert, F.: Particle filters for mobile robot localization.
Sequential Monte Carlo methods in practice, pp. 401–428 (2001). https://doi.org/10.1007/978-
1-4757-3437-9_19
Automatic Counting of People
in Crowded Scenes, with Drones That
Were Applied in Internal Defense
Operations on October 20, 2019
in Ecuador
Abstract Eleven days of public protests, unrest and chaos happened in October 2019
in Ecuador. The national security forces acted immediately implementing internal
defense operations. In this changing and highly uncertain context the automatic
crowd counting based on the Gaussian density estimation combined with the multi-
scale convolutional neural networks is used to generate electronic intelligence. This
solution is set in a real scene obtaining excellent results and reducing the training time
without being the performance affected. In this way, with the information obtained in
real-time about the quantities of forces and dispositive. The national security forces
reaction is immediate guaranteeing the control, the resupply and reorganization of
themselves.
1 Introduction
1.1 Context
On October 3, 2019 the Ecuadorian government applied the 883 decree-law which
established an increase in the fossil fuels cost. This fact triggered a wave of parades,
incidents and public protests carried out by different social actors. Those actions
were exceptionally violent as it had not happened in previous decades [1].
© The Editor(s) (if applicable) and The Author(s), under exclusive license 111
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_10
112 H. Cruz et al.
In this context, social and political issues were evident and taken into consideration
and it can be thought this situation could stem from a constant ideological fight,
an economic disagreement and even manipulation of people. The official and non-
official media broadcasted the day by day parades which took place along the country
while confusing citizens witnessed it and were affected in one or another way by this
officially declared state of emergency.
Several social and political theories have turned up from these events pointing out
the social discontent or a complex political strategy as the origin of the disruption
of the proper functioning of the main cities and a try to destabilize the govern-
ment legally formed. Independently of the origin of these events the destruction,
confrontation and unrest were unprecedented [2].
On the other hand, the more significant social protests were those which were
organized by some indigenous leaders and came from different areas of the “Interan-
dina” region [3] from both the North and the South towards the capital of Ecuador,
Quito. It is located at 2850 m above the sea level and its population is 2,700,000
inhabitants [4].
The conflict led to antagonisms and confrontations on social networks. It is where
the information provided by official media was questioned by citizens due to the
amount of videos, audios and fake news broadcasted on Internet leading to misleading
information and uncertainty in the country.
This social behavior of ideological suggestion and collective manipulation showed
that the majority of the Ecuadorian society does not analyze or verify information and
the fragility of the social structure that reached the social and political polarization
being a consequence of people’s frustration [5].
All of these variables mentioned above intensified the public protests towards the
Centre of Quito being estimated the number of participants in them about 15,000
people [6]. In this context the national armed forces accomplishing the constitu-
tional and Ecuadorian laws work to guarantee the social peace, rights and freedom
of Ecuadorian citizens. In order to do so tactics, techniques and procedures were used
to have internal control. Among the technological tools applied to obtain information
of the context to be confronted are the drones. They do surveillance and recognition
tasks and if they are combined with computer vision algorithms, drones provide the
obtaining automatic information about the composition, the device, and the effec-
tiveness generating more accurate assessments in internal and external operations
[7, 8].
The artificial vision atomizes the surveillance and monitoring tasks through the devel-
opment of algorithms that let, among other actions, the recognition, the people count-
ing and the detection of anomalous events. Especially, they allow the people counting
Automatic Counting of People in Crowded Scenes … 113
in crowded scenes so they can be monitored making easier for those in charge of the
national security the control of a situation.
People counting in crowded scenes are a technique in demand in continuous
development and improvement. To the best of our knowledge one of the first works
in literature is related to the application of the Gaussian process regression (GPR)
that consists of the segmentation of homogeneous components in a dynamic way
as the background is separated from the foreground. According to the authors, this
method can reach the 91% of accuracy [9].
On other hand, algorithms have been applied to the automatic learning without
supervision to detect and estimate the amount of people in crowded scenes. This
procedure is called density learning and allows the considerable reduction in the
execution time in real time, the higher the interaction number, the lower the execution
time and mistakes [10].
After the people detection and counting algorithms that do the detection through
the geometric filter have been developed or designed and the subsequent people
monitoring taking into account a base line detector. Whole system is based on the
density and supervised training [11]. Then works related to counting people through
semi supervised algorithms, accumulative attribute, extraction of spatial temporal
features, multi-source and multi-scale counting and interactive object [12]. In addi-
tion, adaptive models have been developed to people counting proposes through
convolutional neural networks [13], Bayesian model [14], random forest [15], den-
sity estimation by Gaussian extraction model crowded scene in perspective by deep
learning [15–17].
These works have led to the presentation of proposals based on iterative crowd
counting, scale aggregation network, learning multi-level density maps, pan den-
sity crowd, multipolar normalized density map, adaptive density maps, 3D crowd
counting via Gaussian kernels among others [18, 19].
Currently drones have become into a very useful tool to surveillance and security
fields. Because of that the technological development in this area focuses on generat-
ing applications that allow the improvement of penetration, flexibility and versatility
abilities that enable drones to carry out surveillance actions. Given the fact that the
growth of this activity is evident it is foreseen the need of a regulation of the same
[20, 21].
Technologies such as the Internet of things, artificial intelligence, artificial vision,
high energetic performance, video stabilization among others improve the abilities,
autonomy, design and accessibility of the drones up to a point that it would let the
massive action of mobile surveillance [22]. The advantages and challenges in relation
to the scope and capacity of these systems lead to doubts about the capacity to secure
114 H. Cruz et al.
and avoid the interference and intrusion in the control and monitoring systems being
another challenge to be overcame by the cyber security [23].
The methods and algorithms developed for the crowd counting look for reaching
higher accuracy and reducing errors. The increase in the processors capacity and in
the graphic accelerators makes the detection more accurate with less execution time.
These features are used by the drones to the acquisition and processing of images
and the video frames via off-line and on-line [24–26].
The optical sensors of the drones produce high resolution images and videos
and the stabilization systems are stronger so the likelihood of error because of bad
information quality is each time smaller [27]. These abilities and advantages help
obtaining more accuracy in the people detection, crowd counting and targets location
and for that algorithms based on Layout Proposal Networks (LPNs) [28] and spatial
kernels have been applied and the scale-aware contextual extraction to the obtaining
of density maps and later training of the obtained features [29]. In relation to the crowd
counting other works combine the Gaussian density estimation classified according to
CNN what improves the detection even though a distortion happens due to perspective
[30]. Also this combination has proved to be efficient even when imagines vary of
scale due to the vertical movements of the drones [31].
Currently there is a tendency towards the use of drones for monitoring and surveil-
lance tasks being the detection algorithms and automatic counting an important reli-
able option to execute these tasks. Because of that this work is to show the experiential
application of the combination of the estimation of the Gaussian density with the
CCN in internal defensive operations. This work has the following sections. Section 2
describes the applied methodology; Sect. 3 shows the results obtained against the
application scenario are discussed and finally, Sect. 5 details the main conclusions
and future work.
2 Methodology
After previous analysis of existing works the application of the density estimation
through the Gaussian model applied to the people counting and improving the count-
ing in perspective is proposed [9, 32, 33]. The beginning proposal is that this model
responses to the existence of a signals distribution but which are in a defined rank
where a function m(x) is directly related to its covariance k(x, x ), so it is determined
that that covariance represents a vector and a matrix at the same time. The model is
proposed as it is shown in (1):
Signals are quantified and generate numerical matrixes which are used to develop
training processes that will serve to matrixes comparison and later predictive process
will be done. Given the fact that the signals taking under the same perspective facili-
tates the comparison what implies high levels of error because of the movement and
displacement of the drones, the extraction of the training signals features in different
scales lets cover higher number of possibilities being the values matching effective
and subsequently the classification increases the accuracy level. Because of that the
signals training through the multiscale convolutional neutral network (MSCNN) pro-
posed by Zeng et al. [34] is thought to be an interesting option when generating a
training model for the detection and crowd counting in diverse scales. The covariance
model applied for the signal analysis allows having a values group and estimating
the variation grade in relation to the size of the signals.
The process starts with the acquisition of video signals which have been treated in
two ways. One of them is through an online system generated by an Ad Hoc net of
the DJI Mavic 2 PRO drone to process the video in real time and another is through
an off-line system processed form the DJI Phantom 4 drone. An Intel Pentium 7 with
graphic accelerator computer was used to process the video and imagines. On other
hand, the acquired signals by the optical sensors are assessed through the method
based on MSCNN and following the process described in the item 2.2., obtaining a
final map of Gaussian density. The probability of the Gaussian density is defined as
the group of pixels accumulated with a certain value inside of a specific region as it
is described in (2):
1
N
(x − xi )2 + (y − yi )2
p(x, y) = exp − (2)
C i=1 2ϑ
where p represents a normalised value of p from (0, 1). Figure 1 shows the process
taken.
The total of the video frames and the images with standard resolution of 4096 ×
2160 to 60 fps and taken with a bit rate of 100 Mbps samples was of about 4000.
This data bank of images was collected along the eleven days of the public protests
happened in Quito in October 2019. This data bank cannot be published because of
the confidentiality of the information and its repository is located at Centro de Inves-
tigación de Aplicaciones Militares (CIAM). The environmental and the application
conditions varied; due to the black smoke produced by the tires burning the visi-
bility was reduced so the drones took images from different range of heights from
116 H. Cruz et al.
The defensive operations are characterized by the uncertainty and given the fact
that the conditions in an urban conflict scene are changing, the response time is to
be immediate. The technological solutions to support the operations in these kind of
sceneries should be flexible and appropriate. The training process was optimized and
taking into consideration to reach 97% of effectiveness, the training should be done
in 10 periods [34]. However, take this process with conventional computers means
days of processing so the training chosen counted with 30% of what is recommended,
three periods. In order to reduce the error each frame was assessed in three occasions,
after that the threshold was determined considering the variance of the values in the
Eq. (3)
N 2
1 x−X
Var = (3)
n
Automatic Counting of People in Crowded Scenes … 117
Fig. 2 Process in different places in the Quito Centre: a Av. 12 de Octubre, b Av. Tarqui, c Arbolito
Park
where x, represents a register value counting from the image 1 to the image 3. This
process reduced the error due to the dispersion control and improved the response
time because of the reduction in the training time for the subsequent use of the
algorithm.
3 Results Assessment
The comparative technique of the value counting automatic system against a Ground
Truth that is based on a probabilistic counting estimating the number of people in
certain amount of pixels have been applied. As every image were taken and executed
by the drones in real time, the results have been stored and assessed in a laboratory
in real time leading to set a reliable reference pattern in relation to the operations
executed. In this way, to set or calculate the performance the mean absolute error
118 H. Cruz et al.
(MAE) and the root mean square error (RMSE), that are metrics traditionally used
to assess accuracy of crowd counting data, have been used. The assessments have
taken place in three levels, L1 = 50, L2 = 150, and L3 = 300 m, the number N =
400 samples have been taken from the CIAM data base as it is shown in Table 1.
As it can be observed in Table 1 the values variations of the metric values have
a propositional relation with the height level to which the frames or images were
taken. It can be said that as higher is the height level, higher is the increase in the
error. This variation is not taken into account due to the excellent resolution of the
images obtained from the drones.
4 Discussion
The multiscale model reaches high accuracy and versatility levels. However, in the
training and recognition process the great amount of values produced by the covari-
ance model demands high computational load leading to longer training time. In
the context of national internal defense, the scenes are changing, and the responses
should be flexible, reliable and immediate and the algorithm based on MSCNN suit
to those requirements. The strategy based on the reduction in the number of training
periods let gain opportuneness along the operations and the compensation mecha-
nism to reduce error through the application of the assessment of the counting results
variance led to the dispersion reduction.
The crowd counting results were accurate as Table 1 shows and let have processed
information which is considered electronic intelligence because generated informa-
tion in relation to the forces and the equipment of the forces. Also given the geo
positioning function of the drones the obtained data was geo-referenced.
Automatic Counting of People in Crowded Scenes … 119
The public protests in October 2019 in Quito led to an uncertain and chaos environ-
ment where the national security forces had to act accomplishing the constitutional
law. The need to provide immediate response to guarantee the control let the imple-
mentation of the solutions to this level through the crowd counting algorithm based
on the map of Gaussian density and the classification based on MSCNN.
To reach a better response in implementation time with high accuracy levels, the
training periods are reduced and the variance covers a certain number of obtained
results so the values dispersion is reduced and adapt to a threshold. The imple-
mentation was applied in a real scene of conflict and the results were effective
leading to automatized information that later on became into electronic intelligence
information.
Authorities are to carry on with the developed work done so as to improve the
online broadcasting performance from different perspective and to apply resources
of clusters servers to reduce the training data time.
References
1. Arteta, C., Lempitsky, V., Noble, J., Zisserm: Interactive object counting. In: European
Conference on Computer Vision. Cham (2014)
2. Carvajal, A.: Quito se convirtió en la ciudad más poblada del Ecuador con más de 2,7 millones
de habitantes en el 2018. Recuperado el 2019 de Ene. de 11, de (2019 de Ene. de 10). http://
www.elcomercio.com
3. Carvin, S.: Canadian Defence and new technologies. In: Canadian Defence Policy in Theory
and Practice. Toronto (2020)
4. Chan, A., Liang, Z., Vasconcelos, N.: Privacy preserving crowd monitoring: Counting people
without people models or tracking. In 2008 IEEE Conference on Computer Vision and Pattern
Recognition (2008)
5. Chan, A., Liang, Z., & Vasconcelos, N.: Privacy preserving crowd monitoring: counting people
without people models or tracking. In: 2008 IEEE Conference on Computer Vision and Pattern
Recognition (2008)
6. Choi-Fitzpatrick, A., Juskauskas, T.: Up in the air: applying the Jacobs crowd formula to drone
imagery. Procedia Eng (2015)
7. Comercio, E. (03 de Nov. de 2019). El Comercio. Obtenido de El Comercio: https://www.
elcomercio.com/pages/muertos-protestas-octubre-ecuador-decreto.html
120 H. Cruz et al.
8. Cruz, H., Eckert, M., Meneses, J., Martíne: Precise real-time detection of nonforested areas
with UAVs. IEEE Trans. Geosci. Remote Sens. (2016)
9. Cruz, H., Eckert, M., Meneses, J., Martínez, J.: Efficient forest fire detection index for
application in unmanned aerial systems (UASs). Sensors (2016)
10. Fennelly, L., Perry, M.: Unmanned aerial vehicle (drone) usage in the 21st century. In: The
Professional Protection Officer (2020)
11. Fu, M., Xu, P., Liu, Q., Ye, M., Zhu, C.: Fast crowd density estimation with convolutional
neural networks. Eng. Appl. Artif. Intell. (2015)
12. Grubesic, T., & Nelson, J.: Drone futures. In: UAVs and urban spatial analysis (2020)
13. Haque, S., Sadi, M., Rafi, M., Islam, M.: Real-time crowd detection to prevent stampede. In:
Proceedings of International Joint Conference on Computational Intelligence (2020)
14. Hsieh, M., Lin, Y., Hsu, W.: Drone-based object counting by spatially regularized regional
proposal network. In: Proceedings of the IEEE International Conference on Computer Vision
(2017)
15. Ilyas, N., Shahzad, A., Kim, K.: Convolutional-neural network-based image crowd counting:
review, categorization, analysis, and performance evaluation. Sensors (2020)
16. Krishnaveni, P., Sutha, J.: Novel deep learning framework for broadcasting abnormal events
obtained from surveillance applications. J. Ambient Intell. Humaniz. Comput. 1–15 (2020)
17. Küchhold, M., Simon, M., Eiselein, V., Sikora, T.: Scale-adaptive real-time crowd detection and
counting for drone images. In: 2018 25th IEEE International Conference on Image Processing
(ICIP) (2018)
18. Lempitsky, V., Zisserman, A.: Learning to count objects in images. In: Advances in neural
information processing systems (2010)
19. Liu, B., Vasconcelos, N.: Bayesian model adaptation for crowd counts. In: Proceedings of the
IEEE International Conference on Computer Vision (2015)
20. Liu, W., Lis, K., Salzmann, M., Fua, P.: Geometric and physical constraints for drone-based
head plane crowd density estimatio. In: IEEE/RSJ International Conference on Intelligent
Robots and Systems (2019)
21. Liu, W., Salzmann, M., Fua, P.: Context-aware crowd counting. In: Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition (2019)
22. Maya, A.: La fragilidad ambiental de la cultura. Instituto de Estudios Ambientales (1995)
23. Morales, A.: Latinoamérica arde pero no brilla. Obtenido de (2019). https://es.panampost.com/
editor/2019/11/29/latinoamerica-arde-pero-no-brilla/
24. Onoro-Rubio, D., López-Sastre, R.: Towards perspective-free object counting with deep
learning. In: European Conference on Computer Vision (2016)
25. Pham, V., Kozakaya, T., Yamaguchi, O., Okada: Count forest: co-voting uncertain number
of targets using random forest for crowd density estimation. In: Proceedings of the IEEE
International Conference on Computer Vision (2015)
26. Rasmussen, C.: Gaussian processes in machine learning. In: Summer School on Machine
Learning (2003)
27. Reyes C.R., Pérez, V.H., Paredes, M., Aguilar, W.: MilNova: an approach to the IoT solution
based on model-driven engineering for the military health monitoring. CHILEAN Conference
on Electrical, Electronics Engineering, Information and Communication Technologies (2017)
28. Rodriguez, M., Laptev, I., Sivic, J., Audibert: Density-aware person detection and tracking in
crowds. In 2011 International Conference on Computer Vision (2011)
29. Siddappaji, B., & Akhilesh, K.: Role of cyber security in drone technology. In: Smart
Technologies (2020)
30. Sindagi, V., Patel, V.: A survey of recent advances in cnn-based single image crowd counting
and density estimation. Pattern Recogn. Lett. (2018)
Automatic Counting of People in Crowded Scenes … 121
31. Villalba, J.: Reporte de Desarrollo Humano en ciudades selectas del Ecuador. Recuperado el
2019 de Feb. de 13, de (2019 de Feb. de 13). http://Scribd.com
32. Vivares, E.: La “Batalla de Quito”. Análisis Carolina 27(1) (2019)
33. Von Borstel, M., Kandemir, M., Schmidt, P., Rao, M.: Gaussian process density counting from
weak supervision. In: European Conference on Computer Vision (2016)
34. Zeng, L., Xu, X., Cai, B., Qiu, S., Zhang, T.: Multi-scale convolutional neural networks for
crowd counting. In: 2017 IEEE International Conference on Image Processing (ICIP) (2017)
Expert Nutritional System for Military
Athletes Based on Fuzzy Logic
and Inferential Statistics
Abstract Athletic performance seeks to enhance the physical and mental state of the
athlete, and it is implicit to systematize sports training; for this reason, managing the
monitoring of the physical state of athletes implies relating variables such as initial
physical performance, hydration, types of nutrition, and training to take successful
strategic actions. Among the innumerable factors that promote success in sport,
training, motivation and, above all, resistance to bodily injury is limited since the
time to test the athlete in respect to his talent and training the margin of risk between
victory and defeat is minimal, nutrition is a fundamental element in the physical
preparation of a specific athlete of those who are very disciplined because the diet
benefits or affects sports performance and therefore the desired result. It must be
taken into account that each athlete must be aware of the nutritional objectives to be
achieved and how they can improve a feeding strategy to comply with the expert’s
guidance and in this way shape their long, medium and short term goals. This study
was a focus on planning and training of military athletes and proposes the structure of
an expert nutritional system to reach better standards. The system is available through
the use of web services focused on new technologies based on inferential statistical
systems and fuzzy logic applying a statistic analysis aimed at decision making. The
web services are aimed at improving the monitoring of the physical condition of the
© The Editor(s) (if applicable) and The Author(s), under exclusive license 123
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_11
124 D. Vallejos et al.
athletes to provide nutritional support for the maintenance of a healthy lifestyle with
good physical performance, that is to say, it simplifies the information contained in
the original variables, looking for the interrelations between the numerical variables
defined simultaneously in a set of elements. The results achieved show an improved
performance in the physical evaluation of athletes.
1 Introduction
In Ecuador, for several years, the relationship between those who reach the category
of high-performance athletes compared to a number of athletes who remain in the
practice of a certain sport is low; despite the efforts of local and national coaches
and managers [1]. Therefore, it is imperative to look for alternatives that improve
this relationship; that is why, the present study addresses one of the fundamental
relationships to achieve this desired improvement, the training–feeding relationship
[2].
The purpose of assessing the physical condition of an athlete is to tend to con-
tinuous improvement, for which it is important to determine causes of improvement
or stagnation in performance, since this information is essential to make decisions
related to budgets, training programs, feeding programs, technological equipment,
among others [3].
The World Health Organization recommends boosting levels of physical activity,
within the Global Strategy of Physical Activity and Nutrition [2], based on today´s
needs society to counter-act the rates of low activity or physical exercise. Physical
activity levels can be classified and/or measured in athletes using different assessment
methodologies, this classification can be manifested on ordinal scales (inactive, mod-
erate or active), dichotomous (active or inactive) or continuous (according to METS
and kilocalories) [4].
Actually is a growing interest in the study of the relationship between health and
physical activity, in which a key role has been determined the relationship between
the increase in cardiovascular diseases with sedentary lifestyles [5]; With this back-
ground, it is sought to link the technological aspect with the sports aspect, for which
the automation of traditional processes and the optimization of the analysis times and
possible actions in real-time are intended. What will allow athletes to be constantly
evaluated and monitored?
Expert Nutritional System for Military Athletes Based … 125
2 Related Work
Some studies highlight that sports performance is perfectly related to the techno-
logical aspect, such that a key element is a diffuse logic, which allows to represent
mathematically uncertainty and vagueness.
So it is that with the analysis of variables and contribution of the specialist, the
levels of flexibility and muscular power are better achieved, based on better nutrition
and performance. Here is the convenience of using a system that learns from the
experiences and data generated and projected.
Expert systems are considered the first truly operational product of artificial intel-
ligence. They are computer programs designed to act as a human specialist in a
particular domain or area of knowledge. In this sense, it’s a system that uses stored
knowledge and some methods of inference in order to solve problems normally
required by human experts, who transmits his knowledge to the system, and the
user who uses it to solve a problem with the effectiveness of the specialist [1]. The
expert system uses the knowledge stored and some methods of inference [3]. The
fundamental feature of an expert system is that it separates the stored knowledge
(knowledge base) from the program that controls it (motor of inference). Other fact
important is the data of a given problem is stored in a separate database (fact-based).
The characteristics of fuzzy logic are perfectly coupled for the elaboration of
a nutritional system because as already mentioned above to give an effective and
reliable diagnosis, closed values are not taken; otherwise, other decision criteria
specific to this tool are chosen [4, 5]. Another important aspect of this system is that
virtually all quantitative data collected throughout the entire process are values that
are described in traditional terms, such as low, medium and high average pressure.
The nutritional system uses fuzzy logic [6] developed in x-fuzzy in which input
and output variables, logical operators, defuzzification with the center of the area
method and Fuzzy Mean [7], and rule base were established; the system has two
motors of analyzing each person’s data to give them a category and give nutrition
recommendations on a case-by-case basis (Figs. 1 and 2).
Another important aspect of the nutritional expert system is that it is built with
PHP so that it can be used through the web, it uses an MYSQL database to save
each person’s records according to a control date. With this data using a model that
uses functions performed in JavaScript, the system displays statistical graphs and the
progress of each person. In other words, technology is used optimally and efficiently.
126 D. Vallejos et al.
Fig. 1 Inference engine to make the category of the data of each athlete, based on the suggestions
of the expert nutritionist
Fig. 2 Deployment of the diffuse system, where the input variables, data processing and output
variables are detailed, resulting in the different inference engines, for the sample of results
4 Getting Data
The first step in providing nutritional control is to collect personal information about
each athlete, followed by an interpretation and analysis of that information to identify
problems that affect the athlete’s nutritional. Among the data to be obtained are
Expert Nutritional System for Military Athletes Based … 127
Fig. 3 Fragment of the list of athletes with the display of the data of the variables taken to perform
the inferential analysis, the same ones that will serve to experience the changes in the diagnosis of
their physical performance
sex, age, weight, height, glucose, triglycerides, diastolic pressure, systolic pressure,
temperature, and speed.
To carry out this study, 80 cadets from Eloy Alfaro High School are considered,
of which half are considered high-performance athletes and the other half are not
(Fig. 3).
5 Data Analysis
The main components method provides a series of multivariate procedures and mod-
els that reduce the size allowing better handling and interpretation of the available
data by finding new variables (main components).
For the corresponding analysis, we have p numeric variables x1 , x2 , x3 , . . . , x p
defined simultaneously in a set of elements, and it is a question of constructing, from
these variables, linear combinations y1 , y2 , y3 , …, y p uncorrelated in each other,
so that the former express the largest proportion of the information contained in
the values of the original variables. These linear combinations are known as major
components; where the first major component y1 is expressed as follows:
y1 = u 11 x1 + u 12 x2 + · · · + u 1 p x p (1)
With the necessary condition that it captures the greatest variability of the data.
The second main component y2 , must be not correlated with the first and must
capture the greatest variability that has not been expressed by the first. The third
main component must be not correlated with the previous ones, this as the first two
must capture the greatest variability that has not been expressed by the first two, and
so on.
of major components that retains between 70 and 95% of the total variation in the
correlation between variables is used, or the Kaiser rule could be used, in which each
major component should express an amount of information greater than what each
variable explains.
The concepts and properties presented refer to the entire population where the vari-
ables are defined; however, they may be limited to a representative sample of it. In
this way, they can be applied to the S matrix of sample covariance or to the matrix
of sample correlations. If the results of the sample are to be extended to the entire
population, it should be based on samples that are not small (recommended 15 cases
for each original variable) the same as those to be representative of the population.
Based on the data presented in the investigation and based on the following
information (Fig. 4).
Based on the data presented in the research and from the information in Figs. 5
and 6, after the respective analysis is to be, the equations of the linear combinations
of the 14 variables that lead to the generation of the main elements are the following:
...
y14 = −0.51543598z 1 − 0.13374224z 2 + 0.13329924z 3 + 0.13612686 + · · · − 0.6924780724z 14
(4)
On the other hand, the variables of the entire population in the proposed research
are clearly observed to be well correlated and may be limited to a representative
sample of it by applying a sample correlation matrix, starting from a sample of 14
variables with the observation of 20 data per variable constituting a representative
sample in the research (Fig. 7).
On the other hand, the trace or sum of the diagonal elements of the correlation
matrix is 14.00 and equal to the sum of the variances of the original standardized
130 D. Vallejos et al.
x14 ; however, if analyzed more closely, all variables are closely correlated, mean-
ing that variables are important and essential throughout research reaching 100% of
observations.
6 Results
The system uses the named Takagi-Sugeno approach, which is a method of fuzzy
logic that allows to work with the data collected previously. In this method an expert
has to specify his knowledge in the form of linguistic rules [1, 8].
The nutritional expert system allows us to carry out the categorization of each
person by means of the rules established in the fuzzy logic and according to the
registered data, also allows to recommend a diet suitable to each person for their
correct nutrition with the to help improve your physical performance.
Another important aspect of the system is that by means of graphs it allows us
to visualize the progress corresponding to each person, so that the expert or the
professional in charge can make decisions.
The desired results allowed to determine the causes and consequences of good
nutrition, which will be a very important contribution to the athletic rise of military
personnel. [8] (Figs. 9 and 10).
Considering the parameters that motivated this research, it makes it clear that the
present relates topics immersed in the profile of the professional in Physical Culture,
Sport and Recreation, such as investigative skills, as well as highlighting the athletes’
responsibility to contribute to health approaching prevention and promotion of the
correct nutrition. In the permanent construction of wellness alternatives to generate
132 D. Vallejos et al.
quality of life. Given that health is a priority today, which is why elite athletes and
health organizations promote lifestyle habits that encourage physical activity.
The expert system developed is a tool for sports initiation, but to complement it
is important recommended that will research the proper exercise routine suitable for
each person, which can help improve performance in the sport where it was chosen.
By way of conclusion, analytically it can be said that; all the variables
initially proposed in the investigation are highly correlated with the variables
x1 , x2 , x3 , .., x14 generated by the corresponding frequencies of the respective
variances, summarizing; the variables to be considered would be the following:
x1 , x2 , x3 , x4 , x5 , x6 , x7 , x8 , x9 , x10 de las x1 , x2 , x3 , . . . , x14 , however, if analyzed
more closely, all the variables are closely correlated, this means that the variables are
important and essential in all the research reaching 100% of the observations, this
can also be observed in (Fig. 8) the same that has a behavior of increasing functional
monotony among the variables involved in the investigation.
References
1. González Rico, R., Ramírez Lecguga, J.: Review of Physical Fitness Assessment Tests in
Secondary Education. Spain (2017)
2. Cajamarca Cadme, E.L., Cajamarca Cuji, H.A.: Lipid Profile in Athletes Belonging to the
Azuay Sports Federation, Cuenca 2017. Cuenca (2017)
3. Hernandez, E.F.: Relationship Between Physical Exercise and Body Temperature in Physically
Active and Inactive Adults. Bogota (2014)
4. Ochoa Granda, E.G.: Assessment of Initial Physical Performance and Strategic Actions to
Reduce Sports Dropout in Women’s Athletics of the Sports Federation of Loja. Sangolquí
(2018)
5. Cordente Martínez, C.A., García Soidán, P., Sillero Quintana, M., Domínguez Rome-ro, J.:
Relationship of the level of physical activity, blood pressure and body fat in Madrid adolescents
(2007)
6. Quisbert Quispe, U.: Expert System Based on Fuzzy Logic for the Child-Bearing Initiation of
Children in the Growth Stage. La Paz (2015)
7. Riza c. Berkan sheldon L.trubatch.: Fuzzy System Design Principles. IEEE Press (1997)
8. Hudson, d.l., Cohen, m.e.: Neural Networks and Artificial Intelligence for Biomedical
Engineering. IEEE Press series on Biomedical Engineering 1999 Wiley-IEEE Press (1999)
Expert Nutritional System for Military Athletes Based … 133
9. Véliz, C.: Multivariate Analysis, Multivariate Statistical Methods for Research. Editorial
Cengage Learning, Mexico (2016)
10. Cuadras, C.: New Methods of Multivariate Analysis. CMC Editions Editorial, Barcelona (2019)
11. Montanero, J.: Multivariate Analysis. Editorial University of Extremadura, Spain (2008)
12. Baillo, A., Grané A.: 100 Solved Problems of Multivariate Statistics, implemented in Matlab.
Delta Publishing Publications, Madrid (2008)
13. ALP, A.: Effects of aerobic exercise on bone-specific alkaline phosphatase and urinary CTX
levels in Premenopausal Women. BMC Musculoskelet Disorders, pp. 30–31 (2013)
14. Maimoun, L., Manetta, J., Couret, I., Dupuy, A.M., Mariano-Goulart, D., Micallef, J.P., Rossi,
M.: The Intensity Level of Physical Exercise and the Bone Metabolism Response, vol 27. US
National Library of Medicine National Institutes of Health (2011)
15. Taha, L.G.E.-D.: The Role of Expert System in Remote Sensing Applications, vol 18. Nova
Science Publishers, Inc., p. 3/4 (2010)
16. Lake, B.M., Ullman, T.D., Tenenbaum, J.B., Gershman, S.J.: Building Machines That Learn
and Think Like People. Cornell University (2016)
17. Bushra Alhijawi, Y.K.: Int. J. Adv. Intell. Paradigms. Inderscience Publisher (2018)
18. Mamlook, R.M.: A New Method for Defuzzification and Ranking of Fuzzy Numbers Based
on the Statistical Beta Distribution, vol. 2016 Hindawi (2016)
19. Gil-Sierra, D.G., Salcedo-Parra, O.J., Angulo, K.: Optimization using diffuse logic of analysis
device for chemical components of natural ingredients based on the internet of things IoT. Sci.
Mag. 1(37) (2020)
20. Bermudez, N.S.C., Tovar, S.M.C.: Analysis of the Physical Condition of the Military Cadets
Academy General José María Córdova¨. Dialnet, pp. 131–139 (2015)
Earth Coverage Model for GPS-Like
Capabilities
Abstract In terms of the number of satellites in view from a near ground level device
or event where Maximum Look Angle represents the performance of transmitters,
the global coverage provided by the GPS constellation is demonstrated to be well
approximated by assuming that the satellites are randomly distributed around the
earth. Analysis using GPS almanac data indicates that a random approximation is a
good approximation to within about 10% accuracy. An analytic model relying on this
approximation was used to assist in the validation of a sophisticated ephemeris-based
performance model. The model also enables fast parametric estimation of aggregate
cost, performance, and risk of GPS-like capabilities, including those fielded on small
satellites in low earth orbit.
1 Introduction
For more than 50 years, the National Nuclear Security Administration and its pre-
decessors have sponsored work at the National Nuclear Laboratories to develop and
V. H. Standley (B)
National Defense University, Washington, DC 20319, USA
e-mail: [email protected]
E. A. Boucheron
The Aerospace Corporation, P.O. Box 5800, Albuquerque, NM 87185, USA
e-mail: [email protected]
R. K. Kirkwood
Lawrence Livermore National Laboratory, P.O. Box 808, Livermore, CA 94551, USA
e-mail: [email protected]
B. E. Norman
Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545, USA
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 135
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_12
136 V. H. Standley et al.
fabricate instruments to detect nuclear detonations from space. Synergies with space-
based navigation led to these instruments being hosted on GPS satellites beginning
in the 1980s since both navigation and detonation detection missions require global
coverage and the use of highly accurate clocks to determine location. While cov-
erage provided by these systems is normally assessed using sophisticated orbital
ephemeris-based models [1], it is possible to provide reasonable estimates with a
compact analytic model. Estimates from this method can be used to help inform
acquisition decisions and as a validation check of performance estimates provided
by more complicated models. The method shown here calculates the probability that
a specific number of satellite-based instruments will receive signals emitted from the
earth’s surface or, conversely, that radio receivers on the ground will receive signals
from a specific number of satellites. This method, not previously used, is based on
modeling satellites’ sensing behavior with a single parameter, instrument Maximum
Look Angle, and can be used to generate aggregate system performance of a complex
satellite constellation.
Event Horizon
re
Earth Surface
Earth Coverage Model for GPS-Like Capabilities 137
relationship between the event, observing instrument, earth, and subtended angles.
Maximum look angles are computed by the sensor developers based on analysis and
testing. For example, the implied Maximum Look Angle associated with a hand-held
GPS receiver is almost 90°, meaning that an earth-based observer can receive signals
from all satellites above the earth horizon.
For purposes of a simple mathematically abstracted representation, the relation-
ship between Maximum Look Angle and the number of average satellites in view is
treated as having a strictly geometric relationship, calculated by first determining the
fraction of the earth over which any one instrument can detect an event (or signals
from the satellite can be received). The fraction of the earth area viewed by a satellite
deployed instrument, based on the surface area of a unit dome is:
(1 − cosβ)
Fraction of Earth Area in View = (1)
2
The Law of Sines is used to derive β, which is given by:
re
β = cos−1 cosθ − θ (2)
rs
3 Probabilistic Coverage
For GPS-based capabilities, the ratio of earth and satellite orbital radii, r e /r s is equal to
6378 km/(20,200 km + 6378 km) = 0.24. For N total satellites in a constellation, each
with a detonation detection instrument or navigation transmitter onboard, assumed
to be randomly and uniformly distributed around the sphere of the earth, the average
number of satellites in view can be derived as the fraction of the earth area covered
by each sensor, multiplied by N:
1 − cosβ
Average Satellites in View = N (3)
2
After inserting β into the above equation and replacing θ with 90-MLA, one
obtains a direct relationship between average number of satellites in view over the
whole earth and Maximum Look Angle:
N −1 r e
Average Satellites in View = 1 − sin cos (MLA) + MLA (4)
2 rs
Our analysis uses the result of Eq. (4) rounded to the nearest integer as an estimate
of the actual number of satellites in view so that the rest of the calculations can be
done using a hypergeometric distribution. We will subsequently show by comparisons
138 V. H. Standley et al.
with more precise calculations (discussed below) that this assumption is reasonably
accurate for the parameters of the GPS constellation. A simple random model can
be based solely on mixing the average number of satellites in view from Eq. (4)
with those not in view. Confining ourselves first to the half-earth case, we use the
hypergeometric distribution with population size N = 12, sample size n = 12, the
number of successes in the sample = k, and number of successes in the population
= K = Eq. (4). For a specific example where MLA = 90°, K = 9. The mean of
the hypergeometric distribution is n * K/N, which is for this case 12 × 9/12 = 9.
While not particularly useful, the half-earth case is instructive because it shows that
the hypergeometric distribution returns a probability of one for k = K and zero
otherwise. That is, the number of satellites in view as calculated by Eq. (4) is always
true. A whole earth, 24-satellite GPS constellation can be thought of as twice a
half-earth constellation with N = 2 * 12 = 24 and number of successes twice the
number for the half-earth case. However, we keep the sample size n equal to 12 and
thus the hypergeometric will return results other than simply zero or one. We use
12 because it corresponds to the maximum number of satellites that can ever be in
view. Conversely, it can be thought of as how many GPS-based detonation detection
instruments are in view of an event on the ground if the instruments had the same
look angle for the event.
Consider the example of a GPS hand-held receiver that has the equivalent of a
satellite sensor Maximum Look Angle of 85°. The integer number of satellites in
view for half-earth according to Eq. (4) is equal to 8. For the whole earth, there is
an average of 2 * 8 = 16 in view. For reasons explained, we keep the sample size n
equal to 12. The probability that exactly eight satellites will be in view using integer
values derived from Eq. (4) is:
K N−K 16 24 − 16
k n−k 8 12 − 8 12, 870 × 70
P(X = 8) = = = = 0.33
N 24 2, 704, 156
n 12
(5)
a
where N = 24, K = 16, n = 12, k = 8 and is the binomial coefficient for
b
integers a and b. The result above makes sense because the ratio of the average
satellites in view to the total number of satellites, 8/24, is numerically the same.
Cumulative probability is more useful because, for example, hand-held receivers need
information from at least four satellites to compute a three-dimensional coordinate.
The cumulative probability associated with a minimum number of satellites in view
is given by:
Earth Coverage Model for GPS-Like Capabilities 139
K N−K
k−1
k n−k
P(X ≥ k) = 1 − (6)
0 N
n
Using this model, the probability that at least four satellites are in view of a GPS
hand-held receiver for the example above is:
⎛ ⎞
16 24 − 16 16 24 − 16 16 24 − 16 16 24 − 16
⎜ ⎟
⎜ 0 12 − 0 1 12 − 1 2 12 − 2 3 12 − 3 ⎟
P(X ≥ 4) = 1 − ⎜
⎜ + + + ⎟
⎟
⎝ 24 24 24 24 ⎠
12 12 12 12
= 1 − (0 + 0 + 0 + 0) = 1 (7)
The average log per capita energy consumption for win, lose, initiator, and non-
initiator categories are summarized in Table 1. The weighted average of the log
per capita energy for the win cases is −0.42. The weighted average of the log per
capita energy for the lose cases is −0.82. On average, those victorious in wars were
consuming about 0.4 more in log per capita energy or about 2.5 times more than
nations losing wars. Energy consumption is thus an important factor in winning wars
whether for attack or defense.
This result illustrates the limitation of using a discrete random model. Under some
circumstances, the results will either be exactly one or zero, which might leave some
doubt about how different the true value will be. However, this concern can easily
be addressed by calculating the result for slightly different coverage circumstances.
For example, the probability that at least five satellites are in view is given by:
1820 × 1
P(X ≥ 5) = 1 − 0 + 0 + 0 + 0 + = 0.999 (8)
2, 704, 156
Table 1 Ground station latitudes represented latitudes and Earth surface fractions, and cumulative
Earth surface fraction
Ground station Latitude range Fraction of earth Cumulative fraction
latitude (°) represented (°) surface represented from 0 to 90° latitude
90 80–90 0.02 1.00
70 65–80 0.08 0.98
60 50–65 0.14 0.90
40 36.5–50 0.17 0.76
30 27.75–36.5 0.13 0.59
22.5 15–27.75 0.21 0.46
7.5 3.75–15 0.19 0.25
0.0 (Equator) 0–3.37 0.06 0.06
140 V. H. Standley et al.
That is, there is a 99.9% chance of finding one more than the minimum number
of GPS satellites needed to compute a location from anywhere on the earth. Thus,
the true value for at least four satellites in view is somewhere between 0.999 and 1,
which should be satisfactory knowledge under most circumstances.
4 Validation
A method of modeling the number of GPS satellites with sensors in view of an event
was also performed by a Monte Carlo sampling of GPS orbital almanac data [2]. This
method directly calculates the average number of satellites in view and was used to
independently validate the simple hypergeometric analytical model developed. To
this end, a dynamic model of the GPS constellation orbits has been represented by
randomly sampling an almanac of satellite elevations over time using ephemeris data
for a given GPS constellation. GPS satellites exhibit an orbital period of one-half a
sidereal day, i.e., 11 h and 58 min. The orbits are arranged so that at least six satellites
are always within line of sight from almost everywhere on earth’s surface. Orbiting at
an altitude of approximately 20,200 km; orbital radius of approximately 26,600 km,
each SV (space vehicle) makes two complete orbits each sidereal day, repeating the
same ground track each day. Trimble Planning software, version 2.90, was used to
generate lookup tables for the elevation angles of satellites in a constellation of 24
GPS satellites every minute over a 72-h period for a set of assigned “ground station”
latitudes. Since the GPS satellite ground tracks repeat each day, use of a three-day
lookup table as a repeating pattern over time is deemed a reasonable approximation
of true constellation behavior. Further, it is assumed that the southern hemisphere
observations of satellite elevations will be a mirror image of those in the northern
hemisphere. The latitudes chosen were 0.0, 7.5, 22.5, 30, 40, 60, 70 and 90°, all at
77° longitude. Associated with each value of latitude is a section of the hemisphere
of the earth’s surface, each of which covers a fraction of the earth’s surface area,
respectively, as shown in Table 1.
An almanac of satellite elevations, output at one-minute intervals over a 72-h
period, as seen from each of these latitudes is then inputted as a separate ‘sheet’ in
one Excel spreadsheet book. A random number generator is used to select one of the
4321-time slots that an event is assigned to take place. The table entries contain all
the visible satellite elevations above the horizon at that location. It is then a simple
matter to subtract these elevations from 90° to convert to equivalent satellite look
angle represented at that location. Next, the spreadsheet randomly assigns a satellite
number, 1–24 to the table entries. The converted look angles associated with satellites
are then compared to the assumed sensor Maximum Look Angle to determine whether
the satellite sensor “sees the event” or not. Of course, the converse is represented
as well—whether a ground-based sensor successfully receives a signal from the
satellite. If the event is seen or the signal is received on the ground, the detection
probability, here assumed to be one, is then multiplied by the input satellite/sensor
reliability, say 0.98. Thus, each satellite deemed to have seen an event or had its
Earth Coverage Model for GPS-Like Capabilities 141
(where Pdn is the initial Probability of Detection and Pdn+1 is the additional Prob-
ability of Detection from the next satellite) and is calculated recursively to include
all satellites detecting an event in the final value of Probability of Detection.
5 Results
The relationship between sensor Maximum Look Angle and average number of
satellites in view can be calculated for each assumed sensor Maximum Look Angle
using a pure geometric calculation and the Monte Carlo sampled almanac results for
the GPS constellation. The results are shown in Fig. 2. The assumption of a uniform
distribution of satellites around the earth as a representation of the GPS constellation
is, in general, a good one, but is better for higher values of sensor maximum look
angles. Note, for instance, that the average number of satellites in view suffers at the
lower maximum sensor look angles starting at 45° and below. The global average
values are good representations for all maximum look angles, but the higher latitudes
10
Average Number of Satllites in View
0
0 10 20 30 40 50 60 70 80 90
Sensor Look Angle
Fig. 2 Satellites in view versus Maximum Look Angle for a 24-satellite constellation
142 V. H. Standley et al.
Fig. 3 Probability density curves from the hypergeometric distribution, Almanac data, and the
DIORAMA
Earth Coverage Model for GPS-Like Capabilities 143
-0.05
0 10 20 30 40 50 60 70 80 90
Look Angle (Degrees)
Fig. 4 Root-mean square (RMS) differences between Hypergeometric (HG), Almanac, and
DIORAMA
As the number of satellites in the constellation increases, the law of large numbers
means that the random approximation is more accurate. A low earth orbit (LEO) nav-
igation capability using GPS-like technology would require many more satellites.
Just like GPS satellites, LEO navigation satellites would transmit precise timing to
near-surface equipment running a Kalman filter [3] where a minimum of four signals
is needed to compute location. Figure 5 shows the probability of receiving less than
four signals from satellite’s overhead as a function of Maximum Look Angle, which
represents the risk of a ground receiver failing to calculate a position solution. An
LEO-based navigation capability would enjoy the benefit of lower power require-
ments due to shorter receiver-satellite distances, better coverage amidst building or
mountains because of more oblique satellites, and greater resilience to anti-satellite
threats [4] for sheer numbers. Finally, because costs are dominated by the number of
fielded spacecraft, the method may also be used to estimate the cost and cost risk [5].
The method is not limited to the case of space-based navigation where four or more
satellites must be in view. The model can be applied, for example, to any capability
180 Sat's
0.01
200 Sat's
160 Sat's
0.001
80 85 90
Maximum Look Angle in Degrees
144 V. H. Standley et al.
where one or more satellites must be in view, such as hypothetical space-based mis-
sile defense, using either kinetic or directed energy, requiring two or more systems
to be in view of all the surface of the earth [6].
7 Conclusion
References
1. Boelitz, C.A., Beck, V.: Orbital Analysis Software Index Final: Report PL-TR-95-1139.
Albuquerque NM (1997)
2. Trimble, Inc., GPS Data Resources, (Online). Available: https://www.trimble.com/Support/
GPD_Data_Resources.aspx. Accessed 16 Apr. 2015
3. Kalman, R.E.: A new approach to linear filtering and prediction problems. Trans. ASME J. Basic
Eng. 82, 35–45 (1960)
4. Everett, T.: OpEd: America’s Vulnerability in Space, 8 Feb. 2007 (Online). Available: https://
spacenews.com/oped-americas-vulnerability-space/
5. U.S. Government Accountability Office.: Global Positioning System: A Comprehensive Assess-
ment of Potential Options and Related Cots is Needed, Report to Congressional Committees,
GAO-13-729. U.S. Government, Washington D.C. (2013)
Earth Coverage Model for GPS-Like Capabilities 145
6. Preston, B., Johnson, D.J., Edwards, S.J., Miller, M., Shipbaugh, C.: Space Weapons Earth Wars.
RAND, Washington D.C (2002)
Computer Networks, Mobility
and Pervasive Systems
CTR Prediction for Optimizing
the Negotiation of Internet Advertising
Campaigns
Abstract Web advertising campaigns have the particularity that allow to measure
the performance of campaigns based on different metrics, among which are the cost
per thousand impressions (CPM-Cost Per mille), cost per click (CPC) and the click-
to-print ratio (CTR-Click Through Ratio). For this reason, each ad has a specific
objective based on these indicators which aim to distribute the purchase of adver-
tising space on the Internet in the best possible way in order to have a better return
on investment based on these metrics. The costs incurred in the development of its
services is significant and the objectives of the campaigns are not always achieved
because it assumes the variability of Internet user behavior. This project consists
of proposing a regression model based on the historical data of the companies pro-
viding the programmatic purchasing service, in order to optimize negotiations on
performance metrics in advertising campaigns with advertisers.
© The Editor(s) (if applicable) and The Author(s), under exclusive license 149
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_13
150 J. Silva et al.
1 Introduction
Today, with globalization and population growth, it is necessary to use the media to
transmit to the segments of interest the idea or product that is being offered, in order
to be competitive in markets that are increasingly larger and more complex. Inter-
net advertising is a trend today, reaching 12% [1] of total advertising expenditures
worldwide.
Within the logistics in which advertising is exposed, there is a no lesser number of
decision variables that the advertiser must take in order to design the web campaigns
[2]. There are firms that are dedicated to optimizing campaigns based on information
captured on the Internet through cookies and the individual’s own data provided by
the individual. When this type of program is not used due to its high cost or lack of
knowledge, the work of the publicist becomes more complex and he must use his
experience to optimize the campaigns [3].
The objective of this study is to generate better returns on advertising investment
using statistical evidence based on historical results, in order to argue for improve-
ments in the process of implementing campaigns based on the Real Time Purchase
(RTB) protocol [4], which consists of the protocol of selling advertising space based
on an auction in real time for those interested in buying it. The result is to evaluate
the differences between the current state and the proposed state.
2 Methodology
At the beginning, an exploratory analysis of the attributes will be carried out, looking
for the most relevant attributes that explain the performance of the advertising cam-
paigns, based on 2 objectives. The first objective of the campaign to be analyzed is the
cost per click, which determines how much money had to be invested for an internet
user to have a positive reaction and decide to click on the ad, the second performance
metric is the click rate on delivered impressions, i.e. how many impressions were
needed for a user to click [10].
For the selection of attributes, different transformations and combinations were
applied, to see which of them provide a better level of explanation of the data based
on a main component analysis. The analysis was used because it reduces the dimen-
sionality of the problem, improving the ability to interpret the attributes that are
maintained.
Once this has been done, the types of advertising campaigns will be grouped by
segments, using the behavior of the effectiveness of the campaigns as a criterion for
distinction according to the decision variables (or attributes) [11]. In other words,
advertising campaigns that are affected in similar ways by the same decision will be
grouped together. The objective of making this segmentation is to be able to divide
the problem into common parts, and then address each sub-problem separately using
the same methodology to be proposed as the term of the report.
Once the attributes (or their transformations) that explain the greater variability of
the data are found, a segmentation of the advertising campaigns will be carried out
based on these same attributes. To perform this segmentation, two different clustering
methods will be applied, being the first one the K-Means algorithm due to the ease
of implementation and the need to use an unsupervised method to compare it with
a supervised one [12]. The second method is a hierarchical agglomerative model,
which is supervised and depends on the experience and knowledge of the business.
The objective behind this is to make a comparison between the two different ways
of segmenting and comparing final results for each of the cases. For evaluating the
unsupervised method of segmentation, the Davies Bouldin Indicator [13] will be
used, which establishes a metric that relates how compact the segments are to the
distance between their centers in the data [14].
152 J. Silva et al.
Finally, the method proposes an analysis of the elasticities of the decision variables
within each of the proposed segments for a disaggregated level of the advertising
campaigns at a daily level. In order to carry out this analysis, linear models are made
with the dependent variable being the three different performance metrics established
(CPC, CTR) and the variables independent from the attributes obtained in the first
stage. The objective is to quantify the level at which each attribute (or transformation)
affects the performance of different segments of advertising campaigns [15].
It is proposed to use a linear regression model within the clusters that were generated
from the advertising strategies, to obtain how much each decision variable affects
the different performance indicators of the advertising campaigns. This model is
proposed because of the interest in knowing how best to affect the performance
of strategies and to quantify their marginal effect on global campaigns. Ease of
implementation, explanation and interpretation are ideal for the development of rules
for different sets of strategies and ease of application [16].
The objective is to predict the behavior of advertising campaigns in order to make
a more adequate projection at the time of negotiation prior to the realization of the
Internet advertisement, to reduce the costs.
3 Results
The data comes from the same study platform which is provided by the Bogota
Colombia Chamber of Commerce. Due to the confidentiality agreement and to main-
tain the same scale of magnitude, all data were standardized in the 0–1 interval
using the following transformation: each attribute is subtracted from the minimum
and divided by the maximum, maintaining the order and scaling the results by a
proportionality factor [17].
The demand-side platform provides up-to-date data on advertising campaigns at
different levels of aggregation, in different metrics and different explanatory dimen-
sions. For the first stage of the project’s design, the monthly aggregated data will be
used, which report the performance of the campaigns during the last 3 months corre-
sponding to the months of July, August and September 2019 due to the availability
of data.
The separation of data and attributes is shown below:
CTR Prediction for Optimizing the Negotiation … 153
Based on these attributes, the following are generated to explain the advertising
campaigns:
• Length: Temporary length of the advertising campaign.
• Speed of expenditure: Number of monetary units per hour.
• Speed of printing: Number of prints per hour.
In the first instance, the model with the attributes described fort the whole universe
of advertising strategies will be evaluated. For this purpose, the CTR will be used as
a dependent variable and the ones obtained in chap 2 as independent variables.
By applying the linear regression on the training data, the coefficients associated
to the mentioned attributes are obtained taking the CTR as the target variable (see
Table 1).
These estimates are obtained based on the method of ordinary least squares (R-
square of 0.82, then the attributes capture 49% of the variance of the data). Each of
the resulting values associated with each attribute will then be analyzed:
• Total_spend_cpm: The positive value emphasizes that the higher the cost of print-
ing, the better the performance in terms of CTR. Probably because more expensive
advertising spaces have better visibility to the end user.
• Contextual_cost: The positive value indicates that the higher the investment in
segmenting sites according to vendor databases, the better the variable in question
is. Although the magnitude of the associated estimator is low compared to the
others.
CTR Prediction for Optimizing the Negotiation … 155
Table 2 Overestimation of
Overestimates by companies 49.2%
performance metrics of real
advertising campaigns versus Overestimates by the model 47.9%
model
• Speed_Impressions: The higher the speed of impressions, the better the result
of the campaign. This is explained by the fact that users could be impacted by
advertising several times in a short time and therefore react to it.
• Speed_Spent: The more money spent, the lower the performance. It is a result of
a non-significant variable.
• Total_spend: Another not very significant parameter; it can be explained by the
fact that people can be independent from the number of appearances and the
visibility is captured by the first parameter and not by this one.
• Length: No major effect on the explanatory variable.
• Impressions: No major effect on the explanatory variable.
In order to evaluate the cost of underestimating advertising campaigns, the number
of times the model underestimates the campaigns in relation to what is done by the
companies under study is compared (see Table 2).
The results are shown below after the segmentation in the advertising campaigns.
As in the results without segmentation, the costs of overestimating the campaigns
will be presented first, then the cost of underestimating the campaigns and finally
including the results in order to evaluate the model. Again, the dependent variable
will be the CTR and the independent variables will be those obtained in chap 2.
156 J. Silva et al.
Table 3 About the estimation of the performance costs of real advertising campaigns versus model
Segment % Campaigns % Campaigns Cost companies Cost Model
Underestimated Underestimated [UM] [UM]
companies (%) Model (%)
Constant 40 42 155.78 180.47
advertising
Premium 63 55 270.14 260.33
promotion
Experimentation 53 50 300.77 286.06
4 Conclusions
References
1. Aladag, C., Hocaoglu, G.: A tabu search algorithm to solve a course timetabling problem.
Hacettepe J. Math. Stat. 53–64 (2007)
CTR Prediction for Optimizing the Negotiation … 157
2. Moscato, P.: On evolution, search, optimization, genetic algorithms and martial arts: towards
memetic algorithms. Caltech concurrent computation program (report 826) (1989)
3. Frausto-Solís, J., Alonso-Pecina, F., Mora-Vargas, J.: An efficient simulated annealing
algorithm for feasible solutions of course timetabling. pp. 675–685. Springer (2008)
4. Joudaki, M., Imani, M., Mazhari, N.: Using Improved Memetic Algorithm and Local Search
to Solve University Course Timetabling Problem (UCTTP). Islamic Azad University, Doroud,
Iran (2010)
5. Coopers, P.W.H., IAB internet advertising revenue report. URL: http://www.iab.net/insights_
research/industry_data_and_landscape/adrevenuereport (2014)
6. Tuzhilin, A.: The Lane’s Gifts v. Google Report. Official Google blog: Findings on invalid
clicks. pp. 1–47 (2006)
7. Ponce, H., Ponce, P., Molina, A.: Artificial Organic Networks: Artificial Intelligence Based on
Carbon Networks. Studies in Computational Intelligence, vol. 521. Springer (2014)
8. Ponce, H., Ponce, P., Molina, A.: A new training algorithm for artificial hydrocarbon networks
using an energy model of covalent bonds. 7th IFAC Conf. Manuf. Model. Manag. Control.
7(1), 602–608 (2013)
9. Moe, W.W.: Targeting display advertising. Advanced database marketing: Innovative method-
ologies & applications for managing customer relationships. Londres: Gower Publishing
(2013)
10. Stone-Gross, B., Stevens, R., Zarras, A., Kemmerer, R., Kruegel, C., Vigna, G.: Understanding
fraudulent activities in online ad exchanges. In: Proceedings of the 2011 ACM SIGCOMM
Conference on Internet Measurement Conference, pp. 279–294. ACM (2011)
11. McMahan, H.B., Holt, G., Sculley, D., Young, M., Ebner, D., Grady, J. Kubica, J.: Ad click
prediction: a view from the trenches. In: Proceedings of the 19th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, pp. 1222–1230. ACM (2013)
12. Ponce, H., Ponce, P.: Artificial organic networks. In: IEEE Conference on Electronics, Robotics,
and Automotive Mechanics CERMA, pp. 29–34. (2011)
13. Kuhn, M.: Building predictive models in R using the caret package. J. Stat. Softw. 28(5), 1–26
(2008)
14. Granitto, P.M., Furlanello, C., Biasioli, F., Gasperi, F.: Recursive feature elimination with
random forest for PTR-MS analysis of agroindustrial products. Chemometr. Intell. Lab. Syst.
83(2), 83–90 (2006)
15. Kuhn, W., Wing, J., Weston, S., Williams, A., Keefer, C., et al.: Caret: Classification and
Regression Training. R package, vol. 515. (2012)
16. Miller, B., Pearce, P., Grier, C., Kreibich, C., Paxson, V.: What’s clicking what? Techniques and
innovations of today’s clickbots. In: Detection of Intrusions and Malware, and Vulnerability
Assessment, pp. 164–183. Springer (2011)
17. Kamatkar, S. J., Tayade, A., Viloria, A., Hernández-Chacín, A.: Application of classification
technique of data mining for employee management system. In International Conference on
Data Mining and Big Data, pp. 434–444. Springer, Cham (2018, June)
18. Kamatkar, S.J., Kamble, A., Viloria, A., Hernández-Fernandez, L., Cali, E.G.: Database per-
formance tuning and query optimization. In: International Conference on Data Mining and Big
Data, pp. 3–11. Springer, Cham (2018, June)
Classification of Authors
for a Recommendation Process
Integrated to a Scientific Meta-Search
Engine
Abstract The search for scientific production on the web has become a challenge,
both in terms of volume, variety and updating speed. It requires tools that help the
user to obtain relevant results when executing a query. Within these tools, this team
has developed a specific meta-search engine for the area of computer science. In its
evolution, it is intended to include recommendations from authors for each of its
users’ queries. The generation of such recommendations requires a method capable
of classifying the authors in order to define their inclusion and position in a list of
suggestions for the end-user. This paper presents a method that fulfills this objective,
after being evaluated and having obtained results that allow to propose its inclusion
in later development of the recommendation system.
© The Editor(s) (if applicable) and The Author(s), under exclusive license 159
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_14
160 A. Viloria et al.
1 Introduction
The recovery of scientific production from the web is probably one of the most impor-
tant challenges of scientific activity today [1]. The large volume of data available,
its heterogeneity and its constant updating speed make it necessary to have tools
that facilitate access to relevant information when faced with a particular query.
In response to this situation, an Information Retrieval System (IRS) was devel-
oped, specifically a domain-specific meta-search engine, for the retrieval of scientific
publications and data related to the computer sciences [2].
These types of tools are not static but are constantly evolving to provide more
relevant and quality results to their users without harming their overall performance.
Examples of this are the ranking algorithms [3], as well as the automatic generation
of query expansions [4].
In this context, one of the improvements proposed for the IRS [5] is the creation
of a method that allows the recommendation of authors related to a user’s query,
in order to reduce waiting times while the meta-search engine executes queries on
external sources, thus generating a complementary response of potential interest to
the user.
With this aim, three main tasks were identified to be solved beforehand: the sys-
tematic and automated collection of primary data [6], the need to develop a structure
that is capable of containing the collected metadata in an organized way [7], and the
classification of authors. The objective of the latter is to describe and synthesize the
trajectory of each author with respect to a research area, evaluating aspects such as
activity, validity, specificity within a specific theme and its impact on the scientific
community, among other questions.
The purpose of this paper is to define a classification method for a scientific author
recommendation system, considering metrics and indexes used in the academic field
for the evaluation of authors and their production.
The systematization of the primary data retrieval for the author classification method
was structured on the basis of the previous study on the meta-search engine. The
procedures of Extraction, Transformation and Loading (ETL) of the data of the
entities involved in the processes of the meta-search engine were used [8, 9].
Classification of Authors for a Recommendation … 161
In [10], all the possible evaluable aspects of a scientific author are described, detailing
for each case the techniques available and most used for their quantification. Table 1,
which summarizes the most relevant aspects for the evaluation of the trajectory, was
created in [11].
Bibliometric indices are known and used by the whole scientific community in
general. Since each indicator may present advantages and disadvantages in its use,
it has become common in the community to adopt more than one indicator in the
evaluation of authors [12]. Following this thinking, this study proposes the use of a
combination of strategically organized indices that allow the evaluation of more than
one relevant aspect. Thus, in order to develop a set of primary and derived metrics
from the most known bibliometric indices for the evaluation of authors, it is proposed
to use the following indices:
Average Impact Index (AII): In order to generate an index that reflects a unified
impact of an author’s production, the H, G and i10 indices [13] of a sample of 1478
authors were analyzed. From this analysis, the correlation between these indexes
in reflecting the authors’ trajectory was observed, because all of them are based on
the number of citations that the author’s publications have obtained. Observing this
situation, the authors propose an index that averages the previous ones, obtaining a
simplified index for the evaluation of the author defined by Eq. (1) [14].
AII(an ) = [indice H (an ) + indice G(an ) + indice I 10(an )] 3 (1)
Longevity Index (LI): this index is proposed in order to represent the author’s
academic life. This index Eq. (2) is defined as the difference between the last year
of publication and the year of first publication [15].
Relative Diversity Index (RDI): The diversity index (DI) defined in [17] attempts
to reflect the degree of participation that an author has in relation to various fields
of research within a science or area of knowledge. In this index, the highest values
correspond to those authors who have a high degree of participation in various fields.
In order to evaluate the diversity of an author according to a given context, an index
is proposed that calculates the degree of diversity of an author with respect to other
authors Eq. (4). To this end, the distance between the highest diversity index of a
collection and a given author is calculated, so that the closest and the furthest are
close to 1 and 0, respectively [18].
ID(an )
IDR(an ) = (4)
max (ID(a1 ), ID(a2 ), . . . , ID(az ))
(c) AII greater than or equal to 150% of the standard deviation value obtained from
the series of AII of all authors.
Expert Authors: Those who have worked on projects in a particular field and are
referenced in the same due to the impact of their work. Restrictions:
(d) The author’s RDI must be below 45%. Excluding from the calculation the values
that exceed the Upper Limit considered abnormal values.
(e) The AII must be higher than the 40th percentile of the AII of all authors,
excluding values that exceed the Upper Limit because they are considered
anomalous.
Trending Authors: Authors who have produced new or innovative papers in a field
of knowledge that has provided them with a considerable impact on the community
in recent years. Restrictions:
(f) The author cannot be a trend maker if he or she complies with the restrictions
of an expert author.
(g) The PRbTW of the last 5 years must be greater than the value of his entire career.
(h) The AII of the author must be greater than the first quartile (1Q) of the AII of
all authors who meet the condition (g).
Authors with Trajectory: Those authors who have developed a career as
researchers and have made contributions with impact within the sciences of the
scientific community. Restrictions:
(i) AII must be greater than the second quartile (2Q) of the PRI of all authors.
One Hit Wonder Authors: These are those authors who have made an impact on the
community for a limited time, but no continuity has been observed in their scientific
work, at least as far as publications of their authorship are concerned. Restrictions:
• The Longevity Index should be equal to 1 year.
• The AII should be greater than the median or 2Q of the AII of all authors with
longevity of less than or equal to 5 years.
Unclassified authors: These authors do not correspond to any of the above group-
ings; therefore, it was decided to group them into a class that would allow further
studies.
Although it can be preliminarily concluded that the classification process may consist
of the direct application of axioms on a set of authors, to do so without a strategy
that allows the calculation of several indices and the verification of all the conditions
for each of the classes would be an inefficient use of the calculation process [2].
Additionally, if there are more specific classes in the evaluation of authors, which is
164 A. Viloria et al.
reflected in the number of indices used and the acceptance thresholds, some classes
are more specific than others that evaluate more general aspects.
In order to solve these questions, an ad hoc Boolean decision tree author classifi-
cation algorithm is proposed that, given a specific sequence in the evaluation of the
available data, allows an efficient classification (see Table 2).
In the literature of the area, it could be observed that the classification methods are
generally evaluated according to two dimensions: the classification scheme itself and
the classification decisions [20].
In [21], it is argued that when a classification scheme has the lowest possible
degree of uncertainty, the more effective its classification decisions will be. This is
achieved when one has the greatest knowledge about the domain in which it is being
developed. For this reason, an evaluation of the scheme was carried out by analyzing
the degree of uncertainty for each dimension:
Classification of Authors for a Recommendation … 165
• Purpose: Authors’ properties for generating the classification are based on widely
used bibliometric indexes and can be generated from knowledge of any author’s
publications and number of citations.
• Class: Because the classification is proposed in this paper, all restrictions defined
by each class are known, so it is clear and precise.
• Schematic: There is an average degree of uncertainty in this dimension because
there is no single established standard that allows for a widely accepted definition
by the community.
For the evaluation of classification decisions, the approach proposed in [21] was
followed, which proposes to evaluate the goodness of fit of each class when evaluating
authors. In this case, the evaluation process consisted of the execution of a series of
automatic classification algorithms on a set of previously classified authors’ data
using the method proposed in this paper. The objective of this task was to verify if
an automatic method could be trained based on the generated classification and then
to evaluate the effectiveness of the results.
Following this approach, a database of authors extracted from the MAS and
AMiner platforms was set up using an automated ETL process developed for the
meta-search engine. In this way, the dataset was made up of a total of 3451 author
profiles following the structure defined in [5]. Later, a series of classification methods
were selected, some of them from the TDIDT2 family as they are: C4.5, Random
Forest, Simple CART and Rule Induction (RI), together with a multilayer percep-
tual neural network and a Bayesian classifier implemented in the WEKA tool. The
parameters of the methods used were established with the default values set by the
tool, provided that the dataset did not require any kind of adjustment due to its
characteristics.
The results obtained from the training-testing process (70/30 ratio of the dataset)
of the mentioned methods are detailed in Table 3.
For the recall or exhaustiveness, it is observed that the classes Trend and OHW
present the lowest percentage of effectiveness with respect to the classes Top and
New, respectively, this is probably due to the fact that these classes are similar in
certain aspects, however, the restrictions established by class define their belonging
to one or another.
4 Conclusions
A method for classifying scientific authors was generated within the framework of
an IRS in the area of computer science. The method presented includes the definition
of a series of classes that represent different stages in the career of a researcher,
considering diverse factors such as the impact generated, their specialization and
their trajectory. The development presented was validated in terms of its definition
and relevance, and on a dataset in which the classification was applied, automatic
classification algorithms were tested, obtaining results of high effectiveness and low
error rate.
References
1. Schler, J., Koppel, M., Argamon, S., Pennebaker, J. W.: Effects of age and gender on blogging.
In: Computational Approaches to Analyzing Weblogs, Papers from the 2006 AAAI Spring
Symposium, Technical Report SS-06-03, Stanford, California, USA, March 27–29 (2006) pp
199–205
2. Argamon, S., Koppel, M., Pennebaker, J.W., Schler, J.: Automatically profiling the author of
an anonymous text. Commun. ACM 52(2), 119–123 (2009)
3. Peersman, C., Daelemans, W., Van Vaerenbergh, L.: Predicting age and gender in online social
networks. In: Proceedings of the 3rd International Workshop on Search and Mining User-
generated Contents, New York, USA, ACM (2011) pp. 37–44
4. Nguyen, D., Gravel, R., Trieschnigg, D., Meder, T.: “how old do you think i am?”: A study of
language and age in twitter. In: Proceedings of the Seventh International AAAI Conference on
Weblogs and Social Media. ICWSM 2013 (2013)
5. Rangel, F., Rosso, P.: Use of language and author profiling: Identification of gender and age.
In: Proceedings of the 10th Workshop on Natural Language Processing and Cognitive Science
(NLPCS-2013) (2013)
6. Bedford, D.: Evaluating classification schema and classification decisions. Bull. Am. Soc. Inf.
Sci. Technology 39, 13–21 (2013)
7. Toutanova, K., Klein, D., Manning, C., Singer, Y.: Feature-rich part-of-speech tagging with
a cyclic dependency network. In: Human Language Technology Conference (HLT-NAACL
2003) (2003)
8. Viloria, A., Lis-Gutiérrez, J. P., Gaitán-Angulo, M., Godoy, A. R. M., Moreno, G. C., Kamatkar,
S. J.: Methodology for the design of a student pattern recognition tool to facilitate the teaching—
learning process through knowledge data discovery (big data). In: Tan, Y., Shi, Y., Tang, Q.
(eds.) Data Mining and Big Data. DMBD 2018. Lecture Notes in Computer Science, vol.
10943. Springer, Cham (2018)
9. Tang, J.: AMiner: Mining deep knowledge from big scholar data. In: Proceedings of the 25th
International Conference Companion on World Wide Web. International World Wide Web
Conferences Steering Committee, Republic and Canton of Geneva, Switzerland pp. 373–373
(2016)
Classification of Authors for a Recommendation … 167
10. Obit, J. H., Ouelhadj, D., Landa-Silva, D., Vun, T. K., Alfred, R.: Designing a multi- agent
approach system for distributed course timetabling, pp. 103–108, https://doi.org/10.1109/his.
2011.6122088 (2011)
11. Lewis, M. R. R.: Metaheuristics for university course timetabling. Ph.D. Thesis, Napier
University (2006)
12. Deng, X., Zhang, Y., Kang, B., Wu, J., Sun, X., Deng, Y.: An application of genetic algorithm
for university course timetabling problem, pp. 2119–2122, https://doi.org/10.1109/ccdc.2011.
5968555 (2011)
13. Mahiba, A.A., Durai, C.A.D.: Genetic algorithm with search bank strategies for university
course timetabling problem. Procedia Eng. 38, 253–263 (2012)
14. Adomavicius, G., Tuzhilin, A.: Toward the next generation of recommender systems: A survey
of the state-of-the-art and possible extensions. IEEE Trans. Knowl. Data Eng. 17, 734–749
(2005)
15. C. & Sotelo-Figueroa, M. A., Castillo, O., Melin, P., Pedrycz, W., Kacprzyk, J.: Generic
memetic algorithm for course timetabling. In: ITC2007 Recent Advances on Hybrid
Approaches for Designing Intelligent Systems, Springer, vol. 547, pp. 481–492 (2014)
16. Nguyen, K., Lu, T., Le, T., Tran, N.: Memetic algorithm for a university course timeta-bling
problem. pp. 67–71. https://doi.org/10.1007/978-3-642-25899-2_10 (2011)
17. Aladag, C., Hocaoglu, G.: A tabu search algorithm to solve a course timetabling problem.
Hacet. J. Math. Stat., pp. 53–64 (2007)
18. Moscato, P.: On evolution, search, optimization, genetic algorithms and martial arts: Towards
memetic algorithms. Caltech Concurrent Computation Program (report 826) (1989)
19. McGrail, M.R., Rickard, C.M., Jones, R.: Publish or perish: a systematic review of interventions
to increase academic publication rates. High. Educ. Res. Dev. 25, 19–35 (2006)
20. Costas, R., van Leeuwen, T.N., Bordons, M.: A bibliometric classificatory approach for the
study and assessment of research performance at the individual level: The effects of age on
productivity and impact. J. Am. Soc. Inf. Sci. 61, 1564–1581 (2010)
21. Sinha, A., Shen, Z., Song, Y., Ma, H., Eide, D., Hsu, B.-J. (Paul), Wang, K.: An overview of
microsoft academic service (MAS) and applications. In: Proceedings of the 24th International
Conference on World Wide Web. pp. 243–246. ACM, New York, USA (2015)
22. Torres-Samuel, M., Vásquez, C., Viloria, A., Lis-Gutiérrez, J. P., Borrero, T. C., Varela, N.
(2018, June). Web visibility profiles of Top 100 Latin American universities. In: International
Conference on Data Mining and Big Data. pp. 254–262. Springer, Cham
Performance Evaluation of a Hybrid
Vehicle and Sensor Network to Prevent
Traffic Accidents
1 Introduction
Research into short-range technologies has increased in recent years [1, 2]. Ad hoc
networks have therefore received more attention because of the ease of deployment
they entail. An ad hoc network [3] is formed by a group of nodes that communicate
with each other with a wireless interface and can work both with fixed infrastructure
and without any kind of infrastructure. There are two types of ad hoc networks in the
environment in which this work is proposed: the wireless sensor networks (WSNs) [4]
and the vehicular ad hoc networks (VANETs) [5]. Both are ad hoc networks capable
J. Silva (B)
Universidad Peruana de Ciencias Aplicadas, Lima, Peru
e-mail: [email protected]
N. Varela
Universidad de La Costa (CUC), Barranquilla, Colombia
e-mail: [email protected]
O. B. P. Lezama
Universidad Tecnológica Centroamericana (UNITEC), San Pedro Sula, Honduras
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 169
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_15
170 J. Silva et al.
• For each road segment, there is a header field (2 bits). The data encoding is: 0 =
good condition, 1 = ice, 2 = rain, and 3 = accident.
• A packet containing a low-resolution image (approximately 50 kbytes) of the next
crossing within its path is transmitted.
• In case there is new information related to the condition of the road, the WSN is
responsible for updating this information in its database.
• The vehicle leaves the transmission range of the WSN sink and the connection
ends.
• Road information is transmitted regarding all those segments that are within the
route of vehicle B to its destination and also road information regarding roads that
have other routes.
• A packet containing a low-resolution image (approximately 50 kbytes) of the next
crossing within its path is transmitted.
172 J. Silva et al.
the WSN sink sensor must take place in such a way that T required < T available . The
previous issues show that it is possible. The illustration of these intervals can be
found in Fig. 1. In addition, more images from other intersections can be sent later,
since there is still time until the end of coverage.
Table 1 Simulation
Node speed 40–80 km/h
parameters
Number of lanes in the track 4 (two in each direction)
Size of the road 2 km
Number of mobile nodes in the 4
VANET
Number of nodes in the WSN 1 sink node
Transmission ranges 200 m
Routing protocol in the HSVN AODV and DSR
Packet size 520, 1120 y 1500 octets
Simulation time 80 s
Data transmission 1Mbps
MAC IEEE 802.11b
Nominal capacity 12 Mbps
of all the nodes it must pass through to reach its destination in the packet header.
In AODV, the packet only includes the destination address and the address of the
next hop to follow, in addition to using a small routing table of neighboring nodes.
These protocols were used because they are the ones implemented in the NCTUns
simulator.
In addition, a confidence interval of 80% is presented for the values obtained,
where five simulations were carried out for each scenario. Figure 2 shows the evolu-
tion of packet loss using the AODV protocol. Figure 3 shows the packet loss using
the DSR protocol. According to the results, it can be seen that AODV has a good
behavior in the case of low speeds (less than 80 km/h), so it would be an ideal pro-
tocol if used in city scenarios where speeds are usually moderate. In the case of the
DSR protocol, it has a low loss rate compared to AODV in the case of using high
speeds, using 1000-octet packets that produce fewer losses.
4 Conclusions
This paper shows the behavior of the AODV and DSR protocols’ packet loss in
an HSVN that includes the proposed communication protocol between WSN and
VANET. The result of the simulation shows the efficiency of AODV for low speed
(city) and DSR scenarios in high speed (highway).
References
1. Ye, Q., Zhuang, W.: Distributed and adaptive medium access control for internet-of-things-
enabled mobile networks. IEEE Internet Things J. 4(2), 446–460 (2017)
2. Agencia Nacional de Regulación y Control del Transporte Terrestre: Proyecto Seguridad
Integral para el Transporte Público y Comercial, Ecuador (2015)
3. Delgado, C., et al.: Joint application admission control and network slicing in virtual sensor
networks. IEEE Internet Things J. 5(1), 28–43 (2018)
4. Alamri, A., Ansari, W. S., Hassan, M. M., Hossain, M. S., Alelaiwi, A., Hossain, M. A.: A
survey on sensor-cloud: Architecture, applications, and approaches. Int. J. Distrib. Sens. Netw.
9(2) (2013)
5. Giraldo, M. A.: Estudio y Simulación de Redes Ad-Hoc Vehiculares VANETS. Universidad
Católica de Pereira Ingeniería de Sistemas y Telecomunicaciones (mayo de 2013)
6. Hernandez, J.: AUTOEMOTIVE, bringing empathy to the driving experience to manage stress.
MIT Media Lab, Cambridge (2014)
7. Hernández, J.V.: Redes inalámbricas de sensores: una nueva arquitectura eficiente y robusta
basada en jerarquía dinámica de grupos. Editorial Universitat Politècnica de València, Valencia
(2010)
8. Beng, L. H.: Sensor Cloud: Towards Sensor-Enabled Cloud Services. Intelligent Systems
Center Nanyang Technological University (2009)
9. Consuegra, M.C.: Conectando los vehículos a Internet en el sistema de transporte inteligente
estandarizado por el ETSI. Departamento de Ingeniería Telemática, Leganés (2014)
10. ESEC: Introducción a las Redes de Sensores Inalámbricas. Plataforma Tecnológica Española,
España (2014)
176 J. Silva et al.
11. Misra, S., Chatterjee, S., Obaidat, M.S.: On theoretical modeling of sensor cloud: A paradigm
shift from wireless sensor network. IEEE Syst. J. 11(2), 1084–1093 (2017)
12. Fundación Comisariado Europeo del Automóvil: Informe sobre la influencia de la fatiga y el
sueño en la conducción. Fundación CEA (2015)
13. Kong, F., Tan, J.: A collaboration-based hybrid vehicular sensor network architecture. In: IEEE
International Conference on Information and Automation. Zhangjiajie, China (2008)
14. Joyanes, L.: Computación en la nube. Estrategias de Cloud Computing en las empresas,
Alfaomega (2012)
15. Zhao, J., Cao J.: VADD: Vehicle-assisted data delivery in vehicular ad hoc networks. In: 25th
IEEE International Conference on Computer Communications, pp. 1–12. INFOCOM (2006)
16. Viloria, A., Robayo, P.V.: Virtual network level of application composed IP networks connected
with systems-(NETS peer-to-peer). Indian J. Sci. Technol. 9, 46 (2016)
17. Martínez, R.F., Meré, J.O.: Redes inalámbricas de Sensores: Teoría y Aplicación Práctica.
Grupo de Investigación EDMANS-Universidad de la Rioja, España (2009)
18. Scanaill, M. J.: Sensor technologies, healthcare, wellness and environmental applications.
Apress Open. Int. J. Comput. Appl. 14(103) (2013)
19. Amelec, V.: Increased efficiency in a company of development of technological solutions in
the areas commercial and of consultancy. Adv. Sci. Lett. 21(5), 1406–1408 (2015)
20. Jiang, D., Delgrossi, L.: IEEE 802.11p: Towards an international standard for wireless access
in vehicular environment. In: 67th IEEE Vehicular Technology Conference VTC. Singapore
(2008)
Comparison of Bio-inspired Algorithms
Applied to the Hospital Mortality Risk
Stratification
J. Silva (B)
Universidad Peruana de Ciencias Aplicadas, Lima, Peru
e-mail: [email protected]
Y. Herazo-Beltrán
Universidad Simón Bolívar, Barranquilla, Colombia
e-mail: [email protected]
F. Marín-González · N. Varela
Universidad de La Costa (CUC), Barranquilla, Colombia
e-mail: [email protected]
N. Varela
e-mail: [email protected]
O. B. P. Lezama
Universidad Tecnológica Centroamericana (UNITEC), San Pedro Sula, Honduras
e-mail: [email protected]
P. Palencia
Corporación Universitaria Minute de Dios. UNIMINUTO, Barranquilla, Colombia
e-mail: [email protected]
C. V. Mercado
Corporación Universitaria Latinoamericana, Barranquilla, Colombia
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 177
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_16
178 J. Silva et al.
1 Introduction
Artificial neural networks (RRs) are calculation systems that resemble biological
neural networks when using interconnected nodes (neurons). These nodes receive
the information, perform operations on the data, and transmit their results to other
nodes. The procedure is to train the RFs to learn complex patterns of relationships
between the predictor and outcome variables, and they are able to face new data by
giving the expected answers [1].
They are defined as nonlinear, flexible, and highly generalized systems. These
properties have led to their dissemination in all scientific fields and for their equiv-
alence or superiority to some statistical techniques to be demonstrated. Interest in
the application of RNAs in medicine over the past 10 years has only increased,
as reflected in the progressively increasing number of publications that include this
methodology. The areas they have been occupying are image recognition, wave anal-
ysis, pharmacology procedures, epidemiology, prediction of results, and diagnostic
processes [2, 3].
The use of RFs for risk stratification offers as an advantage a possible increase
in predictive power (accuracy), which has been assessed by 5–10%, as they do not
work with the rigid limitations of statistical models. Compared to RL techniques,
RRs take into account nonlinear relationships, automatically, without the need to
follow a particular model, and the possible interdependence of input variables [4].
Intensive care unit (ICU) is commonly used for probability of death calculation
systems (as a criterion of severity for the sick), and one of the most common systems
is acute physiology and Chronic Health Evaluation II (APACHE II) built with RL
technique. The objectives of our work are to demonstrate the usefulness of the neural
network-based methodology for risk stratification, applying it to the calculation of
probability of hospital mortality, using the APACHE II system variables in ICU (as
a sample of study). A logistic regression model is used for reference.
2 Methodology
2.1 Subject
The study was carried out in a multipurpose ICU in Colombia. Patients have been
studied over a 5-year period (2010–2015). Coronary patients, heart surgery subjects,
and burns are not included. Patients under the age of 16 have been excluded, those
who have moved and those who have stayed less than 24 h admitted. Only the first
admission has been taken into account in patients who re-enter. The demographic,
evolution, and severity variables necessary for the calculation of the APACHE II
system have been collected prospectively by a trained team. The conduct of the study
was approved by the hospital’s ethics committee ensuring at all times the anonymity
of patients [1].
Comparison of Bio-inspired Algorithms Applied … 179
2.2 Variables
14 physiological variables are used (extended from 12 to 14, since to assess oxygena-
tion we use PaO2 , plus FiO2 and PaCO2), age and two variables to determine score
according to chronic disease (chronic disease and urgent/programmed) that com-
plete 17 input variables. The output variable is hospital mortality. The calculation
of the probability of death based on APACHE II is done as standard, converting the
APACHE II score and applying the logistic formula with the coefficients published
in the original article of [5]; adjustment by diagnostic groups as it would motivate the
addition of more than 40 variables. The 2325 patients who met the inclusion criteria
were randomly assigned, 75% to the development group, and the remaining 25% to
the validation group.
As the number of cases available for the development of the model is limited, there
is a risk that they will have poor representativeness of the population; therefore, we
must use techniques that optimize the available data to achieve a good generalization.
As a solution, we apply resampling techniques (bootstrap) that have proven useful
for this purpose. In our case, to achieve sufficient accuracy, this resampling must be
repeated at least 300 times [6].
A multiple logistic regression model is used with the addition of all variables (full
model). The calculation will be made on the 300 bootstrap samples in the develop-
ment group. The resulting 300 models (their coefficients) will be used to calculate
the probabilities in the original development set. With these 300 probabilities we
calculate the average probability, expressed as P-RL-D, and its standard error [7].
Supervised training involves the repeated presentation of the training set to the
network; in each iteration, an adjustment of the weights is made to minimize the
network error function. Weights are the internal values of the network that resemble
the synaptic forces of biological models. The evaluated cost function or error function
(both in the training and verification set) is the root of the mean quadratic error
(ECM) between the predictions and the actual values. Nodes are added or removed
from the hidden layer until the ECM (in the verification set) is minimized, which
also determines the time to stop training. Other parameters that are modified during
the training process (learning coefficient, moment, etc.) are adjusted to achieve this
optimization [9].
The training conditions set out in the previous point will be used to train 300 networks
with the data of the 300 bootstrap resamples of the development set. When these
networks are faced with data from the original development set, they determine 300
probabilities and their mean is called P-RNA-D [10].
Both the 300 logistic regression models and the 300 trained networks must face data
from the validation set. The calculated average probabilities will be identified as
P-RL-V and P-RNA-V, respectively [11].
3 Results
Artificial neural network model The selection method led us to an optimal architecture
with 9 nodes in the hidden layer and fully interconnected nodes. The starting point
of the training was set at 1500 iterations. The parameters of the network training
process were a learning coefficient of 0.01 and the time of 0.3.
Table 1 shows the results of the comparison between the various models. Good results
are appreciated, both in discrimination and calibration, of the APACHE II system
(in the development and validation set). Significantly higher values are observed in
the ABC ROC RNA compared to the APACHE II model. The RNA, compared to
the RL model, shows better values (which are maintained in the validation group) in
both discrimination and calibration, although these values do not reach a significant
difference. Figure 1 shows the ROC curves and calibration curves for the validation
group.
P-AP-II: probability of the APACHE II model (confidence interval [IC] calculated
according to Hanley and McNeil’s work); P-RL: average probability of 200 bootstrap
logistic regression models; P-RNA: average probability of 200 bootstrap models of
artificial neural network; development: n × 800 patients; validation: n × 346; ABC:
area under the ROC curve (95% CI); HL-C: Hosmer-Lemeshow C test with 8 degrees
of freedom for the development group and 10 for the validation group (p > 0.05
determines a correct test); RME: standardized mortality ratio (95% CI).
Table 1 Comparison of
P-AP-II P-RL P-RNA
results of the different models
of probability of death ABC (IC of
calculation the 95%)
Development 0.82 0.81 0.87
(0.77–0.83) (0.79–0.85) (0.84–0.91)
Validation 0.80 0.82 0.81
(0.74–0.83) (0.75–0.83) (0.78–0.83)
HL-C (p)
Development 17.44 (0.040) 12.23 (0.132) 6.68 (0.468)
Validation 12.38 (0.295) 29.58 (0.001) 11.32 (0.325)
RME (IC del
95%)
Development 1.08 1.04 1.02
(0.95–1.21) (0.96–1.20) (0.98–1.10)
Validation 1.21 1.17 1.14
(1.04–1.30) (1.01–1.23) (0.98–1.19)
182 J. Silva et al.
Fig. 1 ROC curves and calibration curves in the validation group. a ROC curves. b Calibration
curves. Single line: Probability APACHE II; dashed line: Average probability of the bootstrap
logistic regression model; thick line: Average probability of the bootstrap artificial neural network
model
The Bland–Altman technique (Fig. 2) shows us the lack of consistency in the proba-
bility assignment between the RL and RNA models (results shown in the validation
set). The highest match tends to occur at the low values of the probability range
and is lost by exceeding the calculated 36% chance of death. 95 patients (7%) were
identified from the total study group as extreme cases. It is difficult to analyze the
interrelationship between variables, but we find that in the subgroup of these patients
where the probability assigned by RL is clearly higher than that calculated by RNA
(42 patients), most (43 patients) have neurological alterations, and we appreciate that
the Glasgow variable becomes more important in the RL model while maintaining
similar values for the rest of the variables.
Comparison of Bio-inspired Algorithms Applied … 183
Fig. 2 Bland–Altman test (validation group) between the probabilities calculated by the logistic
regression method versus the probabilities calculated by artificial neural network model. The dotted
lines differentiate (above or below) to 2 standard deviations—the mean of the difference between the
probabilities; P-RNA-V: Average probability of 300 bootstrap trained networks; P-RLV: Average
probability of 300 bootstrap logistic regression models
4 Conclusions
The first analysis of our results is aimed at the good results found with the APACHE
II model, since this fact did not coincide with other results that we had obtained with
smaller series that analyzed less years in our database. Our ICU is characterized by
fewer surgical patients scheduled and more mortality than the series that originally
served to make the APACHE II system. We used this argument to justify, above all,
deviations in calibration, which is almost optimal now that we can analyze more
patients. This supports the concept of the large dependence of the sample size on any
risk stratification analysis.
The high mortality found in our series is also conditioned by not including coro-
nary patients. We were unable to include them due to follow-up care issues, given
the characteristics of this group of patients’ care in our hospital. As a global result, in
our work we find better results with the RNA-based methodology, although they do
not become significant. This result is similar to that achieved with other series. In a
review conducted by [13], which analyzed 28 studies in cancer patients, it concludes
that the networks are equivalent to or slightly higher than RL, as they do not have to
rely on rigid requirements for variable or model independence Linear.
We also see that despite using resampling and cross-validation techniques we have,
in our series, some “overlearning” problem: The network learns the patterns of the
training set very precisely, but loses in the ability to generalization when faced with
new data from the validation set. Working with networks, the conditions necessary
to achieve a good generalization focus on three aspects: (a) that the information
collected in the data is sufficient (this affects the size of the series and the quality in
the collection of data); (b) that the “function” learned by the network is smooth (small
184 J. Silva et al.
changes in input variables will cause small changes in the output variable), and (c)
that the size of the training set is sufficient and representative of the total data. The
required size is determined by the number of network parameters, and 5 records are
required per estimated parameter. In our example with 17 input variables, 9 hidden
nodes, and one output node (which are 162 parameters), 800 cases are sufficient [14].
The algorithm we propose meets these conditions when working with limited
series and can be applied in another type of population or health problem. There are
other procedures based on different resampling and learning techniques that have
been applied in other populations. Obtaining similar results, in the properties of
discrimination and calibration with statistical and neural prediction models, has led
some authors to claim that the relationship between variables is independent and
virtually linear [15].
We provide the view that being able to obtain different individual probabilities
implies that the relationship between variables is different when applying RL or
RNA. It is true that the interpretation of this interrelationship is difficult (black box
concept of RNA) [16], but we can study patients who define themselves as extreme
cases (patients with neurological problems in our series), or compare the different
behavior according to diagnostic groups (e.g., our different outcomes in traumatic
and COPD patients).
References
1. Sargent, D.J.: Comparison of artificial neural networks with other statistical approaches results
from medical data sets. Cancer 91, 1636–1642 (2001)
2. Bifet, A., De Morales, G. F: Big data stream learning with Samoa. Recuperado de (2014). https://
www.researchgate.net/publication/282303881_Big_data_stream_learning_with_SAMOA
3. Clermont, G., Angus, D.C., DiRusso, S.M., Griffin, M., Linde-Zwirble, W.T.: Predicting hos-
pital mortality for patients in the intensive care unit: A comparison of artificial neural networks
with logistic regression models. Crit. Care Med. 29, 291–296 (2001)
4. Wong, L.S.S., Young, J.D.: A comparison of ICU mortality prediction using the APACHE II
scoring system and artificial neural network. Anaesthesia 54, 1048–1054 (1999)
5. Bravo, M., Alvarado, M.: Similarity measures for substituting web services. Int. J. Web Serv.
Res. 7(3), 1–29 (2010)
6. Chen, L., Zhang, Y., Song, Z.L., Miao, Z.: Automatic web services classification based on
rough set theory. J. Cental South Univ. 20, 2708–2714 (2013)
7. Viloria, A., Lezama, O. B. P: Improvements for determining the number of clusters in k-means
for innovation databases in SMEs. ANT/EDI40, pp 1201–1206 (2019)
8. Viloria, A., Lis-Gutiérrez J. P., Gaitán-Angulo, M., Godoy, A. R. M., Moreno, G. C., Kamatkar,
S. J.: Methodology for the design of a student pattern recognition tool to facilitate the teaching—
Learning process through knowledge data discovery (big data). In: Tan, Y., Shi, Y., Tang, Q.
(eds.) Data Mining and Big Data. DMBD 2018. Lecture Notes in Computer Science, vol 10943.
Springer, Cham (2018)
9. Zhu, J., Fang, X. et al.: IBM cloud computing powering a smarter planet. In: Libro Cloud
Computing, vol. 599.51, pp 621– 625 (2009)
10. Mohanty, R., Ravi, V., Patra, M.R.: Web-services classification using intelligent techniques.
Expert Syst. Appl. 37(7), 5484–5490 (2010)
11. Thames, L., Schaefer, D.: Software defined cloud manufacturing for industry 4.0. Procedía
CIRP 52, 12–17 (2016)
Comparison of Bio-inspired Algorithms Applied … 185
12. Álvarez, M., Nava, J.M., Rue, M., Quintana, S.: Mortality prediction in head trauma patients:
Performance of glasgow coma score and general severity systems. Crit. Care Med. 26, 142–148
(1998)
13. Setnes, M., Kaymak, U.: Fuzzy modeling of client preference from large data sets: an
application to target selection in direct marketing. IEEE Trans. Fuzzy Syst. 9(1), 153–163
(2001)
14. Llorca, J., Dierssen, T.: Comparación de dos métodos para el cálculo de la incertidumbre en
los análisis de laboratorio. Gac. Sanit. 14, 458–463 (2000)
15. Viloria, A., Neira-Rodado, D., Pineda Lezama, O. B.: Recovery of scientific data using
intelligent distributed data warehouse. ANT/EDI40, pp 1249–1254 (2019)
16. Wu, Q., Yan, H. S., Yang, H. B.: A forecasting model based support vector machine and particle
swarm optimization. In: 2008 Workshop on Power Electronics and Intelligent Transportation
System, pp. 218–222 (2008)
Information and Communication
Technology in Education
Articulation of Teaching
and Technological Resources
in the Teaching–Learning Process
of the English Language
A. R. G. Alexandra (B)
Departamento de Seguridad y Defensa, Universidad de las Fuerzas Armadas - ESPE, Av. General
Rumiñahui y Ambato, Sangolqui 170501, Ecuador
e-mail: [email protected]
S. M. J. Vinicio
Universidad Tecnica de Ambato, Ambato, Ecuador
e-mail: [email protected]
C. V. W. Patricio
Universidad Tecnica de Cotopaxi, Latacunga, Ecuador
e-mail: [email protected]
P. V. S. Efrain
Escuela Tecnica de la Fuerza Aerea Ecuatoriana, Latacunga, Ecuador
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 189
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_17
190 A. R. G. Alexandra et al.
1 Introduction
does not have enough sources of research and projects focused on strengthening the
teaching process learning from new resources and methodologies, which allows the
development of their basic skills.
As part of the objectives of this research, the general objective is to design and
implement a guide to the articulation of teaching and technological resources through
the use of ICTs to energize the teaching–learning process of the English language
in the candidates of the LV promotion at the Air Force Technical School and soldier
candidates at the School of Soldier Training “Vencedores del Cenepa” ESFORSE,
promotion 2018–2020.
For the achievement of this objective, the approach of specific objectives has
been considered as: Theoretically foundation, the fundamental categories of research,
perform a diagnostic study of the incidence of resources and methodologies employed
by the teacher in the acquisition of the basic skills and competences of the English
language, select the main contents of the guide, as well as its methodology of use,
structuring, and evaluation, validate the proposed guide from its implementation in
the English subject.
Teaching resources are the set of techniques and resources that are planned according
to the needs of the student population; it is also noted that criteria should be taken into
account at the time they are to be planned. These include the sociological character-
istics of the students, those that are desired, the social context, the level of knowledge
they possess, among others, to ensure the success of the objective posed [1]. From
these perspectives, it can be stated, in the author’s view, that the teaching resources
are auxiliaries, supports, instruments, materials or tools that help the teacher in the
learning process to adequately transmit knowledge in addition to achieve meaningful
learning, to make it attractive, suggestive and exciting to the student; that will enable
the continuous improvement of the learning–teaching process by making it more
meaningful and permanent.
Some analyses allow to understand the difference between a resource and a teach-
ing environment, if teaching resources are considered to be any support material that
the teacher uses to facilitate the development of the activities of the subject addressed
in classes while teaching means are resources developed by teachers, which are used
as part of the teaching process; video, images, voices, music, among others [2]. The
effectiveness of the training process will depend on the effectiveness of the resources
used and the impact they generate on students, coupled with pedagogical skills for
curricular planning and design [3]. There are cross-cutting axes to the learning–teach-
ing process, where the teaching and technological resources are located, focused on
group integration, collaborative work and the relationship between the teacher, as a
facilitator of learning, and the student leading the way in the process, and when the
classroom is conceived as a communicative space, the whole situation is different
before, during and after class.
192 A. R. G. Alexandra et al.
• Lack of training: The need for the theoretical and practical knowledge that all
people must learn, the need for skills and attitudes favorable to the use of these
new tools (ICT literacy).
• Security issues: Circumstances such as the risk of unauthorized access to Internet-
connected computers and possible theft of classified or confidential information.
• Cultural barriers: The dominant language, English, in which many references
and information come; tradition in the use of advanced technological instru-
ments (non-existent in many underdeveloped countries), coupled with inadequate
training held by teachers in these subjects.
The use of ICT in Education implies new educational paradigms, such as
student-centered education, self-learning and knowledge management, which has
also changed the historical role of teachers, because at the moment, technologies,
mostly become facilitators and moderators of the process [10].
Methods used include the following and their analysis from applicability in research:
• Analytical-synthetic: it allows the researcher to analyze the problem from its
causes and effects for further assessment.
• Statistical method: it was used for the analysis and interpretation of data in field
research conducted.
• Hypothetical-deductive: it allowed the design of the guide and the characteriza-
tion of the variables under study.
For working with the population and sample, the survey technique was used, which
was applied to 120 students of the promotion LV Air Force Technical School and 120
students from the 2018-2020 Promotion of the Soldier Training School “ESFORSE”
Vencedores del Cenepa, representing the student population, so it was not necessary
to determine a representative sample of the universe population, it is feasible to
work with the total, as well as in the case of teachers, worked with all of them, it
means twenty-four. The information obtained allowed the holistic interpretation and
analysis of the research variables and the problem itself.
Classrooms in both schools have an overhead projector and an audio system that
give students the possibility of practicing at the time they are learning the English lan-
guage. Consequently, teachers have attended several pieces of training and updating
sessions to improve their technological literacy.
Students in both schools have 2 h of English a day from Monday to Thursday; it
means 8 h a week and 120 h per term. Additionally, they have access to the internet
on their laptops so that they can practice on different websites according to their
needs and available time.
194 A. R. G. Alexandra et al.
In carrying out the practical part, it was determined that when developing a didactic
proposal, it is advisable to work according to the following operational structure:
• Clear goals that describe what is expected to be achieved in students once the
entire process is complete.
• A context that offers an alternative (in case of need for change), adapting the
specific contents to learn and approach the reality of the students.
• A final product in which the project is articulated.
• A set of tasks and activities designed to achieve the final product and that allow
the development of the different core competencies.
• Different moments to reflect (collaborative work, individual actions, strengths and
weaknesses, etc.)
• Design personally the sections on which they will then be assessed.
Strategies are essential tools to carry out the teaching work properly.
The researchers in Table 1 analyzed the application of the questionnaire to the
students, which facilitated the identification of the need that the project would help
to improve in the process of learning and developing English language skills in the
two schools of military training.
Table 2 details the results applied to teachers in order to determine the feasibil-
ity and implementation of the project for improving English language teaching in
military training schools.
The results obtained will highlight and divide some of them into non-strict cate-
gories. According to the characteristics of the students can be used, adapting them
to the personal, group and physical reality of them.
5 Conclusions
Teaching resources are supports, resources, materials and tools that help educators
in the teaching process to adequately convey knowledge and meaningful learning to
students to enable the continuous improvement of the process.
The use of interactive didactic and technological resources for teaching English
from teachers’ training and updating was encouraged and implemented, allowing
them to become familiar with new technologies.
The structuring of the solution proposal that will allow energizing the learning–
teaching process was determined from the selection of resources that enhance the
development of skills and methodology of use, for the development of activities
considering the skills to develop, objectives, benefits and proposed teaching and
technological resources.
196 A. R. G. Alexandra et al.
Table 3 (continued)
Ability to develop Resource Technological Methodology of use
resources
Hearing Audio Lyrics training Copying sentences
comprehension in Correct
English Joining sentences
Substitution
exercises
Understanding the
vocabulary and
context of audio.
Reading Articles and texts TTSReader Textual
understanding and
views, and
vocabulary
comprehension,
identification of
colloquial and
language rases
Writing Questionnaire Grammarly Understanding the
resolution context of a test to
Conceptual maps solve different types
Trials of evaluation
Write concepts to
support themselves
as vocabulary and
order to follow in
order to write
consistent text
It allows for
strengthening the
written skill where
different resources
and grammatical
times are articulated
by applying formal
vocabulary
References
1. Lavigne, G.: CPU-e CPU-e. Rev. Invest. Educ. 5–19 (2018). ISSN 1870-5308
2. Bartolomei, M., Victoria; Caram, C., Los Santos, G., Negreira, E., Pusineri: No Title. Palermo
- Argentina (2015). ISSN 1669-2306
3. Alrashidi, O., Phan, H.: Education context and English teaching and learning in the Kingdom
of Saudi Arabia: an overview. Eng. Lang. Teach. 8(5), 33–44 (2015)
4. Gajardo G., Grandón, F., Gfell, C., Rica, U.D.C.: A comparative Fernando García Gajardo
Gonzalo Fonseca Grandón Lisbeth Concha Gfell Revista indizada en Redalyc, Sciel. Redalyc
Scielo Rev 15, 1–26 (2015). E-ISSN 1409-4703
5. Rodgers, T., Theodore, S., Jo, M., John, S.: Approaches and Methods in Language Teaching.
Cambridge University Press, UK (1999)
6. Yule, G.: b50165c3003b33b20e20b40f3c78c60c7691ac3e @ acquiringl2.wordpress.com
(2012)
7. Díaz, P., Claudio, Aguilera, K., Fuentes, R., Pérez: Los Recursos Didácticos en la Enseñanza
y Aprendizaje Del Inglés. 13(2), 8–19 (2013)
8. Hall, G.: Exploring English, 2nd edn. Routledge, New York (2018)
9. Alcalde Mato, N.: Principales Métodos de Enseñanza de Lenguas Extranjeras en Alemania.
Rev. Lingüística y Lenguas Apl. 0(6) (2011)
10. Kukulska-Hulme, A., Norris, L., Donohue, J.: Mobile Pedagogy for a Guide for Teachers, vol.
14, no. 7. London (2015)
11. Appel C., Borges, F.: Task design for L2 oral practice in audioblogs. Obtenido de Task design
for L2 oral practice in audioblogs. http://files.eric.ed.gov/fulltext/ED544443.pdf (2011)
Gravity Compensation Using Low-Cost
Automation for Robot Control
G. Caiza
Universidad Politecnica Salesiana (UPS), 170146 Quito, Ecuador
e-mail: [email protected]
D. Alvarez-Montenegro · J. Escobar-Naranjo · C. A. Garcia · M. V. Garcia (B)
Universidad Tecnica de Ambato (UTA), 180103 Ambato, Ecuador
e-mail: [email protected]; [email protected]
D. Alvarez-Montenegro
e-mail: [email protected]
J. Escobar-Naranjo
e-mail: [email protected]
C. A. Garcia
e-mail: [email protected]
M. V. Garcia
University of Basque Country (UPV/EHU), 48013 Bilbao, Spain
© The Editor(s) (if applicable) and The Author(s), under exclusive license 199
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_18
200 G. Caiza et al.
1 Introduction
Students, researchers, people in general who are immersed in the world of engineer-
ing, robotics, industrial automation, process control and systems integration, etc., find
an enormous possibility of education and research in the realization of robust control
systems through the use of low-cost devices, which allow to reach an unimaginable
learning opportunity by creating a reference platform for research and training in the
field of mobile manipulation, which allows developers, researchers and students to
write their own control and application software [9].
Robot Operating System (ROS) is a framework within the cyber-physical systems
for GNU/Linux platforms, which simplify the communication and monitoring of the
robot control status. This software allows several devices to be incorporated into a
distributed network, where a master node allows the rest of the nodes to communicate
through TCP/IP; in addition, these elements that are part of the CPS architecture
which can be secured through the implementation of a VPN server, providing several
advantages to ROS nodes, such as modularity of the architecture, allowing adaptation
to other systems. Redundancy is possible due to the ROS publication/subscriber
scheme, in addition to allowing cross-platform access and remote control through
another element connected to the same network [5].
For the control of the joints of the robotic arm, two methods have been defined, a
change from the current position to the next or a variation in the speed of a joint until
reaching the desired position. For both, extra calibration is required considering
gravitational compensation, which will allow the monitoring of the final effector
trajectories in an appropriate manner reducing the error in position and speed [10].
The aim of this research is to present the design of an advanced control system
through gravitational compensation using a low-cost single-board computer (SBC)
hardware. The proposed system has a graphic interface that uses the application
programming interface (API) of the Kuka youBot robotic arm to send the positions
commands. This software includes methods and classes for the development of grav-
itational compensation control; ROS commands enables control over open-source
drivers, leading to interoperability between independent systems.
This article is structured as follows: Sect. 2 provides brief concepts which will
allow a better understanding of the following sections. Section 3 presents the case
study used for the research method. In Sect. 4, the design and implementation of a
gravity compensation for robot control based on low-cost automation are showed.
The discussion of results is presented in Sect. 5. Finally, the conclusions and future
work are presented in Sect. 6.
Gravity Compensation Using Low-Cost Automation for Robot Control 201
2 State of Technology
The field of stability control of manipulative robots has become more important
since its proposal in 1981, as this only applied to robotic arms that only have rotating
joints; for mathematical modeling, equations are used that are nonlinear; however,
Lyapunov’s theory is often used as an auxiliary means [8].
The development of the proportional derivative (PD) control with gravity compen-
sation for manipulators is based on the assumption that the dynamics of the actuators
do not exist, so it should be considered that the control signal is not the torque but
the voltage that is applied to the motors, where the torque comes as the result of the
electrical interaction of the actuators [1].
Without considering external disturbances, the mathematical model of a rigid
robot that has a number n of links is described (see Eq. 1):
where M(q)q̈ represents matrix of symmetric manipulator inertia, C(q, q̇)q̇ is matrix
of centripetal and Coriolis forces, G(q) is gravitational pairs vector, F(q̇) is friction
pairs and τ represents input torque vector.
The derivative proportional control algorithm with gravity compensation is
defined by the correction of the joint positioning error (see Eq. 2):
q − kd (
τ = kp q˙ ) + G(q) (2)
2.3 ROS
3 Case Study
The positioning of objects is one of the most common tasks performed by robotic
arms. This type of procedure requires a control that allows the rotary joints to be
manipulated according to the need of the process.
The present work shows the design of a control system for the robotic arm of the
Kuka youBot manipulator. This control system is developed using the Raspberry Pi
204 G. Caiza et al.
3B embedded card. The case study is the execution of a “pick and place” positioning
task and the monitoring through the interface chart which has the option to save and
reproduce positions, as seen in Fig. 4. The architecture is implemented through the
integration of ROS and the youBot driver, allowing the development of libraries,
topics, and nodes, on which the communication data and messages will be sent and
received through the Ethernet protocol.
The graphical interface allows control by sending position and velocity values
through the robotic arm driver, for which classes and methods that allow data to be
sent to the rotary joints are developed in C++, in addition the manipulation through
gravitational compensation control, whereby the controlled delivery of current to the
joint motors ensures that there is no damage to the manipulator joints.
This research work uses a low-cost SBC-type embedded cards because they are
considered as controllers or potential solutions to data processing and monitoring
problems. The SBC cards are being compatible with open-source software.
The proposed control is designed with gravitational compensation, which consists
of the interpolation of the positions sending by control graphic interface, so that
the current values sent to the motors are regulated proportionally and derivatively;
in order to make the teaching of positions more versatile, this control method is
included; this allows an operator handle the robotic arm according to your need
manually.
Gravity Compensation Using Low-Cost Automation for Robot Control 205
4 Proposed Implementation
A new ROS node is established that will be mainly responsible for the calibration
and control of the robotic arm; for this, the physical parameters required by the
gravitational compensation module such as friction, mass, gravity, etc., have been
previously configured.
When the gravitational compensation module is started, the above-mentioned
parameters are loaded; simultaneously and automatically, the initialized robotic arm
calibration is performed; each rotary joint is defined as an EtherCAT slave, and for
each of them, iterations are performed to find the most exact value in which the torque
made by the motors is reduced; this is because the torque changes are proportional
to those of current.
Mainly based on the use of the NLopt library, developed for nonlinear optimization
systems; this allows the evaluation of several algorithms for long calibration routines,
allowing several parameters to be tested in a short period of time.
When the module is activated from the GUI, the current values delivered to the
joints are the minimum so that it can maintain the links statically; therefore, when
applying an external force in order to manipulate the robotic arm, it does not present
opposition, for which the operation of the control is verified by gravitational com-
pensation.
The GUI developed for the interactive control of the robotic arm is presented as a ROS
node, which exchanges data with the controller node, and this in turn is responsible
for the control of the hardware device through a third node implemented with the
robot in URDF format; the interface is developed under C++ and consists of discrete
buttons for the execution of movements through the sending of positional values or
by velocity variation, as well as the activation of the control module for gravitational
compensation; it also has the save function and load of states, so that the user can
manually perform the positioning tasks raised in the investigation.
Within the GUI, in addition to the palette to load and save arm states, as shown in
Fig. 5, a 2D graphic of the robotic arm can be seen, where two stages of this one are
presented; a current one and one that will understand the objective to which the arm
is to be moved; for the understanding of the possible movement made in the missing
plane, three views are included that correspond to the upper detail of the first joint,
the joint number 5 for the rotation of the gripper and a front of the latter to correctly
visualize the opening or closing of the same. In the lower part, the current rotational
parameters of the 5 joints are observed plus the longitudinal variation of the gripper,
in order to maintain the positional values within the allowed ranges of each motor.
206 G. Caiza et al.
For the implementation of the initially proposed case study, a ROS system with three
nodes is developed as seen in Fig. 6, which will allow control over the robotic arm of
the Kuka youBot manipulator through an advanced method based on gravitational
compensation; if the three nodes are going to be subscribers and publishers of differ-
ent topics, this in order that the messages sent from the developed GUI arrive through
the controller node to the physical rotary meetings; within the GUI, the actions to
be executed by each component are detailed through files in C++ of the same; it is
described through the youBot API how the message will be published and read by
the controller node, which is the core of the complete system, this will initialize the
ROS master.
In addition to executing the robotic arm driver with its respective configurations
and mainly the gravitational compensation module with its certain calibration param-
eters, the node transmits the messages sent from the GUI through the robot in Unified
Robot Description Format (URDF) format, which allows in a third node access to the
hardware device through the EtherCAT protocol; this last node describes the geom-
etry of several physical elements, with which the driver ensures that the initialized
robot is the correct one for the API used, translating the messages sent to the motors
as positional, velocity or torque values in current variations or specific limits.
Gravity Compensation Using Low-Cost Automation for Robot Control 207
The ROS Rqt Graph tool is used to get a real-time diagram of the iteration between
nodes, topics and messages, where you can observe the flow of information within
the developed ROS system; the type of messages used to provide control over rotary
joints of the robotic arm allows to control the motors through the youBot driver; in
Fig. 7, the graph obtained is presented, which is equivalent to the system proposed
as a case study.
The type of messages sent from the controller node to the node of the URDF
robot is sensor_msgs /JointState; these are used to transmit values in float64 format
within vectors; for this, a vector of 5 positions is defined, where each of them will
be occupied by each of the rotary joints of the robotic arm; this corresponds to the 5
degrees of freedom and is established by the youBot API; these spaces will be filled
when a position, velocity or effort type value is sent to the array, and when a position
has not been filled, a value of zero is assumed, and this does not affect the execution
of the order sent to the robotic arm.
208 G. Caiza et al.
5 Discussion of Results
To check the operation of the developed controller node, all measured values greater
than 0.01 s are considered as a delay; the measurements are defined in the executable
file of the mentioned node, where the difference between the established frequency
and the operation of the robotic arm is calculated, and the delay in the operation of
the controller as a function of time is obtained from the inverse value of the result.
The case study presents a positioning task called “pick and place,” for which the
gravitational compensation module was used for the manual control of the robotic arm
toward the desired positions; in addition, the saving and reproduction of positions was
used through the GUI to check the operation of the same, and finally, two positions
were obtained for the development of the task.
As can be seen in Fig. 8, which is a graphical representation of the delays obtained
as a function of time, the controller does not have large delays in the execution of
the gravitational compensation module, since these remain close to the established
limit of 0.01 s, except for extreme cases where values suffer relatively high peaks.
This work shows the design of a controller node within a system developed through
the ROS API and the youBot driver, mounted on a low-cost SBC card; the proposed
architecture as a case study raises interoperability between hardware platforms based
on open source; the elaborated application is considered as a metapackage which
contains the packages and files necessary for the control of the robotic arm of the
Kuka youBot manipulator through EtherCAT. The calibration and control tasks of
the rotary joints of the robotic arm for control through the gravitational compensation
module are performed in the background, and automatically once the controller node
has been initialized, when this process ends, it can be executed via the GUI developed,
which allows a more intuitive control for the user, since it allows to observe the current
position and the objective to which you want to move, in addition to making possible
the selection of the type of control, either by position, velocity or by the gravitational
compensation module.
The controller works constantly since the ROS master and the entire system was
executed; for a correct operation, a value of 200 Hz must be established for the fre-
quency of the robotic arm, which varies for each joint, thanks to the actual operating
parameters; this creates an existing delay in the control loop, which is shown in the
terminal and allows observing as a function of time how much the tracking of the
developed pick and place process is delayed, finally obtaining low values that vary
according to the accuracy in the positions that must be reached by the robotic arm.
Future lines of research should focus on the development of different control
methods based on the prediction of trajectories through direct or reverse kinemat-
ics, on the use of other types of software or protocols that allow greater limits on
the interoperability of the hardware, through the application of libraries for image
processing and the use of different sensors for object detection.
Acknowledgements This work was financed by Universidad Tecnica de Ambato (UTA) and their
Research and Development Department (DIDE) under project CONIN-P-256-2019
References
1. Binazadeh, T., Yousefi, M.: Designing a cascade-control structure using fractional-order con-
trollers: time-delay fractional-order proportional-derivative controller and fractional-order
sliding-mode controller. J. Eng. Mech. 143(7), 04017037 (2017). https://doi.org/10.1061/
(ASCE)EM.1943-7889.0001234
2. de Gea Fernández, J., Mronga, D., Günther, M., Knobloch, T., Wirkus, M., Schröer, M., Tram-
pler, M., Stiene, S., Kirchner, E., Bargsten, V., Bänziger, T., Teiwes, J., Krüger, T., Kirchner,
F.: Multimodal sensor-based whole-body control for human-robot collaboration in industrial
settings. Robot. Auton. Syst. 94, 102–119 (2017). https://doi.org/10.1016/j.robot.2017.04.007,
http://www.sciencedirect.com/science/article/pii/S0921889016305127
3. Di Napoli, G., Filippeschi, A., Tanzini, M., Avizzano, C.A.: A novel control strategy for youBot
arm. In: IECON 2016—42nd Annual Conference of the IEEE Industrial Electronics Society.
pp. 482–487 (2016). https://doi.org/10.1109/IECON.2016.7793658
210 G. Caiza et al.
4. Garcia, C.A., Franklin, S.L., Mariño, C., Villalba, W.R., Garcia, M.V.: Design of flexible
cyber-physical production systems architecture for industrial robot control. In: 2018 IEEE
Third Ecuador Technical Chapters Meeting (ETCM). pp. 1–6 (2018). https://doi.org/10.1109/
ETCM.2018.8580338
5. Garcia, C.A., Lanas, D., Edison, A.M., Altamirano, S., Garcia, M.V.: An approach of cyber-
physical production systems architecture for robot control. In: IECON 2018—44th Annual
Conference of the IEEE Industrial Electronics Society. pp. 2847–2852 (2018). https://doi.org/
10.1109/IECON.2018.8591286
6. Hernández, V., Santibáñez, V., Carrillo, R., Molina, J., López, J.: Control pd de robots: Dinámica
de actuadores y nueva sintonía. Revista Iberoamericana de Automática e Informática Indus-
trial RIAI 5(4), 62–68 (2008). https://doi.org/10.1016/S1697-7912(08)70178-X, http://www.
sciencedirect.com/science/article/pii/S169779120870178X
7. Koubâa, A.: Robot Operating System (ROS). Springer (2017). https://doi.org/10.1007/978-3-
319-26054-9
8. Peidró, A., Reinoso, Ó., Gil, A., Marín, J.M., Payá, L.: Análisis de estabilidad de singularidades
aisladas en robots paralelos mediante desarrollos de taylor de segundo orden (2017)
9. Wang, L., Törngren, M., Onori, M.: Current status and advancement of cyber-physical systems
in manufacturing. J. Manufact. Syst. 37, 517–527 (2015). https://doi.org/10.1016/j.jmsy.2015.
04.008, http://www.sciencedirect.com/science/article/pii/S0278612515000400
10. Yu, C., Li, Z., Liu, H.: Research on gravity compensation of robot arm based on model learning*.
In: 2019 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM),
pp. 635–641 (2019). https://doi.org/10.1109/AIM.2019.8868673
11. Zhang, B., Gao, S.: Kuka youBot arm path planning based on gravity. In: 2018 International
Conference on Mechanical, Electrical, Electronic Engineering & Science (MEEES 2018).
Atlantis Press (2018/05). https://doi.org/10.2991/meees-18.2018.75
Situated Learning Through the Use
of Cooperative Techniques and Academic
Controversy Applied to the Provision
of Cryptographic Confidentiality
© The Editor(s) (if applicable) and The Author(s), under exclusive license 211
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_19
212 L. D. Barra et al.
1 Introduction
The idea of cooperative learning emerged in the sixteenth century. According to [9],
cooperative learning occurs when tasks are organized in which cooperation is the
condition to carry them out, these are learning tasks that cannot be carried out if it
is not by collaborating among peers, you cannot be successful if the peers are not
successful, the success is not individual but that of all the members of the group.
214 L. D. Barra et al.
Gillies [10] mentions that there are key components that influence the success of
cooperative learning:
1. Structuring positive interdependence within the learning situation so that all
group members understand that they are linked to each other in such a way
that one cannot achieve success unless everyone does, and they must learn to
synchronize their efforts to ensure that this happens.
2. Promotional interaction or the willingness of group members to encourage and
facilitate the efforts of others to complete their tasks in order for the group to
achieve its objective. In doing so, students develop an awareness of what others
do not understand and the need to provide explanations or assistance that can be
easily understood.
3. The third key component is individual responsibility or one’s responsibility to
ensure that he or she completes his or her part of the work while ensuring that
others complete theirs. In fact, the more students perceive that they are linked,
the more they feel personally responsible for contributing to the collective effort
of the group.
4. Group members must possess interpersonal skills that enable them to handle
disagreements with others. These skills must be explicitly negotiated or taught.
5. Group processing involves students reflecting on their progress and work
relationships.
In the paper, presented by Rodríguez et al. [11] propose the implementation of the
methodological strategy of integration of cooperative learning to the study of cases
in the Industrial Engineering career. Through this, they make possible the design of
several case studies generated by the students in their insertion in the labor reality and
the cohesion of the members of the group, which contributes to activate the process
of formation of the professional by means of the participation of the same ones in
the individual and team solution of the problems that appear in the social practice.
opposing positions and refute attacks on their own position, reverse perspectives and
create a synthesis on which they agree.
3.2 Cryptosystems
Cryptosystems are defined in [17] as the set of hardware and software elements
intended to provide security services. In general, there are two types of cryptosystems,
those of public key where the secret to encrypt and decrypt is the same, so it must be
previously shared by a secure channel and the second type corresponds to those that
use a pair of complementary keys, one used in the encryption and the other in the
decryption and although they are different there is a functional relationship between
them.
1. Public Key Cryptosystems. Also called symmetric, [17] defines the structure
shown in Fig. 1, which identifies the following data:
(a) M i is the clear message to be protected,
(b) K key or secret shared between sender and receiver,
(c) C i encrypted text to be transmitted.
Also, there are two algorithms: (1) E is the encryption algorithm, which encrypts
the clear text using the secret key to generate the ciphertext and, (2) D is the decryption
216 L. D. Barra et al.
Fig. 1 Cryptosystem:
cryptography and
cryptanalysis (Source LNCS
5412, p. 323)
algorithm, which restores the clear text from the ciphertext using the secret key, it is
necessary to indicate that D is the functional reversal of E. Functionally it is described
as follows:
Ci = E(Mi , K ) (1)
Mi = D(Ci , K ) (2)
3.3 Cryptanalysis
This science, as defined [18], is concerned with the identification and analysis of
security weaknesses. Its implementation is called an attack and is given directly on
the communication channel over which encrypted texts are transmitted. Depending
on the available ciphertext the attacks and security breaches can be:
1. Brute force attack.
2. Attack only on the encrypted text.
3. Attack if some clear text is available.
4. Attack if clear text is chosen (dictionary).
5. Attack if encrypted text is chosen according to known clear text.
Based on the available information, statistical analysis algorithms are applied,
such as coincidence or frequency index, entropy, pattern detection, among others, in
order to obtain part or all of a clear text, part or all of the key. Cryptanalysis has the
following sub-areas:
1. differential cryptanalysis
2. linear cryptanalysis
3. algebraic cryptanalysis
4. Guess-and-Determine among others.
using a data communication system, for that it must be converted to a new form
of representation through a cryptographic algorithm, that is to say, providing the
service of confidentiality, whose entrance is not only the information to protect but
also a keyword protected and shared by sender and receiver (symmetrical system),
by nature the algorithm must be reversible. On the other side, the weaknesses of the
algorithms used in the implementation must be found and exploited, evaluating the
computational effort in both directions as seen in Fig. 4. To achieve this objective in
students, the didactic proposal is based on the application of cooperative learning and
academic controversy in such a way that what students learn is much more significant
in relation to the previous cycle for this topic which is considered very difficult due
to the technical knowledge that is required to be applied.
The following sections describe the didactic proposal.
It includes all those aspects that the student is required to achieve at the end of the
work sessions. These objectives are socialized with the students beforehand. In the
case of the topic in question provision of cryptographic confidentiality, the objectives
were:
• Performing a search for relevant information
• Implement the confidentiality service in a symmetric or public key cryptosystem
Situated Learning Through the Use of Cooperative Techniques … 219
• Identify and exploit the weaknesses of public key cryptosystems, based on the
application of cryptanalysis techniques
• Documenting the group work process
• Review relevant case studies, identifying ethical, economic, technical and legal
considerations.
4.2 Methodology
Figure 5 shows the general methodology of the proposal for each learning unit.
Step 1: Definition of the Context Here the teacher defines the initial conditions
of the problem to be solved, specifying the external environment and the condi-
tions associated with common situations in the area of knowledge found in profes-
sional practice. From this first step, the way to implement the academic controversy
should be sought through the assignment of roles. In the issue considered around the
provision of confidentiality using symmetrical cryptosystems this includes:
1. Definition of working groups. Using role-playing to enhance individual strengths
when integrating into heterogeneous groups
2. Assignment of the cryptosystem to be built. To provide the confidentiality service
(encryption algorithm, key length, working mode, clear data to be encrypted). All
good practice requirements should be considered (usability, consistency, etc.).
Fig. 5 Proposed
methodology
220 L. D. Barra et al.
This means giving a group (in Fig. 4 group A) the document Cryptosystem Speci-
fications to be implemented, which is equivalent to the definition of requirements
in any computer-related project. A typical document is shown in Fig. 6.
3. Assigning the cryptosystem to cryptanalyze. To identify and exploit its weak-
nesses through attacks aimed at breaking confidentiality (decryption algorithm,
working mode, encrypted data that has been generated by the system). This means
giving a group (in Fig. 4 group B) the Cryptanalysis Specifications document,
i.e., the definition of requirements. A typical document is shown in Fig. 7.
Step 2: Cooperative Knowledge Building At this stage, students will carry out
an individual search for information, analysis, and selection of material based on
a group assessment. It is particularly important to influence the use of academic
search engines. The teacher should implement the monitoring through a blog about
the virtual classroom, or a blog using appropriate virtual tools, having additional
communication elements such as email and instant messaging. In the issue consid-
ered around the provision of confidentiality using symmetrical cryptosystems this
includes:
1. Review of the algorithm to be implemented (encryption) or the algorithm to
be attacked (decryption). It must be understood that both functions have been
assigned to antagonistic groups, it is of vital importance that the teacher monitors
that relevant sources are consulted.
2. Review of development tools. For the provision of confidentiality and for the
implementation of the attack, in this case, it is important that the teacher evaluates
the relevance of the tools.
Situated Learning Through the Use of Cooperative Techniques … 221
An example of how these activities are monitored is shown in Fig. 8, the summary
of the blog records should be moved to the project log and delivered as part of the
final project report.
Step 3: Implementation of the Solution Students must show the product obtained
by adding the tests and results that demonstrate that the conditions of step 1 have
been met. The teacher will validate the solution and the results. In the issue consid-
ered around the provision of confidentiality using symmetrical cryptosystems this
includes:
1. Symmetrical encryption system. Associated with the initial design conditions.
2. Set of encrypted texts produced. Which correspond to the clear texts delivered in
step 1.
3. Symmetric cryptanalysis system. Associated with the initial design conditions.
4. Results obtained. From the cryptanalysis of the encrypted text received in step
1.
222 L. D. Barra et al.
Step 4: Verification for Academic Controversy The result obtained in the previous
step will be given to another group of students for testing and validation. In the subject
considered around the provision of confidentiality using symmetric cryptosystems,
this means that the ciphertext or results generated by each symmetric system will be
delivered to the respective cryptanalysis systems which will have to demonstrate the
capacity to exploit their weaknesses and deliver part or all of the clear text, part or
all of the secret key.
Step 5: Review of Results and Evaluation The teacher will integrate in a general
review the knowledge acquired, consolidating the lessons learned and the association
with the real situations of professional practice. It is also possible to use the co-
evaluation within the working groups, whose rubric is shown in Fig. 9. The proposed
topic will also involve reviewing the safety information of these cryptosystems in
the network. Figure 10 shows the rubric designed for the individual evaluation of
the student by the teacher, which is aligned to a competence evaluation and to the
student’s results that must be evidenced for our accreditation processes.
5 Results
After this experience where the situated learning was applied in relation to learning
of the topic cryptographic confidentiality provision as part of the Critical Security
Systems course, which was based on the use of cooperative techniques and the
academic controversy among the students of this course; a survey was applied to
Situated Learning Through the Use of Cooperative Techniques … 223
evidence if there was a change in the students’; perception in relation to this topic
after the experience.
The survey had two parts, the first in relation to the topic developed (the first
five questions); and the second in relation to the use of collaborative techniques
and academic controversy in the development of the working sessions (the last 5
questions).
This survey was applied to 75 students, whose responses are shown in Figs. 11
and 12, respectively.
Q1. Do you think you understand when and how to use what you have learned in
cyber security?
224 L. D. Barra et al.
70
60 59
60 55 57
54
50
40
30
20 14 16
13
10 10 8
10 5 5 4
1 3 1
0 0 0
0
Q1. Q2. Q3. Q4. Q5.
Q2. Through experience, you were able to develop dichotomous thinking, for it
was not enough to provide the service, but you must include considerations
of robustness and consistency?
Situated Learning Through the Use of Cooperative Techniques … 225
70 65 64
60
60 55 57
50
40
30
20
10 9 8 7 10 8 8
10 7
1 2 0 3 1
0 0
0
Q6. Q7. Q8. Q9. Q10.
Fig. 12 Results of the survey of questions relating to the use of collaborative techniques and
academic controversy
Q3. The experience allowed you to demonstrate your ability to solve engineering
problems efficiently, under initial design conditions?
Q4. It also allowed him to develop the capacity of abstraction inherent in
algorithms and the evaluation of computational complexity?
Q5. The approach of relevant sources of information that facilitates their capacity
for self-learning.
Q6. The use of collaborative techniques in the learning process, facilitated their
integration into the working group and the assumption of a concrete role in
it?
Q7. The way in which the collaborative techniques were applied in the learning
of this specific topic allowed and facilitated the obtaining of those technical
knowledge that he considered difficult?
Q8. The use of academic controversy made it easy for you to find flaws in the
solution of the problem and improve it for final delivery?
Q9. The use of adaptive learning applied in experience allowed him to build his
knowledge based on his own capacities?
Q10. Do you think that this topic is still very difficult to understand, learn and use
after the experience developed?
From the results obtained from the survey, we can affirm that the fact of having
applied collaborative learning techniques and academic controversy to such a techni-
cal topic as the provision of cryptographic confidentiality is feasible, and also favors
the situational learning of students with respect to a given topic.
Likewise, a comparison was made with respect to the academic performance
achieved in this topic by two groups of students, those enrolled in the 2019A cycle
with whom the experience was carried out, and the students enrolled in the previous
cycle (2018A) with whom a traditional course was developed. Clearly, an improve-
ment in the academic performance of those enrolled in the 2019A cycle can be seen
in Fig. 13, which is evidenced by the grades obtained by the two groups of students.
226 L. D. Barra et al.
Academic performance
45%
42%
35%
26%
00 01 - 07 08 - 10 11 - 14 15 - 17 18 - 20
Qualificaons (00-20)
Fig. 13 Result of the academic performance of the students in the last two cycles
6 Conclusions
The model of situated learning allows the student to shorten the distance between
real situations of professional practice and fundamental academic training because
it allows him/her to perceive real scenarios in which assumes a specific role, which
gives meaning to the learning process.
Cooperative techniques, where the student builds his/her own knowledge, are
fundamental to adapt learning styles, the student becomes the center of knowledge
appropriation, however, it could be dangerous if the teacher does not assume with
responsibility his role of facilitator since the student could freely go to non-relevant
sources of knowledge or erroneous or incomplete sources. Follow-up processes are
therefore essential.
When applying cooperative learning techniques, it is important to consider the
fact that the teacher’s role is primarily of an actor who guides the learning that stu-
dents acquire as the activities are carried out. However, it requires greater teacher
participation in the previous stage, where they must plan very clearly and precisely
each of the activities to be carried out by the students, as well as establish the envi-
ronment in which they will be carried out. This fact is one of the success factors
in the teaching-learning process, and it requires that the teacher involve many more
resources than he or she would in a traditional teaching process.
Academic controversy is a good tool for the development of critical judgment
because it allows the student to assume opposing roles, which, in some cases, such
as in cyber security, for example, may even facilitate ethical judgments.
With the academic controversy well managed, it can be improved through gam-
bling techniques, finally this didactic experience could be interpreted in a simple
Situated Learning Through the Use of Cooperative Techniques … 227
sense as a game of defense and attack. A game that requires a thorough theoreti-
cal training for its implementation, but whose playfulness is motivating for young
university students.
The provision of cybersecurity services such as confidentiality is increasingly sen-
sitive services, so the training of professionals with greater expertise and knowledge
is essential. This improvement in training is achieved through the intensive use of
tools and computer resources in the implementation of the solution, as well as the
greatest possible amount of training when facing new challenges.
Acknowledgements The authors express our gratitude to the National University of San Agustin
from Arequipa for the support received in carrying out this work and express our expectation that
the results will be translated into benefits for the institution.
References
1. Prensky, M.: Digital natives, digital immigrants. On Horizon 9(5), 1–6 (2001)
2. Tetchueng, J., Garlatti, S., Laubé, S.: A Context-aware learning system based on generic sce-
narios and the theory in didactic anthropology of knowledge. Int. J. Comput. Sci. Appl. 5(1),
71–87 (2008)
3. Gómez, J., Hernandez, V., Morales, M.: Arquitectura Interactiva como Soporte al Aprendizaje
Situado en la Enseñanza de la Ingeniería. Revista Educación En Ingeniería 10(20), 88–97.
https://doi.org/10.26507/rei.v10n20.575 (2015)
4. Sagastegui, D.: Una apuesta por la cultura: el aprendizaje situado. In: Sinéctica, Revista Elec-
trónica de Educación, vol. no. 24, pp. 30–39. Redalyc. https://www.redalyc.org/articulo.oa?
id=99815918005 (2004)
5. Niemeyer, B.: El aprendizaje situado: una oportunidad para escapar del enfoque de déficit.
Revista de Educación 341, 99–121 (2006)
6. Paz Penagos, H.: El aprendizaje situado como una alternativa en la formación de competencias
en ingeniería. Revista Educación en Ingeniería 2(4), 1–13. https://doi.org/10.26507/rei.v2n4.55
(2007)
7. Ortega, F.: Principios e implicaciones del Nuevo Modelo Educativo. In: Revista Latinoamer-
icana de Estudios Educativos (México), vol. XLVII, no. 1, pp. 43–62. Redalyc. https://www.
redalyc.org/articulo.oa?id=27050422003 (2017)
8. Mattar, J.: Constructivism and connectivism in education technology: active, situated, authentic,
experiential, and anchored learning. In: RIED Revista iberoamericana de educación a distancia
https://doi.org/10.5944/ried.21.2.20055 (2018)
9. Aprendizaje cooperativo. In: Revista Digital Innovación y Experiencias Educativas, España
(2009). ISSN 1988-6047
10. Gillies, R.: Cooperative learning: review of research and practice. Aust. J. Teach. Educ. 41(3),
39–54. http://dx.doi.org/10.14221/ajte.2016v41n3.3 (2016)
11. García, N., Díaz, L., Enríquez, G.: Cooperative learning integrated to cases study in the
activation of industrial engineers formation. 9(2), 68–75 (2017)
12. Johnson, D., Johnson, R.: Structuring academic controversy. In: Sharan, S. (ed.) Handbook of
Cooperative Learning Methods, pp. 51–65. Praeger Publishers, Westport, CT (1994)
13. Andreu, M., García, M.: Evaluación del pensamiento crítico en el trabajo en grupo. Revista de
Investigación Educativa 32(1), 203–222 (2014). https://doi.org/10.6018/rie.32.1.157631
14. ITU, International Telecommunication Union: https://www.itu.int/rec/T-REC-X.800-199103-
I/es
228 L. D. Barra et al.
1 Introduction
Information retrieval addresses the problem of searching for digital resources in large
databases. Content-based image retrieval systems are a special type of information
retrieval system where the resources are images [1]. Commonly, these systems rep-
resent an image through a series of descriptors, related to color, texture or shape.
These descriptors are used in the recovery process to judge the similarity between
images. The most recent systems follow an iterative model and consider the user
J. Silva (B)
Universidad Peruana de Ciencias Aplicadas, Lima, Peru
e-mail: [email protected]
N. Varela
Universidad de la Costa, Barranquilla, Colombia
e-mail: [email protected]
O. B. P. Lezama
Universidad Tecnológica Centroamericana (UNITEC), San Pedro Sula, Honduras
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 229
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_20
230 J. Silva et al.
as an active part of the process. In each iteration, a set of images is shown, and the
user marks those that most resemble the concept he is looking for. The result of the
information processing is a new set of images that are displayed again, continuing
the iterative process until the desired image is found [2].
On the other hand, evolutionary computing deals with the application of natu-
ral selection and genetic concepts to computational models, encompassing a series
of techniques based on reproduction, competition, selection and the existence of
mutations, such as genetic algorithms [3] and evolutionary strategies [4].
The application of evolutionary computing techniques in the field of information
retrieval is not new. In particular, it has been applied to specific aspects such as the
grouping of results [5], the optimization of consultations [6] and feedback [7]. In
the case of image search, evolutionary strategies are used to measure the similarity
between two images by combining descriptors [8] and to build complete recovery
systems using interactive mechanisms [9, 10].
This paper presents the use of an interactive genetic algorithm as an efficient
feedback mechanism for image search. The system was evaluated and compared
with other existing algorithms, obtaining promising results.
The classic approaches, the feedback mechanism uses the user’s selection to
update both the query point and the weights, so that emphasis is placed on those
characteristics that seem most relevant [11, 12]. Other approaches include the use of
Bayesian techniques [13, 14], self-Organizing Maps (SOM) [15], and more recent
methods such as the use of Support Vector Machines (SVM) [16, 17], regressive
models [18], or approaches based on sets and fuzzy logic [19, 20].
2 The Algorithm
The purpose of an image search system is to retrieve images that best satisfy a
semantic question. To perform the searches, a series of descriptors are extracted from
each image and stored in feature vectors [5]. These characteristics are grouped in
coherent descriptors, such as color histogram, wavelet coefficients or characteristics
in the Fourier domain. In genetic terms, the representation of characteristics of an
image is equivalent to its genotype, while the image itself is its phenotype. Although
it is common to have algorithms in which there is a function that allows generating
the phenotype from its genotype, in this case, it is not possible to generate an image
from its representation in the general space of characteristics.
Evolutionary Algorithm for Content-Based Image Search 231
2.2 Representation
In principle, the technique presented in this paper can be used with any set of
descriptors, although the performance of the resulting system will strongly depend
on the degree to which the descriptors satisfy the condition of strong causality in the
genotype–phenotype relationship [3].
If the current population is composed of the images that have been shown to the
user, those that have been qualified as positive are those that have a phenotype that
most closely matches the query [14]. Therefore, these are the images that should
reproduce and are assigned a maximum score. The rest of the images shown are
discarded from the crossing process. A more common procedure is to assign lower
goodness to these other images, assigning them a lower probability of participating
in the reproduction.
A composite distance measurement using the distance measurements between
each of the individual descriptors can be used to calculate the neighbors, such as a
linear combination of standardized distances [7] (used in this case for simplicity) or
the probabilistic combination presented in [20].
Parents are chosen using the Russian roulette algorithm, assigning the same prob-
ability to each of the positive selections and their neighbors, and zero to any other
image in the population [18]. In fact, the application of the Russian roulette algo-
rithm, in this case, is equivalent to selecting individuals at random from the enriched
population.
restricted to those genotypes that have a known phenotype. In the context of a search
system, the potential solutions are the images in the repository [6]. It is of little use to
generate a more suitable genotype if it cannot generate the corresponding phenotype
to provide it to the user. This restriction in the domain has significant implications on
the crossing operations, and conditions the procedure used to simulate the evolution.
The algorithm can be summarized in the following steps [11, 17, 18]:
1. A series of images are shown in the graphical interface.
2. As part of the enrichment, operation is used to obtain the genotypes closest to
the positive selections.
3. The crossing operator is applied to parents randomly selected from the individuals
that make up the enriched population. The resulting genotypes are synthetic, in
the sense that they may not correspond to an existing image in the database.
For each of these genotypes, a new order is produced, using the same distance
function that was used to find the neighbors.
4. Each image is assigned a score that is inversely proportional to its best position
in the rankings.
3 Results
In the field of image recovery, significant efforts have been made to establish com-
mon evaluation methods. To be able to compare the performance of image recovery
systems, it is necessary to use a common repository. Although the collection called
Corel Photo CD has been used by several authors to evaluate their algorithms, each
one has done it on a different subset of images, the collection is subject to copy-
right, it is not free and it is no longer available through Corel [17]. Furthermore,
the classification it provides is not suitable for testing purposes since, as reported
in [18], many images representing similar concepts are in different directories and
some directories contain images with very different semantic content.
Therefore, in order to evaluate the algorithm, a test suite using the two repositories
described below was manually created:
• A small database of 2541 images, extracted from the Web and manually classified
as belonging to 30 different semantic concepts, such as flowers, horses, pictures,
clouds, trees, etc. The number of images under each category varies from 25 to 400.
This database and its classification were used in [14, 21], where a more detailed
explanation is provided. The descriptors used in this case are the color histogram
HS (with 10 × 3 components), and the horizontal and vertical granulometries
Evolutionary Algorithm for Content-Based Image Search 233
4 Conclusions
The performance of the evolutionary algorithm presented in this paper is based on the
assumption of strong causality between phenotype and genotype, which has made it
possible to work with neighborhoods to enrich the population and base the ordering of
the images in the database according to their proximity to the generated descendants.
The approach presented in this study is not only valid for systems based on binary
selections (relevant/not relevant). On the contrary, it can be easily adapted to work
with other types of paradigms. As an example, some search systems allow the user
to assign a degree of similarity to each image, using scroll bars. In this case, the
degree of similarity can be used as an evaluation function, altering the probabilities
of each image so that those with a greater degree of similarity are more likely to be
reproduced.
As future research, the effect of using different representations and crossing tech-
niques can be studied, compare the performance obtained with each of them in the
context of the problem.
Evolutionary Algorithm for Content-Based Image Search 235
References
1. Banuchitra, S., Kungumaraj, K.: A comprehensive survey of content based image retrieval
techniques. Int. J. Eng. Comput. Sci. (IJECS), 5 (2016). https://doi.org/10.18535/ijecs/v5i8.26,
https://www.ijecs.in
2. Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception archi-
tecture for computer vision. In: Proceedings of the IEEE Conference on Computer Vision and
Pattern Recognition, pp. 2818–2826 (2016)
3. Tunga, S., Jayadevappa, D., Gururaj, C.: A comparative study of content-based image retrieval
trends and approaches. Int. J. Image Process. (IJIP) 9(3), 127 (2015)
4. Tzelepi, M., Tefas, A.: Deep convolutional learning for content-based image retrieval. Neuro-
Computing 275, 2467–2478 (2018)
5. Chen, L., Zhang, Y., Song, Z.L., Miao, Z.: Automatic web services classification based on
rough set theory. J. Central South Univ. 20, 2708–2714 (2013)
6. Pineda Lezama, O., Gómez Dorta, R.: Techniques of multivariate statistical analysis: an
application for the Honduran banking sector. Innov: J. Sci. Technol. 5(2), 61–75 (2017)
7. Mohanty, R., Ravi, V., Patra, M.R.: Web-services classification using intelligent techniques.
Expert Syst. Appl. 37(7), 5484–5490 (2010)
8. Thames L., Schaefer, D.: Softwaredefined cloud manufacturing for industry 4.0. In: Procedía
CIRP, vol. 52, pp. 12–17 (2016)
9. Viloria A., Neira-Rodado, D., Pineda Lezama, O.B.: Recovery of scientific data using Intelligent
Distributed Data Warehouse. ANT/EDI40, pp. 1249–1254 (2019a)
10. Viloria, A., Pineda Lezama, O.B.: Improvements for determining the number of clusters in
k-means for innovation databases in SMEs. ANT/EDI40, pp. 1201–1206 (2019b)
11. Nisa, R., Qamar, U.: A text mining-based approach for web service classification. In:
Information Systems and e-Business Management, pp. 1–18 (2014)
12. Wu, J., Chen, L., Zheng, Z., Lyu, M.R., Wu, Z.: Clustering web services to facilitate service
discovery. Knowl. Inf. Syst. 38(1), 207–229 (2014)
13. Paulin M., et al.: Convolutional patch representations for image retrieval: an unsupervised
approach. Int. J. Comput. Vis. 165–166 (2017)
14. Chandrasekhar, V., Lin, J., Liao, Q., Morere, O., Veillard, A., Duan, L., Poggio, T.: Compression
of deep neural networks for image instance retrieval. arXiv:1701.04923 (2017)
15. Sharif, U., Mehmood, Z., Mahmood, T., Javid, M.A., Rehman, A., Saba, T.: Scene analysis
and search using local features and support vector machine for effective content-based image
retrieval. Artif. Intell. Rev. 52(2), 901–925 (2019)
16. Korytkowski, M., Senkerik, R., Scherer, M.M., Angryk, R.A., Kordos, M., Siwocha, A.: Effi-
cient image retrieval by fuzzy rules from boosting and metaheuristic. J. Artif. Intell. Soft
Comput. Res. 10(1), 57–69 (2020)
17. Abdi, Y., Feizi-Derakhshi, M.R.: Hybrid multi-objective evolutionary algorithm based on
Search Manager framework for big data optimization problems. Appl. Soft Comput. 87, 105991
(2020)
18. Sarkar, S., Das, S., Chaudhuri, S.S.: Multi-level thresholding with a decomposition-based
multi-objective evolutionary algorithm for segmenting natural and medical images. Appl. Soft
Comput. 50, 142–157 (2017)
19. de Ves, E., Domingo, J., Ayala, G., Zuccarello, P.: A novel bayesian framework for relevance
feedback in image content-based retrieval systems. Pattern Recogn. 39, 1622–1632 (2006)
20. Viloria, A., Robayo, P.V.: Virtual network level of application composed IP networks connected
with systems-(NETS peer-to-peer). Ind. J. Sci. Technol. 9, 46
21. Koskela, M., Laaksonen, J., & Oja E.: (2004) Use of image subset features in image retrieval
with self-organizing maps. In: Image and Video Retrieval: Third International Conference,
Dublin, Ireland, July 2004, pp. 508–516
Online Platform to Teach Aviation
English at a Military School in Salinas
Abstract This research aims at providing the Military Aviation School “ESMA-
Cosme Renella Barbatto”, located in Salinas in the province of Santa Elena, Ecuador,
with an online teaching tool that helps to enhance the methodology applied in the
subject of Aviation English (AE). The International Civil Aviation Organization
(ICAO), which is the official organization in charge of Aviation English training
programs, states that the structures taught in this English for Specific Purposes (ESP)
courses are based mostly on the communicative intention rather than grammatical
rules. The ICAO also recognizes, in the document 9835, the use of computers as
supporting tools during the learning process and suggests Blended Learning as an
approach that optimizes the organization of face-to-face sessions when teaching
Aviation English. To this end, a mixed-method research was selected to gather and
process data that supports the need of implementing an online platform, the research
tools were an interview to the teacher, who is also an Aviation Instructor from the
ESMA Flight Training Department, and a survey to the 39 pilot cadets who will be
part of the course. The results revealed a positive attitude towards the platform, it
was considered by the participants to be a pedagogical “link” between technology
and teaching methodology.
V. Almeida
Universidad de Guayaquil, Guayaquil, Ecuador
e-mail: [email protected]
M. Gutiérrez (B) · R. Rodríguez
Universidad de las Fuerzas Armadas—ESPE, Sangolquí, Ecuador
e-mail: [email protected]
R. Rodríguez
e-mail: [email protected]
J. Zambrano
Universidad Casa Grande, Guayaquil, Ecuador
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 237
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_21
238 V. Almeida et al.
This research was conducted at “Escuela Superior Militar de Aviación Cosme Renella
Barbatto” (ESMA), which is one of the bases of the Ecuadorian Air Force, located
in Salinas, province of Santa Elena, Ecuador. The cadets who are trained to become
military pilots must first pass the eight levels of General English established in
the curriculum redesign, in order to be certified as B2 speakers by an international
authorized center. Once cadets finish General English levels, they start the English
for Specific Purposes (ESP) subject “Aviation English”, which is mandatory to obtain
their bachelor´s degree in Aeronautical Sciences. The hours assigned to this subject
are 64 hours of face-to-face instruction and 32 hours of autonomous work.
The main objective of Aviation English is to develop the skills needed for com-
munication in a foreign language as well as the parameters included in the standards
established by the International Civil Aviation Organization (ICAO). This organiza-
tion recognizes six levels of English proficiency: Pre-elementary (1), Elementary (2),
Pre-operational (3), Operational (4), Extended (5) and Expert (6). ICAO Operational
Level 4 is a requirement for all pilots around the world, and for this reason, it is fun-
damental to provide knowledgeable cadets so that they could be able to communicate
in international operations [1].
Aviation English is pivotal in the communication between the cabin crew members
and the air traffic controllers since it has special features in its terminology and plays
an important role for safety issues while flying. Considering all these aspects, the
cadets of ESMA must be able to handle the correct terminology for taking off or
landing, in addition to all the phrases related to the various maneuvers required
during the flights. In the guidelines for teaching Aviation English established by the
ICAO, it is classified as English for Specific Purposes (ESP) and the communicative
approach is the primary teaching methodology [2].
Canale and Swain assert that the goal of any language course should be to equip
learners who can communicate in the real-world. For this reason, the implementation
of authentic tasks is paramount to develop the four language skills. Having said that,
the process of language acquisition in Communicative Language Teaching (CLT)
takes place using real-life material that enables learners to interact naturally applying
the lexicon provided during instruction [3].
According to the ICAO guidelines for the implementation of Aviation English
courses, the course materials are required to be relevant researches and documents
supported by the use of visual aids that allow learners to become familiar with aviation
topics to create meaningful experiences [1]. So as to innovate and complement the
methodology applied in this subject, it was collected data to support the fact that an
online platform would complement the teaching methodology of Aviation English;
it was designed using updated materials based on the standard phraseology and
radiotelephonic communication.
Online Platform to Teach Aviation English … 239
2 Literature Review
new methodologies like blended learning in different academic fields could have a
positive impact on this ESP course [5].
Blended learning (BL) is considered by the ICAO as part of the solution when
having time constraints in aviation training programs [1], which would be the case
at ESMA, as all the teaching approaches, strategies and techniques must be adapted
to the 64 hours assigned to this subject. Garrison and Vaughan describe the basic
principle of BL to be the optimal integration of face-to-face instruction with appro-
priate online resources to develop oral and written communication. The possibility
of assigning tasks not only for classroom activities but also for autonomous prac-
tices could reinforce all the skills; particularly, those that require more time to be
examined such as comprehension, structure or vocabulary [6].
3 Methodology
This research was developed by applying a mixed methodology, due to the fact, that
it was collected quantitative and qualitative data. This approach is suitable for this
investigation since it permits the researchers to obtain reliable information from a
specific educational scenery, which in this case involves not only the cadets but also
the flight instructor, who are the target participants in the ESP module. Consequently,
this study is considered as explicatory as it proposes the implementation of a platform,
and it was developed following a non-experimental research design.
In order to collect quantitative data: a survey was administered to the cadets, as
for qualitative data, an interview was applied to the instructor. The results of the
survey described the cadets’ preferences regarding learning techniques, especially
when acquiring new lexicon in a specialized area using a foreign language. Among
the findings, it was possible to determine that the 54% of the participants considered
online tasks meaningful for further practice in the process of acquiring technical
vocabulary, while the 38% prefer classroom tasks and the 8% rather use a book or
any other printed material are as it is displayed on Table 1.
On the other hand, qualitative information was also necessary in order to identify
the perception of the instructor regarding aspects such as teaching methodology,
organization of the syllabus, assessment of the ESP module, and the importance of
Aviation English for Military pilots. Therefore, an interview related to these topics
was carried out to analyze aspects that are essential in the process of acquiring
knowledge. The results of the interview revealed the need for providing the instructor
with a teaching tool that enables cadets to have further practice on their own.
The results also show the acceptance of the participants in the use of an online
platform during the process of acquiring the lexicon needed for flight operations,
and according to the ICAO’s guidelines for Aviation English training, the use of
Blended Learning for this type of courses can be a more efficient teaching approach
since “foundation skills” (structure, vocabulary, listening comprehension and, to a
certain degree, pronunciation) can easily be practiced in the autonomous hours of
study inside of a lab or computer-based learning environments [1] (Table 2).
Learning Management Systems (LMSs) are web applications that are run on a server
and can be accessed through a web browser. LMSs provide educators with tools to
design and implement learning programs in which students can be enrolled in order
to solve tasks, upload or download material, chat or have class discussions, as well
as give quizzes or record grades [7]. Modular Object-Oriented Dynamic Learning
Environment (Moodle) was selected for the platform elaboration since it is a flexible
open-source which can be adapted to different learning needs and it is available in
more than 100 languages.
In the work of Kareal and Klema, some LMSs were compared focusing on par-
ticular features like user-friendliness and possibility of adaptability, and the results
proved that Moodle is preferred by most institutions because it is practical and can
be customized according to educational necessities [8]. To implement a Moodle site,
it is needed to have a domain, which is the name of the website. It allows users to
have access to the website [9]. In this case the domain is English for aviation.online.
Google Slides is an editor of presentations in the Google Docs and Drive produc-
tivity suite which will be also used for the creation of the platform. These slides are
visible in a linear form, all the presentations can be edited in real-time, shared with
contacts, and they are on the drive of the Google account which is been used [10].
Additionally, for the exercises of the platform, it was used the program H5P, which
is an open-source that allows web designers to create, share and reuse interactive
materials like videos, presentations or tests [11]. It will enable learners to check the
answers of an activity, a score will be given, and they can also have the option to see
the solution of exercises.
242 V. Almeida et al.
For further practice, some videos from the Youtube website, related to Aviation
English, were included as extra material as well as some simulation games. According
to Hertel & Millis, the students feel more interested and conscious of the topic and
function since they are actively participating. Hence students can develop leadership
skills and solve the problem easily [12]. Plus, the learning environment created
in class is much better and productive because the learners will be able to solve
real-world problems.
The first unit deals with vocabulary related to Runway Incursions and it includes
four lessons which are displayed on this section, all the tasks presented to teach the
students how to use vocabulary to avoid miscommunication, request information to
the control tower, audios of real incidents to be discussed in class and one evaluation
of all the contents of the unit. It is important to mention that the teacher is able to
modify any of the tasks depending on their relevance or the time assigned for each
unit. Figures 3 and 4 show all the activities and content which are available for all
the participants of the course.
As for the assessment, most of the tasks are graded and the answers are presented.
This autonomous practice can be carried out by students around the topics that pupils
consider difficult to understand. It is shaped to attain the different individualities of
students and as a way of reinforcement with additional exercises to be completed on
their own as it is illustrated in Figs. 5 and 6.
Speaking and listening skills can be anticipated by using the platform, students
can do some research to justify the answers given in class. The role of the instructor
is fundamental in the development of fluency, accurate selection of terminology and
interaction with the students. Listening and speaking tasks are illustrated on Figs. 7
and 8, there are different ways of motivating students to investigate in order to acquire
appropriate aviation terminology.
It is highly recommended that after the implementation of the platform there must
be selected two moments for monitoring the performance of the platform. These
two evaluation points in time are going to generate feedback that could determine
new strategies for reinforcing any weak parts found on the blended methodology
244 V. Almeida et al.
supported by the online platform. In addition, it is also necessary that a mock exam
of Aviation English proficiency should be included as a final evaluation to recognize
if the contents of the platform as well as in the syllabus contribute to reach the level
4 of the ICAO’s language operational scale.
246 V. Almeida et al.
4 Discussion
instruction and 32 of autonomous work of study, based on this fact; the main purpose
of the current research is to implement an online platform that allows cadets to
develop all the skills needed in the field of English for Aviation. The tasks included
on the platform may be used before a class to activate prior knowledge or after a
session to reinforce topics, especially during autonomous hours of study.
According to the ICAO’s manual related to Language Proficiency Requirements,
computer-assisted language learning (CALL) enables Aviation English training pro-
grams to practice the skills needed to perform flight operations, additionally, the
ICAO also highlights the importance of computers as supporting tools during the
training process; nevertheless, this organization clarifies that any technological
device could never replace the role educators have in language learning. For that
reason, the most suitable teaching approach for this subject is Blended Learning,
which according to the ICAO is a worthy alternative when having time limitations
[13].
Computers are part of the instruments used for interaction among learners and
instructors providing learners with the opportunity of practicing the language on
their own. On the other hand, speaking as well as listening skills must be primar-
ily developed in face-to-face sessions, particularly in the context of plain-language
radiotelephony communications, instructors of Aviation English training programs
must spend classroom time on communicative tasks and interaction skills that are at
the heart of the ICAO language requirements. The results of the survey confirmed that
most of the cadets who will be part of the course prefer online exercises for further
practice; likewise, the instructor mentioned in the interview that the use of technol-
ogy throughout the teaching process is relevant and offers students the possibility to
improve.
Based on the results from the study presented by Bonk, Olson, Wisher, and Orvis
which was aimed at analyzing the impact of the blended learning approach in the
context of a high-level military course of United States Army Armor School in Fort
Knox, Kentucky [5], one of the advantages of this methodology was that online
activities created a more meaningful learning environment due to their authenticity,
which led to realistic problem-solving scenarios. It is important to mention that at
ESMA, all the cadets possess a laptop with a strong and secure internet connection,
therefore, lack of knowledge of ICT tools will not represent a limitation. According
to Bonk et al. the results of this research proved that blended learning tasks are
preferred by the students because of their effectiveness, flexibility and immediate
feedback [5].
5 Conclusions
Blended Learning is the most efficient methodology for teaching Aviation English
at ESMA, this approach allows cadets to use the 60 hours established for classroom
sessions for speaking training and the 32 hours of autonomous work for further
practice in topics which required to be reinforced on their own. The results of the
248 V. Almeida et al.
survey confirmed that most of the cadets who will be part of the course prefer online
exercises for further practice, likewise, the instructor mentioned in the interview that
the use of technology throughout the teaching process is relevant and offers students
the possibility to improve at their own pace.
In order to strengthen all the contents of the subject of Aviation English, an online
platform has been designed based on the objectives established on the syllabus of
this subject. However, before implementing the online platform, there must be taken
into consideration that instructors assigned to teach this subject must be familiar with
40 hours of training in order to familiarize themselves with the necessary teaching
techniques required for Blended Learning courses. It is highly recommended that
after the implementation of the platform, two evaluation points take place to generate
feedback that could determine new strategies for reinforcing any weak parts found
on the blended methodology supported by the online platform.
There must be a period of induction for teachers and cadets which includes: how
to log in for the first time, how to solve or any of the tasks, how to upload additional
material and how to use all the learning resources available on the platform. It is
necessary to monitor the effectiveness of the platform through the application of a
diagnostic and a final test to track the progress of students. Additionally, the instructor
may consider to include a mock exam of Aviation English as part of the training, to
determine not only the platform´s impact but also to analyze if the contents included
in the syllabus enables cadets to reach the operational level 4 required by the ICAO.
References
1. ICAO.: Guidelines for Aviation English Training Programme, s. Cir 323. ICAO (2009)
2. ICAO.: Manual on the Implementation of ICAO Language Proficiency Requirements, (Doc
9835 AN/453). Montreal: International Civil Aviation Organization (2004)
3. Swai, M., Canale, M.S.: Theoretical bases of communicative approaches to second language
teaching and testing. Appl. Linguist. I(1), 1–47. Retrieved from https://academic.oup.com/
applij/article-abstract/I/1/1/181953?redirectedFrom=fu (1980)
4. Hutchison & Waters: English for Specific Purposes: A Learner-Centred Approach. Cambridge
University Press, England (1987)
5. Bonk, C.J., Olson, T.M., Wisher, R.A., Orvis, K.L.: Learning from focus groups: an examination
of blended learning. J. Distance Educ. 17(3), 97–118 (2002)
6. Garrison, D., Vaughan, N.: Blended Learning in Higher Education: Framework, Principles,
and Guidelines. Wiley, San Francisco (2008)
7. Singh, J.: How to Use Moodle 2.7, Creative Commons Attribution-ShareAlike 3.0 Unported
License (2015)
8. Kareal, F., Klema, J.: Adaptivity in e-learning. Current Developments in Technology-Assisted
Education, Current Developments in Technology-Assisted Education, pp. 260–264. Retrieved
18.2.2015 from http://karlovi.cz/filip/adaptivity_in_e-learni (2006)
9. Moodle, «Moodle Docs» (En línea). Available: https://docs.moodle.org/34/en/Main_page
(2018)
10. Google «Google Suite». (En línea). Available: https://gsuite.google.com/products/drive/ (2018)
11. H5P, H5P. Retrieved from H5P: https://h5p.org/MIT-licensed (2018)
12. Hertel, J.P., Millis, B.J.: Using Simulations to Promote Learning in Higher Education: An
Introduction. Stylus, Sterling (2002)
Online Platform to Teach Aviation English … 249
13. ICAO.: Manual on the Implementation of ICAO Language Proficiency Requirements. Retrieved
from Manual on the Implementation of ICAO Language Proficiency Requirements: http://
teleduc2.icea.gov.br/EPLIS_wp/docs/Doc9835.pdf (2010)
14. ICAEA.: Guidelines for Aviation English Training Programmes. Retrieved from ICAEA:
https://www.icaea.aero/about-icaea/projects/icao-circular-323/ (2017)
15. ICAO.: About ICAO.” ICAO. N.p., n.d. Web. 24 October 2015. Retrieved from http://www.
icao.int/secretariat/TechnicalCooperation/Pages/history.aspx (2015)
Manufacturing Cost Prediction Through
Data Mining
1 Research Problem
A. Díaz · S. Fernández
University of Cumberland, Williamsburg, KY 41042, USA
e-mail: [email protected]
S. Fernández
e-mail: [email protected]
L. Guerra (B) · E. Díaz
Pontifical Catholic University of Ecuador Ibarra Headquarters, Ibarra 100150, Ecuador
e-mail: [email protected]
E. Díaz
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 251
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_22
252 A. Díaz et al.
many of these can be crucial in the birth and life of a product. Of all those factors,
two specifically stand out: cost and time estimation. Failing to properly predict these
could generate a loss in revenue or lead to missing out on a contract or a project
objective which would otherwise have been met [1, 2].
Cost assessment is too often carried out by models that rely on very difficult
and time-consuming processes [3, 4]. Companies then find themselves in the search
and need of accurate prediction models with which to estimate cost and time of
production from the initial design and early life of a product. Organizations frequently
ask themselves:
• Can the design and manufacturing process be transformed to obtain accurate
results quickly?
• Can efficiency be improved through the evaluation and analysis of data from
digital applications in our process?
• Can the latest breakthroughs in data science allow us to improve forecasts and
new product development?
The clear cut competitive advantage is definitely established by those companies
who successfully implement predictive cost assessment as part of their organiza-
tion [5]. When performed in the development phase, the consolidation of all costs
associated with a future service or product, through predictive costing, is capable of
illuminating potential scenarios when most of the decisions are still in the works.
The incapacity of manufacturers to quickly and effectively estimate costs could
potentially put them at risk and threaten their economic survival on the global market.
Etienne et al. [6], Li et al. [7], Marini and Corney [8] stated two possible scenarios
when product prices are poorly established, which depends on product cost. One
scenario shows a potential loss of profit due to the gap between the expected cost and
the actual cost, while the other focuses on the loss of customers due to unnecessary
high prices.
Because establishing a price that maximizes customer value and is still profitable
is crucial, it should not be based on intuition expectation [9, 10]. The best way would
be to use analytical approaches instead. Too often an immense amount of money
is allocated in the manufacturing process leaving decision makers unaware of the
importance of properly estimating manufacturing costs prior to irreversible actions
being taken. Thus, with the highly competitive and technologically data-driven envi-
ronment in which businesses now operate, accurately estimating manufacturing costs
is a must to thrive and survive [11].
The purpose of this study lies in evaluating the feasibility of predicting manufacturing
costs of a product with nonparametric methods, or in other words, without having
to determine probability distributions or making assumptions on certain parameters.
In order to do this, the physical characteristics and similarities of products were
Manufacturing Cost Prediction Through Data Mining 253
The dataset was collected from one of the largest menswear manufacturers in North
America, which produces suits and coats for men and boys. The company has been
operating for over 20 years and currently makes over 1300 coats a week, or roughly
300,000 a year. The manufacturing process includes around 200 stages that go from
spreading the fabric, cutting, fusing, sewing fronts, backs, sleeves, collar and facings,
followed by assembly, pressing and quality control.
It was collected from the company database using the last six months information
only, with the purpose of having the most updated data, which contains information
for 30,000 coats. Table 1 shows a summary of the dataset including the description of
the attributes associated with the products [15]. Each object (coat) consists of a fixed
set of data fields (attributes), which in total sum up to fourteen. Four of these variables
are quantitative (numerical), while the rest are considered qualitative (categorical).
Table 1 contains the variable name, data type, variable type and categories (for
categorical data) or range (for numerical data). For ordinal data, the last column of
categories presents the labels in order from lowest to highest in its ordinal scale.
It is worth highlighting that the variables presented in Table 1 were chosen
according to the manufacturing process and of the cost drivers involved.
254 A. Díaz et al.
3 Results
0.70
0.68
0.66
Silhouette Width Index
0.64
0.62
0.60
0.58
0.56
0.54
0.52
0.50
0 2 4 6 8 10 12 14 16 18 20
Number of Clusters
this technique has advantages like handling outliers, clustering mixed data when a
dissimilarity matrix can be derived, and eliminating the assumptions about underlying
distributions. The two phases of the algorithm are called build and swap, and several
steps were followed using the respective formulas.
Lastly, one regression model was developed for each cluster, meaning that “k”
regression models were developed, “k” being the number of clusters. This was done
256 A. Díaz et al.
with the output of the cluster analysis. Polynomial regression models were developed
using R code—function lm().
The regression model consisted of a dependent variable, which is the manufac-
turing cost (the outcome), and independent variables, which are the attributes or cost
drivers from the dataset previously collected. A 5% confidence level was assumed
to determine the significance of independent variables. The model would look like
this (1):
Once the model for each cluster is set, a scatter plot can be done. Figure 3 shows
how the product family in clusters would look with the cost model regression (only
for three clusters).
4 Conclusions
Throughout this research, it was possible to investigate the use of a clustering method
to predict the manufacturing cost of a product without the need of actually producing
it. As it was mentioned before, in a real production setting, a variety of products are
being elaborated simultaneously. Establishing one simple accurate estimation model
is challenging and would not resemble a real-life scenario. This led the authors to
group diverse products based on their design characteristics, type of manufacturing
Manufacturing Cost Prediction Through Data Mining 257
operation, among other features by dividing them into clusters until a sufficient
homogeneity within them was reached. Then, a cost estimation model was developed
for each cluster to predict the manufacturing cost of future products.
Since the dataset included mixed categorical and numerical variables and not all
clustering algorithms are compatible with this type of data, the use the k-medoids
clustering algorithm was decided, because of it was the best adapted to this kind of
data. Since all of the previous products could be represented as points in a multidi-
mensional space, it can be analyzed in which cluster a new product would fall and
then used the cluster-specific regression models, previously developed, to predict the
manufacturing cost of a new unique product.
Predictive costing is still at a very early stage and is a challenging endeavor. As
research continues and it evolves, it will lay foundations for properly understanding
and structuring manufacturing costs, underlining the relevant dependencies between
product characteristics and total cost.
References
1. Thomas, D., Kandaswamy, A.: Identifying high resource consumption areas of assembly-
centric manufacturing in the United States. J. Technol. Transf. 44(1), 264–311 (2019). https://
doi.org/10.1007/s10961-017-9577-9
2. Thomas, D.: Costs, benefits, and adoption of additive manufacturing: a supply chain perspec-
tive. Int. J. Adv. Manuf. Technol. 85(1), 1857–1876 (2016). https://doi.org/10.1007/s00170-
015-7973-6
3. Vogl, G.W., Weiss, B.A., Helu, M.J.: A review of diagnostic and prognostic capabilities and
best practices for manufacturing. J. Intell. Manuf. 30(1), 79–95 (2019). https://doi.org/10.1007/
s10845-016-1228-8
4. Kim, D.B.: An approach for composing predictive models from disparate knowledge sources
in smart manufacturing environments. J. Intell. Manuf. 30(4), 1999–2012 (2019). https://doi.
org/10.1007/s10845-017-1366-7
5. Homburg, C., Nasev, J., Plank, P.: The impact of cost allocation errors on price and product-mix
decisions. Rev. Quant. Financ. Acc. 51(2), 497–527 (2018). https://doi.org/10.1007/s11156-
017-0678-1
6. Etienne, A., Mirdamadi, S., Mohammadi, M., et al.: Cost engineering for variation management
during the product and process development. Int. J. Interact. Des. Manuf. (IJIDeM) 11(2),
289–300 (2017). https://doi.org/10.1007/s12008-016-0318-3
7. Li, X., Zhang, S., Huang, R., et al.: A survey of knowledge representation methods and appli-
cations in machining process planning. Int. J. Adv. Manuf. Technol. 98(9–12), 3041–3059
(2018). https://doi.org/10.1007/s00170-018-2433-8
8. Marini, D., Corney, J.R.: Process selection methodology for near net shape manufacturing. Int.
J. Adv. Manuf. Technol. 106(5–6), 1967–1987 (2020). https://doi.org/10.1007/s00170-019-
04561-w
9. Mondal, C., Giri, B.C. & Maiti, T.: Pricing and greening strategies for a dual-channel closed-
loop green supply chain. Flex. Serv. Manuf. J. 1(1), 1–38. https://doi.org/10.1007/s10696-019-
09355-6
10. Ramadan, M., Al-Maimani, H., Noche, B.: RFID-enabled smart real-time manufacturing cost
tracking system. Int. J. Adv. Manuf. Technol. 89(1–4), 969–985 (2017). https://doi.org/10.
1007/s00170-016-9131-1
258 A. Díaz et al.
11. Özbilen, Ş.K., Rende, K., Kılıçaslan, Y., et al.: Prediction of the resource-efficient potential of
Turkish manufacturing industry: a country-based study. Clean Technol. Environ. Policy 21(5),
1013–1037 (2019). https://doi.org/10.1007/s10098-019-01689-x
12. Sharma, N., Litoriya, R.: Incorporating data mining techniques on software cost
estimation: Validation and improvement. Int. J. Emerg. Technol. Adv. Eng. 2(3),
301–309 (2012). https://www.researchgate.net/publication/313203898_Incorporating_data_
mining_techniques_on_software_cost_estimation_Validation_and_improvement
13. Tan, P.-N., Kumar, V., Steinbach, M.: Introduction to Data Mining. Pearson/Addison-Wesley,
Boston (2010)
14. Lu, W.: Improved K-means clustering algorithm for big data mining under Hadoop parallel
framework. J. Grid Comput. 1(1), 1–12 (2019). https://doi.org/10.1007/s10723-019-09503-0
15. Grossi, V., Romei, A., Turini, F.: Survey on using constraints in data mining. Data Min. Knowl.
Discov. 31(2), 424–464 (2017). https://doi.org/10.1007/s10618-016-0480-z
16. Sakinc, E.: Manufacturing cost prediction in the presence of categorical and numeric
design attributes. Ph.d. Thesis. Auburn University.: (2016). https://etd.auburn.edu/bitstream/
handle/10415/5294/Manufacturing%20Cost%20Prediction%20in%20the%20Presence%
20of%20Categorical%20and%20Numeric%20Design%20Attributes.pdf?sequence=2&
isAllowed=y
Data Mining and Association Rules
to Determine Twitter Trends
Abstract Opinion mining has been widely studied in the last decade due to its
great interest in the field of research and countless real-world applications. This
research proposes a system that combines association rules, generalization of rules,
and sentiment analysis to catalog and discover opinion trends in Twitter [1]. The
sentiment analysis is used to favor the generalization of the association rules. In
this sense, an initial set of 1.6 million tweets captured in an undirected way is first
summarized through text mining in an input set for the algorithms of rules and
sentiment analysis of 158,354 tweets. On this last group, easily interpretable standard
and generalized sets of rules are obtained about characters, which were revealed as
an interesting result of the system.
© The Editor(s) (if applicable) and The Author(s), under exclusive license 259
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_23
260 J. Silva et al.
1 Introduction
Data mining techniques are present in almost all study fields with which human
beings currently work [2]. There are certain problems in which these techniques
notably stand out, influenced by the new economic and social paradigms, where
social networks have taken a relevant role. Regarding social networks, the concepts
of trend analysis or opinion mining arise referring to data mining techniques that
are used for the analysis of opinions. It is a study topic that intends to understand or
analyze the behavior, activities, and opinions of, for example, consumers of a certain
product or users of a certain social network [3].
In this study, a novel unsupervised approach is proposed for the problem of trend
analysis and opinion mining whose base emerged from the combination of two well-
differentiated techniques within the scope of data mining: the association rules and
the opinion mining or sentiment analysis, although differentiating the supervised and
unsupervised ones.
These separate techniques have been widely studied in the literature, where associ-
ation rules are applied to summarize and discover knowledge from a large dataset, and
the sentiment analysis is a useful tool for analyzing the performance of a subjective
analysis about the related problems or domains. This research, therefore, proposes
to combine the three elements using the sentiment analysis to enrich the subsequent
process of obtaining association rules, with the purpose of discovering opinion pat-
terns, something that differs from the whole literature where the association rules are
applied to improve the subsequent step of sentiment analysis, polarizing textual enti-
ties, such as tweets in good, neutral, or bad classification without obtaining patterns
on those factors that imply the results, and their interpretation.
Therefore, the contribution of this study to the state of the art of the field of opinion
mining and the analysis of trends is the design of a system that can work with data
obtained from Twitter without filtering, for example, about a country or language
during a time period that could vary [4, 5]. On this data, the system will summarize
hundreds of thousands of tweets into an easily interpretable set of rules on that subject
or character that the analyst is interested in at a given time. Later, these rules can
be generalized and displayed according to the generated sentiments, going from an
unstructured dataset to very reduced sets of rules that represent feelings and trends,
for categorizing opinions about characters, which will be obtained by the system in
an undirected way.
Starting from a large set of tweets, the proposed system first cleans the data and
makes a selection of samples based on the location of relevant people. Then, the
system parallelly polarizes the terms of the tweets and applies association rules to
combine the sentiment and polarization rules in a hierarchical approach, offering a
cloud of terms for the same character with patterns and opinion trends, and a set of
general rules that offer a higher level of information about those opinion trends.
Data Mining and Association Rules to Determine Twitter Trends 261
2 Method
2.1 Pre-processing
Considering the nature and quantity of the addressed data where practically each
tweet contains some elements that make it totally different from the others, a previous
stage of data pre-processing is strictly necessary. The chosen techniques are the
following:
1. Removal of empty words in English, adding the word via, which is considered
empty in the field that concerns the study [6].
2. Removal of links, punctuation marks, non-alphanumeric characters, and missing
values (empty tweets) [7].
3. Uncommon terms. Words whose frequency of appearance is less than 28 occur-
rences are removed, in addition to those words that, despite having more than
28 occurrences, have a length greater than 12 letters. The latter will indicate that
they come from hashtags or union of words that represent no real meaning or
importance to the process [8].
4. Extraction of named entities. The instance selection process considered only
those tweets related to people. It was completed by using the Name Entity Recog-
nition [7] technique (NER) proposed by Stanford University and included in the
coreNLP proposed by Kamatkar et al. [9] at the same university. After execut-
ing the NER process, quite acceptable results are obtained with 158,354 tweets
referring to people. On this set of tweets, the previous pre-processing techniques
are applied again to refine the process.
5. Shift to lower case: The whole content is shifted to lowercase letters for avoiding
discordances. Although the shift to lower case is one of the main steps in text
mining, in this case, it is applied after the NER process, as the use of capital
letters in proper names facilitates and improves the results of the process.
6. 2 g: It is possible to obtain names composed of two terms whose general analysis
is much more interesting and avoids the appearance of redundant association
rules. The purpose is to relate or merge terms such as donald followed by trump
into a single word of the donaldtrump type. To avoid unnecessary work, a study
is used to discern if this premise of compound names is correct and if their
frequencies are useful. The study of the most common bigrams confirms that
there are certain words whose union will avoid redundancy in the rules. After
identifying these terms, the union is carried out by means of an iterative process.
On the other hand, the analysis provides information about the mastery of data
and conversations in the social network for guiding the processes of obtaining
subsequent information [10].
262 J. Silva et al.
7. Finally, the tweets are transformed into transactions, where each word will be an
item.
The steaming process was avoided due to the fact that it will lose interpretability
in subsequent processes.
The data mining stage was carried out through association rules using the Apriori
algorithm [11] with support values of 0.0015 and 0.00015 along with a confidence
value of 0.8. In this way, a considerable number of rules was obtained, which was
cohesive and strong.
The objective of analyzing feelings in this study is to polarize the association rules that
were obtained in the previous stage of the method according to the terms that appear
in the antecedent or consequent. An iterative process was proposed for crossing each
tweet obtaining the feeling associated to each word in that tweet. For this objective,
the syuzhet package [12] was applied, created by the laboratory of literature of
Nebraska which uses the sentiment dictionary considering the eight most extended
basic emotions proposed by Abascal-Mena et al. [13]. A data structure is generated
by this method showing the occurrences for each word related to each meaning.
Some of these words and their sentiments are shown in Fig. 1.
The last step of the method is combining the view stage for obtaining of rules and the
polarization of feelings. One of the most radical differences between the study and
the literature is the use of sentiments to improve the process of obtaining association
rules. For this purpose, the sentiments associated to the terms are used to substitute
those terms in the antecedents of the association rules generated as long as they are
not a proper name. Association rules are obtained about people on Twitter and their
feelings associated with the help it represents for interpreting data and results on a
particular character, going from rules of the type {ignored, rape} → {donaldtrump} to
rules of the type {anger} → {donaldtrump}, since both the term ignored and rape are
associated according to the stage of polarization to the feeling anger. Some examples
of how words are generalized to later obtain rules according to those feelings can be
seen in Fig. 2.
Data Mining and Association Rules to Determine Twitter Trends 263
The contribution of this study to the state of the art of opinion mining is marked
at this point, where thousands of tweets on a character can be summarized in a very
simple way. It is achieved through these rules generalized by sentiments that are
very strong and allow to analyze the rules obtained in other stages, based on the
feelings that the terms evoke, and that could even be considered closer to the human
interpretation of an opinion trend.
3 Experimentation
This section presents the data collection process and the obtained results.
The power of the data obtained from Twitter in the opinion mining is closely linked
to the definition given by Dehkharghani et al. [14] on the concept of opinion, where
it is identified as a combination formed by entity, issuer, aspect, orientation, and
temporal moment. If a parallel line is drawn between this definition and the anatomy
of a tweet, they seem to be the same elements, which can be condensed as:
• Entity: On which the tweet is issued, for example, a mark.
• Emitter: User that emits the tweet.
• Aspect: What is valued about the tweet.
• Orientation: An emitted tweet can be of support or anger, among others.
• Time: Date and time of the tweet.
In order to obtain a data sample of a sufficient size, a Python crawler was imple-
mented for obtaining, processing, and storing the tweets directly from the Twitter
search engine, thus obviating the restrictions imposed by the Twitter API. The only
filtering is on tweets issued in the US and English language during the first six months
of 2016. At the end of the data collection process, 1.6M tweets were obtained. The
native connections between R and Mongo do not allow the loading of this large vol-
ume of data, so a distributed approach based on Spark [15] was used to achieve its
loading.
The mining of association rules on the input database provided 35,985 rules with
0.0015 support and 3,258,457 rules with 0.00015. In this set of rules, which according
to the volume of tweets can be considered a random sample of social network activity
in the United States for 6 months, interesting rules can be found about some people,
Data Mining and Association Rules to Determine Twitter Trends 265
among other entities, although the validation of the model and the usefulness of
the association rules as a descriptive method in opinions mining will be performed
according to two of the characters revealed by the process of exploratory analysis:
Donald Trump and Hillary Clinton.
The same study can be applied to other names, not necessarily belonging to the
world of politics, so the power of the model is confirmed. At the end of the process of
filtering and removing redundant rules, a set of 204 rules were obtained for Donald
Trump and 104 rules for Hillary Clinton.
A set of 204 rules were generated for Donald Trump. After studying them, some
interesting ones were summarized in Table 1.
In the chart above, a clear trend emerged when analyzing the first rules regarding
Trump’s politics on transgender people and their ability to serve in the US army.
Specifically, the rule {bans, serving, transgender} → {donaldtrump} let us know
that the current president clearly stated that he would prohibit the service of these
people in the army, something that was confirmed in 2017.
Another interesting trend can be marked by the following two rules, {ignored,
rape} → {donaldtrump} and {child, rape} → {donaldtrump}, that allowed to obtain,
through data mining, a trend on Twitter during the first half of 2016, indicating that
the candidate was involved in certain scandals related to violations or not condemning
them. Finally, an interesting rule can be found in {caucus, lead} → {donaldtrump}
which confirms the proven fact that all the polls considered this candidate as a leader
in the caucus where the parties decide the candidate to present in the elections [16].
Since the paper intends to represent and obtain trends on Twitter, Fig. 3 shows a
word cloud for representing the size of the most used words in co-occurrence with
the objective. In this way, all the information of the rules about Trump is condensed
into one graph.
A total of 104 association rules were obtained for Hillary Clinton. Studying the set
of rules obtained, Table 2 shows some of the most interesting rules.
Two trends and opinion groups are defined for Hillary Clinton-related tweets when
interpreting with a group-based approach:
1. The commitment of the show business with the candidate: The first rules refer to
the support received by the candidate from great stars of the show business [17].
2. The email scandal: The last two rules refer to the scandal of the filtered emails
and their use as an attack.
The graph of labels on the rules built for this case is shown in Fig. 4.
After the sentiment analysis process, every word is associated to a major sentiment
which generalizes it. To do this, the tweets referring to characters are filtered, and
the worlds in these tweets are substituted by the general feeling associated with each
Data Mining and Association Rules to Determine Twitter Trends 267
of them. Subsequently, the association rules on this dataset are obtained again. The
results for Donald Trump are given in Table 3 while the results for Hillary Clinton
are given in Table 4.
As a result of the rules, a ranking of sentiments is obtained to identify the studied
characters. The first result that comes to light is that the prevalent sentiments in
Twitter are of support and endorsement against both candidates over any other kind
of sentiment. A very interesting result is the interpretation of the anger feeling, of
which, 58% of the tweets about Hillary Clinton are related to this feeling. On the
other hand, Trump´s tweets represent 15% less anger feeling, reason why it seems
that American society was more against Hillary Clinton than Trump, in spite of what
was perceived in Europe. This was later confirmed by the Republican’s victory.
5 Conclusions
The research developed a model for obtaining behavior patterns on Twitter, which can
be classified as trend and that led to an approach based on data streaming. The results
can be even used to categorize the opinions and feelings of people about a character
in real time. The power of undirected methods and their ease of interpretation, which
is very close to natural language, are confirmed in similar problems despite the
current hegemony of directed methods. A similar result to that obtained with the
association rules can be obtained by means of a study of frequencies, but it would be
computationally expensive because of the amount of data. It would also eliminate, to a
certain extent, the undirected component offered by the rules, making the researchers
decide about the words to obtain the relations with other words, and finally, they
would offer different metrics to those that can be obtained from algorithms such as
Apriori.
References
1. Zaharia, M., Xin, R.S., Wendell, P., Das, T., Armbrust, M., Dave, A., Meng, X., Rosen, J.,
Venkataraman, S., Franklin, M.J., Ghodsi, A., Gonzalez, J., Shenker, S., Stoica, I.: Apache
Spark: a unified engine for big data processing. Commun. ACM 59(11), 56–65 (2016)
2. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In:
Proceedings of the 20th International Conference on Very Large Data Bases, VLDB, pp. 487–
499 (1994)
3. Manning, C.D., Surdeanu, M., Bauer, J., Finkel, J., Bethard, S.J., McClosky, D.: The Stanford
CoreNLP natural language processing toolkit. In: Proceedings of the 52nd Annual Meeting of
the Association for Computational Linguistics: System Demonstrations, pp. 55–60 (2014)
4. Hahsler, M., Karpienko, R.: Visualizing association rules in hierarchical groups. J. Bus. Econ.
87, 317–335 (2017)
5. Yuan, M., Ouyang, Y., Xiong, Z., Sheng, H.: Sentiment classification of web review using
association rules. In: Ozok, A.A., Zaphiris, P. (eds.) Online Communities and Social Comput-
ing. OCSC 2013. Lecture Notes in Computer Science, vol 8029. Springer, Berlin, Heidelberg
(2013)
Data Mining and Association Rules to Determine Twitter Trends 269
6. Silverstein, C., Brin, S., Motwani, R., Ullman, J.: Scalable techniques for mining causal
structures. Data Min. Knowl. Discov. 4 (2–3), pp. 163–192 (2000)
7. Amelec, Viloria, Carmen, Vasquez: Relationship between variables of performance social and
financial of microfinance institutions. Adv. Sci. Lett. 21(6), 1931–1934 (2015)
8. Viloria, A., Lezama, O.B.P.: Improvements for determining the number of clusters in k-means
for innovation databases in SMEs. Procedia Comput. Sci. 151, 1201–1206 (2019)
9. Kamatkar, S.J., Kamble, A., Viloria, A., Hernández-Fernandez, L., Cali, E.G.: Database per-
formance tuning and query optimization. In: International Conference on Data Mining and Big
Data, pp. 3–11. Springer, Cham (2018)
10. Cagliero, L., Fiori, A.: Analyzing Twitter User Behaviors and Topic Trends by Exploiting
Dynamic Rules. Behavior Computing: Modeling, Analysis, Mining and Decision. Springer,
pp. 267–287 (2012)
11. Erlandsson, F., Bro´dka, P., Borg, A., Johnson, H.: Finding influential users in social media
using association rule learning. Entropy 18, 164 (2016)
12. Meduru, M., Mahimkar, A., Subramanian, K., Padiya, P.Y., Gunjgur, N.: Opinion mining using
Twitter feeds for political analysis. Int. J. Comput. (IJC) 25(1), 116–123 (2017)
13. Abascal-Mena, R., Lo´pez-Ornelas, E., Zepeda-Herna´ndez, J.S.: User generated content: an
analysis of user behavior by mining political tweets. In: Ozok A.A., Zaphiris, P. (eds.). Online
Communities and Social Computing. OCSC 2013. Lecture Notes in Computer Science, vol
8029. Springer, Berlin, Heidelberg (2013)
14. Dehkharghani, R., Mercan, H., Javeed, A., Saygin, Y.: Sentimental causal rule discovery from
Twitter. Expert Syst. Appl. 41(10), 4950–4958 (2014)
15. Finkel, J.R., Grenager, T., Manning, C.: Incorporating non-local information into information
extraction systems by Gibbs Sampling. In: Proceedings of the 43rd Annual Meeting of the
Association for Computational Linguistics (ACL 2005), pp. 363–370 (2005)
16. Viloria, A., et al.: Integration of data mining techniques to PostgreSQL database manager
system. Procedia Comput. Sci. 155, 575–580 (2019)
17. Torres Samuel, M., Vásquez, C., Viloria, A., Hernández Fernandez, L., Portillo Medina,
y.R.: Analysis of Patterns in the university Word Rankings Webometrics, Shangai, QS and
SIRScimago: Case Latin American. Lecture Notes in Computer Science (Including subseries
Lecture Notes in Artificial Intelligent and Lecture Notes in Bioinformatics) (2018)
Jayor2: A Proposal of Information
Management System for Command
and Control Centers (C3i2) in the Armed
Forces
Abstract Usually, the Armed Forces in the world have as their mission: the defense
and security of their countries. Currently, there are various threats such as hybrid wars
that require the establishment of new and innovative defense methods and systems
that allow improving the effectiveness of the planning and decision-making processes
of military operations. The objective of this study is to propose the implementation of
an information management system for command and control systems (C3i2). The
Kimball methodology is used for the construction of a data warehouse and Crisp-
DM to build data mining. The results are prominent. Decision trees with an accuracy
of 83.22 and 49.83% are obtained. The model could work more efficiently and
effectively if the information is obtained in real-time for more accurate projections.
1 Introduction
At present, all the Armed Forces in the world have as a mission the defense and
security of the country against different existing threats. Among these threats are
countless types of wars that currently exist (e.g., asymmetric, civil, conventional,
no conventional, hybrid, etc.). The most complex threat due to its way of executing
© The Editor(s) (if applicable) and The Author(s), under exclusive license 271
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_24
272 J. Mayorga et al.
is the so-called hybrid war that is conceived between a conventional army against
an insurgent force. Due to its way of being an axis, it becomes difficult for the
conventional army to make decisions [1].
To combat these and other threats, the Armed Forces carry out missions that are
carried out by the maneuvering units under the command of a supreme command,
which maintains permanent control of the military operations that are carried out in
the national territory [2]. Communication is direct and is maintained from the maneu-
ver units inside and towards the supreme command. Normally the communication is
done through an internal communication network and an information system called
C3i21 (in other cases C4iVR) [3]. This system normally employs a flat database,
which is fed manually by military units, sometimes resulting in insignificant and
disorganized information to generate reports that allow the high command of the
supreme command, to have sufficient inputs for the decision-making; Jayor2 offers
a new way to get and organize and analyze the data.
This gives us a clear idea that information systems (e.g., C3i2, C4iVR, etc.) require
information management systems that allow analyzing the dynamics of the environ-
ment and above all to predict the emergence of new threats to the security of the
states, such as insurgent forces that are part of drug trafficking, organized crime and
terrorism [4]. It is for this reason that we have set out to establish an implementation
model of an Information Management System based on data warehouse and datamin-
ing to incorporate it into any military information system such as C3i2, C4iVR, etc.
The proposed model applies several models such as Hephaestus, Inmon, Kimball for
the data warehouse aspect and models such as decision trees, Naive Bayes, and Lin-
ear Regression for the data mining aspect. With this implementation, it is expected
to allow specialized military intelligence agencies to carry out their actions, as well
as to support the supreme command in decision-making to conduct operations2 [3].
The results with prominent, since the application of data mining with decision trees,
achieved an accuracy of 83.22 and 49.83%.
This article is structured as follows. Section 2 describes the activities carried
out by the Armed Forces (especially Latin-Americans) and the proposals of several
authors about the implementation of information management systems in command
and control systems (C3i2 or C4iVR). The implementation methodology of our pro-
posal called “Jayor2” is described in Sect. 3. Section 4 indicates the implementation
execution. The results are mentioned in Sect. 5. Conclusions and discussion described
in Sect. 6.
2 Background
The majority of the Armed Forces in the world maintain diverse, independent and
unrelated computer systems [2]. Very limited is the information that is known about
1 Command, control, communications, intelligence and computer systems of the Ecuadorian armed
the architecture of the informal systems of each Armed Forces due to its national
security character [5]. However, it is clear that there can be a variety of computer
systems within each Armed Forces. This diversity and independence may be due to
several factors such as (1) revolution and impact of new emerging technologies in
military matters that require a change in vision, structure, and capacity to guarantee
Armed Forces that can respond to the challenges of the future; and (2) its conception
according to the need and decisions of each force at the time, which has generated a
disorderly growth [3].
This worsens even more when the Armed Forces computer systems must provide
information to a command and control system for the decision-making of the high
command in the operational field. This type of computer control and control sys-
tem is called for some Armed Forces as C3i2 (Command, control, communication,
intelligence, and research); or for other Armed Forces such as C4iVR (command,
control, communications, computing, intelligence, surveillance, and recognition),
etc. Regardless of their name, the concern is that these systems or platforms lack (in
most cases) information fed in real-time.
Regarding the Latin American command and control (C3i2) systems, authors
can say that most of these systems need a manual procedure to feed them with
information on the missions from the maneuver units. An operator is the one who
records the information in the database. This implies that the C3i2 command and
control systems would not have data analytics techniques implemented. Having as a
consequence that the planning of operations is not precise, and has flaws. Triggering
in the redundancy of operations with incipient results. In this way, it is generated that
the military process in decision-making is not effective.
It is for this reason that the Armed Forces of several countries have seen this
need; and thanks to their efforts, they have incorporated to their command and con-
trol systems (C3i2, C4iVR, etc.) countless Information Management Systems to
support their military operations, even many of these management systems have
been developed based on artificial intelligence (AI) [3].
This has been ratified by Hershey [5, 6] in his 2015 studies, he generated discrete
mathematical models for decision-making, applicable to anti-aircraft defense, cyber-
attacks and even ground surveys, supported by statistical models to combine varied
information. Likewise, Smallegnage [7] in his study, he emphasizes the use of Big
Data and AI for the planning of military operations, especially in operations with
hybrid wars, where there are scenarios with a large number of factors that must
participate in the planning of operations. Goztepe [8] and Hernandez [9] in their
studies they articulated weapons systems with threats or with automated surveillance
systems for border control in order to obtain more dynamic planning supported by
artificial intelligence. Russell [10] and Chmielewski [11] go beyond the proposals
of the other authors. Their studies are aimed at obtaining information in real-time
by incorporating the use of sensors, that is, the use of the Internet of Things (IoT)
and AI in order to improve the decision-making process [12]. Obtaining in this way
much more real, accurate, and timely information.
274 J. Mayorga et al.
3 Methodology
In order to achieve the proposed objective, we have developed a methodology that will
allow us to elaborate our implementation model called “Jayor2” for an Information
Management System based on data warehouse and datamining for the military field,
as shown in the following Fig. 1.
For the development of the data warehouse, we looked for methodologies that are
widely used such as Hephaestus, Inmon, Kimball. However, after an analysis of its
use and employment, architecture, flexibility, and cost; it was determined that the
Kimball3 the methodology would be used for our implementation model [13]. The
use of this methodology is justified by the simplicity of understanding of its model and
essentially by the treatment of information through dimensional modeling, physical
design and data extraction, transformation, and loading.
Datawarehouse
Data mining
Development
Hefesto, KDD-Process,
Inmon, Crisp-DM,
Kimball Semma
Likewise, the analysis of the methodologies used for data mining was carried
out, such as KDD-Process, Crisp-DM, and Semma. The analysis was based on the
methodology that allows a better understanding of the business, data selection, model-
ing, evaluation, implementation, number of phases, tools, and usefulness of method-
ologies. The methodology selected for our implementation model is Crisp-DM4 [14].
This methodology allows the possibility of adaptation with respect to the business,
that is, it allows the analysis of military operations where a constant evaluation is
required to obtain a predictive model.
4 Execution
4.1 Conception and Development of the Datawarehouse
For the development of the Data warehouse, it was necessary to define relevant
information of the organization. In the case of the Armed Forces, normally their
information comes from various tasks and missions. Many of these missions depend
on the constitutional objective offered by each state. Regarding the missions obtained
by the military operations, as an example, it is shown in the following Table 1.
We must emphasize that military operations have unique characteristics of each
Armed Forces in Latin America. Therefore, it is necessary that they disintegrate in
tactical actions, and these in turn, in tactical tasks. All depending on the level of
military forces that execute them. For this, the Armed Forces are formed by their
Land, Naval, and Air Forces, and these forces are in turn distributed into Commands
or Operational Bodies. In all cases, the units commit various resources such as per-
sonnel, material, and equipment for the development of operations. Likewise, each
operation takes place within a certain period of time within planning. At the end
of this period of operation, the results are provided that must be accounted for and
recorded in a database for future reference.
Resources Retention
Mission_Type
Temporal Register
The primary objective of the use of data mining is to make reliable projections in
order to obtain relevant information on the development of military operations carried
out by each military unit. In this way, it is possible to determine the effectiveness and
efficiency of each operation. For this purpose, reports are generated for the analysis
that is of interest to the military command because they are necessary inputs for the
planning of new military operations.
However, the proposed data mining for military operations dealt with two criteria:
(1) in the generation of a decision model for the planning of operations, and (2) in the
prediction of patterns of military operations according to location geographical and
the type of mission carried out. The procedure for obtaining data lasted two months, in
six military units, obtaining a total of 1,968 military operations, in various provinces
and with a variety of results. The data was obtained through the use of a web interface
where it allowed to perform data exploration, verification (of the congruence) and
relevance of the information collected.
Once more solid data were obtained, extraction and loading was carried out for
the construction of reports with the Power BI tool,5 generating countless analysis
tables that provide a better perception of information for military commanders at all
hierarchical levels. Also, the RapidMiner6 tool was used for the construction and
testing of different models under three different techniques: Decision trees, Naive
Bayes7 and Linear Regression.
5 Results
After modeling the techniques for data projection, several results were determined
regarding military operations. The results are based on the three models selected
above. The first result is a function of the province (geographical location) and the
incidence of the results and the second results are a function of the type of military
operation and incidence of the findings. The following subsections detail these results.
5 It is a business analysis service from Microsoft, its objective is to provide interactive visualizations
classification algorithms.
278 J. Mayorga et al.
As in the analysis carried out in point 5.1, the Linear and Naive Bayes Regression
models did not show a model that allows commanders to make valid projections for
decision-making. However, when performing modeling through decision trees, there
were better results, with assertiveness of 49.83%. The root node generates the type
of military operation and describes the criteria of choice by virtue of the province
(geographical location) and the result that is intended to be obtained, for example,
in a particular place, the military operation of CAMEX is what Best results offered.
Jayor2: A Proposal of Information Management System … 279
The need to implement information management systems for command and control
centers (C3i2) is clear. These systems have become so important when making quick
and efficient decisions to maintain the security and defense of a country. That was
ratified by several authors [3, 5, 6, 8, 9, 11]. However, all these studies have been
shown in a theoretical model and have not had evidence of the results they have had
in their implementation since, in our review of related works, the authors did not find
articles that put into practice their proposals or implement new proposals.
The proposed implementation for command and control centers (C3i2) consider-
ing a data mining model has allowed a better analysis of the information obtained so
that future military decisions could be solved in a way more technical This allows the
operational units and even the levels of operational and strategic decision to achieve
a better prediction of the threats existing in the states.
While it is true that data mining and the use of a data warehouse help in the
transformation of data to information and thereby gain knowledge. The authors see
that these techniques are incipient at the time of obtaining predictions. Possibly, the
use of these two techniques is sufficient at the time of use for military matters because
it is very difficult to predict a “war” or a threat with a limited number of variables
and without proper training to obtain artificial intelligent agents that use Cognitive
reasoning structures valid for defense and security.
Future Works
It is intended in a future study to replicate the same implementation using other AI
techniques based on deep learning or machine learning. Likewise, IoT-based sensors
will be used to obtain real information and obtain better predictions.
References
1. Rodríguez, F.: Nuevos tipos de guerra: Lecciones a considerar, guerra justa, asimétrica,
preventiva y de baja intensidad. Revista de Estudios Transfronterizos, 135–157 (2006)
2. Von Clausewitz, K.: De la guerra, La esfera de los libros (1972)
3. Galizia, R.C.: El sistema C3I2 en la era de la información (2014)
4. Ribeiro, D.: El dilema de América Latina: estructuras del poder y fuerzas insurgentes, Siglo
xxi (1978)
5. Hershey, P.: Umberger, B.: Adaptable mission analysis and decision system. In: 10th System
of Systems Engineering Conference (SoSE), pp. 20–21 (2015)
6. Umberger, B., Hershey, P.: Analytics and simulation for decision support: good results achieved
by teaming the two. IEEE Syst., Man, Cybern. Mag. 4(1), 32–40 (2018)
7. Smallegnage, B.H.: Big data and artificial intelligence for decision making. In: Dutch Position
Paper NATO-OTAN (2017)
8. Goztepe, K.: New directions in military and security studies: artificial intelligence and military
decision making process. Int. J. Inf. Secur. Sci. 4(2), 69–80 (2015)
9. Hernandez, A.S.: Mission engineering and analysis: innovations in the military decision making
process. In: Proceedings of the American Society for Engineering Management (ASEM) 2017
International Annual Conference (2017)
280 J. Mayorga et al.
10. Russell, S.: The internet of battlefield things: the next generation of command, control,
communications and intelligence (C3I) decision-making. In: IEEE Military Communications
Conference (MILCOM) (2018)
11. Chmielewski, F.D.: Military and crisis management decision support tools for situation aware-
ness development using sensor data fusion. In: International Conference on Information
Systems Architecture and Technology (2018)
12. Reyes, C.R.P., Vaca, H.P., Calderón, M.P., Montoya, L., Aguilar, W.G.: MilNova: an approach
to the IoT solution based on model-driven engineering for the military health monitoring.
In: 2017 CHILEAN Conference on Electrical, Electronics Engineering, Information and
Communication Technologies (CHILECON) (2017)
13. Kimball, R.R.: The Data Warehouse Lifecycle Toolkit. Wiley (2008)
Leadership and e-Leadership
Military Training Mission in Iraq:
An Exploratory Case Study Research
Abstract The purpose of this paper is to investigate how military training is being
conducted by NATO coalition forces in Iraq. Thus, the intent of this paper is to dis-
cuss the implications of existing misalignments between the military forces that are
providing the training and those receiving it. To that end, we have used an exploratory
case study research, which included multiple sources of data collection for corrobo-
ration and triangulation purposes. The results that emerged from the content analysis
showed two types of outcomes that may be relevant to improve the military training
in Iraq. The first outcome is identified as the intangible actions, which were mainly
focused on social relations, with the intent of narrowing the cultural gap between
the international coalition and Iraqi forces. Without surprising, a second outcome is
identified as tangible actions, which were associated with training programs and the
establishment of tactics, techniques, and procedures (TTPs) relevant to small and
medium military units. Future research should focus on programs of “training the
trainers” in order to develop long-term teaching and move forward with sustainable
Iraqi Security Forces (ISF).
J. Reis (B)
Department of Military Science, Military Academy, CINAMIL/CISD, Lisbon, Portugal
e-mail: [email protected]
B. Reis
Military Academy, Portuguese Army, Lisbon, Portugal
e-mail: [email protected]
M. Nowakowska · A. Kazanecka
Military Academy of Land Forces, 51-147 Wroclaw, Poland
e-mail: [email protected]
A. Kazanecka
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 283
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_25
284 J. Reis et al.
1 Introduction
As cities around the world are getting bigger and bigger and the world population
is growing steadily, consequently, megacities (10 million +) are rising at a fast pace
[1]. This rapid urbanization is also threatening existing social ecosystems due to
increased urban hazards such as air pollution [2], gender-based violence [3], just to
name a few. Therefore, overcrowded urban areas, together with geopolitical interests,
in particular West Asia, are expected to remain a breeding ground for conflict. This
is even more dramatic because, in highly populated areas, military activities become
more complex, increasing the risks of endangering the lives of thousands of innocent
citizens. For a safe and secure environment in these regions, a good first step is
to build strong and committed defense and security forces. In that regard, the North
Atlantic Treaty Organization (NATO) has been making efforts in stabilizing countries
such as Afghanistan and Iraq [4, 5] by conducting training activities to develop long-
term skills for its military and police forces [6, 7]. To the best of our knowledge,
the existing literature lacks research on topics as military training. Exemplifying,
we conducted a fast search on Scopus database, on December 9th, 2019, using the
keywords “military training” AND “Iraq” and we found 35 manuscripts; moreover,
we increased the span to “training” AND “Iraq” and we found 1,183 documents. Most
part of the latter documents focused on medicine (28.3%), engineering (17.9%) and a
few percentages of social sciences (14.3%). Therefore, our objective is to fill that gap
in the literature, by conducting exploratory research to discuss the implications from
possible misalignments between the military forces that are providing training in Iraq,
and those who are receiving it. We believe this research can provide a contribution
to military science, which is under the scope of the social sciences field but also
provides guidelines to practitioners, in order to improve their training strategies.
The next section of this paper provides a brief literature review to explore the
elementary conceptual terms; the next section describes the research methodol-
ogy, explaining the sources of data collection, data analysis, and issues related
to the research validity and reliability; is followed by the results section, which
presents the summary of the content analysis; finally, the conclusions that focus on
the contributions to the theory and practice, limitations and perspectives for future
research.
2 Literature Review
There is no precise census in Iraq, the only and best available data on its population
dating from 1947 [8]. However, due to population growth, it is estimated that the
capital will reach 10 million inhabitants in a few years. The relevance of the training
is mainly focused on military operations in urban areas, which were the worst-case
scenarios. The above argument is in line with former strategists such as Tzu [9], who
stated that the worst policy is to attack cities. Even in today’s scenarios, it is quite
Military Training Mission in Iraq: An Exploratory … 285
clear that urban warfare causes more prejudice to society than in rural areas, see,
for example, the high number of civilian casualties. However, some practices have
improving these concerns, such as (1) the high accuracy of military weaponry, which
has reduced the risk of civilian causalities; or (2) the military training, which, for
example, helps soldiers acquire sufficient social skills to operate in highly populated
areas.
In Petraeus’s [10] remarks, the early stages of the Iraq war, the liberation army
was racing against the clock, because of the extremely high expectations of the Iraqi
people, but, in our view, also because of political objectives, which military forces
were pressured to achieve in short time frames. On the other hand, patience, empathy,
and humility are important factors that may be considered in the ISF’s training [11]
and therefore it is not in line with hasty decisions. So, it is important to bear in
mind that conflicts occur between nations of different cultures [12] and the potential
conflict increases with cultures as diverse as those in the Middle East and the West
[13]. In fact, cultural awareness is one of the key issues to get more effective training,
but also to share experiences between NATO and Iraqi leaders about human rights
[14] and gender integration issues [15], just to name a few topics.
Security force assistance (SFA)—training, advising and equipping allied mili-
taries—is an increasingly common US response to threats emanating from weak
states [16]. Reinforcing the previous argument, the relevance of training is also well
noticeable by the US Army, which has invested in the first and second brigades
of the first Infantry Division to train foreign forces including the Iraq forces [17].
The current NATO Mission in Iraq (NMI) is a non-combat training and capacity-
building mission that is conducted with full respect for Iraq’s sovereignty and ter-
ritorial integrity [18]. Recently, the NATO Secretary General Jens Stoltenberg met
with Prime Minister Adil Abdul-Mahdi, and highlighted that NATO’s assistance
on training Iraqi forces is a key tool in fighting terrorism [19]. Approximately 500
civilian and military personal are attached to the NMI with the bulk assigned to the
greater Baghdad area and to the Iraqi military’s Camp Taji base and Besmayah range
complex, where most of NMI’s training activities take place [20, 21]. The invest-
ment made so far is in line with political leaders in America and military leaders in
Iraq, which have repeatedly emphasized the importance of building up Iraqi security
forces as foundation for the rule of law, economic progress, and political stability
[22]. Therefore, the ISF is critical to the creation of a legitimate government in Iraq,
and to establishing the stability and security vital to Iraq’s development [23].
3 Methodology
This paper uses a qualitative and exploratory case study research that tries to explain
a phenomenon for which there is little data [24]. The field work was carried out in the
light infantry brigade “Rey Alfonso XIII” of the Spanish legion, in Almeria, Spain,
for two months. We selected the Spanish legion because of their experience in the
US-led Operation Inherent Resolve and in the NMI, which aimed to train the Iraqi
286 J. Reis et al.
Security Forces (ISF). Due to the nature of the topic to be addressed, we decided to
collect the data in a safe and secure environment, otherwise, the researchers would
have to move to a war zone. The data collection consisted of a primary source,
semi-structured interviews [25], and secondary sources, direct observation [26] and
documental analysis [27]. Using multiple data collection sources enhanced triangu-
lation and corroboration, which helps to minimize misrepresentation that may exist
when the collection comes from a single source [27].
We started the research with exploratory interviews, this process proved to be
useful to find guidance and to help designing the questionnaire [28] of the formal
interviews ahead. Once we received authorization to conduct the formal interviews,
we followed a strategy known as convenient and snowball sampling [29]. However,
we placed a restriction, only highly knowledgeable informants, who were able to
view the phenomenon from different perspectives were chosen, according to differ-
ent functional areas and different levels of responsibility [30]. The semi-structured
interviews were conducted between February 21st to April 5th of 2019, at the base
Alvarez de Sotomayor in Almeria, Spain, and each interview lasted between 30 and
60 min. The sample consisted of 17 interviews, which was very useful for the topic
we proposed to study. The last two interviews did not lead to relevant and distinct
ideas from the previous ones, which led us to think that eventually, we have reached
theoretical saturation [31].
The direct observations consisted of collecting field notes during the fieldwork,
which were recorded in informal environments [26]. Those notes contained the
respondents’ reactions and expressions to certain types of questions, as well as infor-
mal interactions during the training sessions in the field, but also sketches and pho-
tographs. That is, for two months the researcher was constantly on the lookout for
details and recorded all the interactions with the military in pre- and post-deployment.
Usually, the direct observations answered the following questions: who? said what?
when? where? and why? To corroborate the previous data, we also used official doc-
uments provided by the Spanish military who were on a mission in Iraq and consisted
of manuals and standing instructions used during the training operations.
After data were collected, it was time to analyze it according to the qualitative
content analysis technique [32, 33]. In order to systematically analyze the content,
we have also used a software known as NVivo 11 to easily identify emerging patterns
and ideas [34].
To increase the validity and reliability of the paper [27], after the second author
has collected and analyzed the data according to the content analysis technique, the
first author reviewed the entire methodological process. The latter also wrote the
manuscript according to a logical and chronological sequence of the events. The
third and fourth authors reviewed the entire article, in particular the methodological
process. Additionally, and in order to avoid misinterpretation, all the interviews were
recorded with the permission of the informants and subsequently transcribed. The
transcripts were then sent to the informants so that they could review and comment
on the text to confirm that the text truly reflected its original meaning. Finally, to
make the methodological process more consistent, we made an interview protocol
Military Training Mission in Iraq: An Exploratory … 287
so that all interviews followed a guideline, but also recorded all observations in a
diary, where all the informal conversations were documented, as well as pre- and
post-deployment activities.
4 Findings
This section presents the results of the case research. It is divided into three
subsections: intangible and tangible actions, and the house of training.
Intangible actions have been identified as all activities that are not objective or are
difficult to measure, such as social empathy, discipline, etc. Whenever Spanish train-
ers tried to optimize intangible actions, they faced some challenges in dealing with
the heterogeneity and the nature of the force.
The heterogeneity of the force was normally associated to cultural, ethnical and
religious differences. Some of these aspects are well-identified in the literature, for
instance, Gaub [7] states that cultural differences between an Arab and Western
military force are hampering the mission. Moreover, variables such as illiteracy, lan-
guage barriers, and professional gaps turned the training mission more demanding.
For instance, according to some respondents, the former Iraqi Army officers used to
be more disciplined than the new assigned, which were less motivated. The afore-
mentioned gap was partially explained by the Spanish legionnaires, as they argued
the former officers from Saddam’s army felt more committed to their country and the
Iraq society. However, the respondents also pointed out that commitment does not
mean these officers had the required technical skills or tactical proficiency. Some of
the Iraqi officers used to fight during the war, but did not have the same standards as
the Western armies, which explains the need for additional training—in general, the
trainers kept in mind that the technical level of the Iraqi military was quite low. Fur-
thermore, the respondents also reported some relevant issues as the need to motivate
the Iraqi military for training. Motivating the military personnel could be achieved
by a variety of ways, some examples are provided below: (1) using games to stim-
ulate competition was a good method to enhance the Iraqi soldiers commitment, as
they were very competitive and proud of each other when succeeding in tasks; (2)
another method was to turn the training more practical, by avoiding PowerPoint pre-
sentations or theoretical classes; (3) for some other respondents the ability to create
a strong social bond with their Iraqi counterpart was very relevant, and (4) leading
by example was a central issue, since Iraqi soldiers were more interested to follow
examples than orders.
The latter challenge was more critical since the nature of the force was related
to corruption within the Iraqi leadership in addition to the low capability to lead.
288 J. Reis et al.
The leadership issue was twofold, the Iraqi officers attained their position by paying
for a promotion or by having strong relations with a particular political group (i.e.,
nepotism), rather than for their military competencies. These last issues undermined
the coalition efforts in achieving a stable and peaceful environment.
The tangible actions have been identified as all activities that can be measured, such as
technical-tactical skills to overcome obstacles in urban areas, impacts on a shooting
range, etc. Regarding these actions, we identified some challenges that needed to be
mitigated with the measures adopted by the forces of the international coalition. The
first challenge was to control absenteeism through incentives that often related to the
use of military material during the training period, as the Iraqi military was more
interested in testing the military materials than receiving theoretical instructions.
An additional challenge is related to the simplification of technical-tactical pro-
cedures (i.e., back to basics), as the vast majority of the audience lacked technical
preparation. We found that trainers were used to train in complex environments,
using technical procedures, and technologically advanced military materials. When
these military personnel had to act in very severe training situations, where basic
training conditions are lacking, these situations added additional challenges to West-
ern forces. In that regard, when legionaries trained non-native-speaking counterparts
who had technical difficulties and who permanently feared their relatives’ life (i.e.,
these family members were alone at home on many occasions), we realized through
the legionnaires’ reactions that these conditions both technically and emotionally
difficult to manage. On the other hand, it is in this hostile environment that tangible
actions are linked to social competences because it is only possible to train in these
extreme situations if the international community stimulates relevant social relations
with their counterparts.
At the training level, we found another relevant category, which was the struggle
in unifying processes at NATO level, so that trainers always train the Iraqi military
in the same way and with the same procedures. To some extent, these arguments
are corroborated by the NATO-ATP-99, which is a NATO publication that describes
a common understanding approach to the planning and execution of a wide range
of urban operations. NATO-ATP-99 argues that it does not intend to direct Tactics,
Techniques, and Procedures (TTP), which is a national responsibility, while nations
are free to adapt the basic considerations presented to their specific training programs
and TTP as they judge appropriate [35]. Therefore, NATO should seek to provide
standardized training regardless of the nationality of the trainers. Succeeding in this
type of environment requires allies and partners building common understanding
problems, as well as common visualization of the mission and mutual confidence
and trust to operate together [11]. This category is even more relevant in modern
warfare that focuses on combat in urban areas, which requires mastering a high
number of procedures and control measures to avoid fratricide or civilian casualties.
Military Training Mission in Iraq: An Exploratory … 289
The guidelines for combat training in urban areas are too generic and just mentions
the objectives to be achieved in each training class. The underlining issue is that those
guidelines focus on the goals the force has to achieve, but not how to do it. In sum, a
possible solution is to develop basic manuals of procedures—standardization NATO
procedures—such as those that already exist for the counter-improved explosive
devices.
The house of training (Fig. 1) summarizes the main results of this research. We
argue that the NATO military trains the Iraqi security forces in an essential effort to
fight terrorism. The training mission and capacity-building have already reached 500
civilians and military personal to develop long-term and self-sufficient training with
the ultimate goal of achieving sustainable ISF’s. We have found two main roof covers,
identified as tangible and intangible actions. Each action has eight pillars, from the
intangible side of the house, we realized that the heterogeneity and nature of the force
add some challenges to training activities. If pillars such as cultural , ethnical, and
Fig. 1 The house of military training: Iraqi Security Forces versus Spanish Legion (NATO force)
290 J. Reis et al.
religious differences are undermining the mission, there are some relevant solutions
to motivate Iraqi forces: how to use games to stimulate competition or to make
training more practical by avoiding theory classes.
Another issue raised was to collect (tangible) actions to combat the absentee
and disinterest of the ISF. In this regard, the possible solutions have been to make
training more attractive by going back to basics—in other words—technical and
tactical procedures should be more understandable to Iraqi security forces. Jana
Kotorova, NATO deputy senior civilian in Iraq, recently highlighted this issue by
mentioning that NATO efforts have also established training models that fit Iraqi
requirements for reform of Iraq’s national security structures and institutions [36].
Overall, we also note that a lot of work must be done by the NATO side, as not all
trainers follow standardized procedures; therefore, it is necessary to systematize the
training following basic guidelines or manuals of procedures, accessible to the Iraqi
security forces. None of these goals can be achieved if the NATO military does not
develop proper social relations with the ISF’s—because social empathy fosters good
working relations [37–39], which may eventually allow military personnel around
the world to bridge the gap between themselves, including their counterparts.
5 Concluding Remarks
We found a few contributions in the literature about ISF training and how these
forces have evolved over time. To fill this gap in the literature, we thought it would
be helpful to provide a small contribution to key challenges, limitations, and possible
training solutions. Focusing on the latter, the theoretical opportunities to improve the
training are to enhance social relations between trainers and their counterparts. In
addition, more practical solutions focus on aspects of training standardization and
its adaptation to ISF’s technical-tactical capabilities.
This paper presents some limitations. First, we only took into consideration data
collected from the Spanish legion; the data from the ISF is missing due to difficulties
in accessing the study site. Second, the case study itself also presents some limi-
tations, as this paper has no perspectives of generalization, as the results focus on
a particular context and specific period of time. In other words, it is generalizable
to theoretical prepositions, but not to populations or universes [24]; therefore, these
results may not be the same when comparing, e.g., with the Afghan National Security
Forces (ANSF) training.
Future research should focus on programs of “training the trainers” in order to
develop long-term, self-sufficient training to achieve sustainable ISF in the future.
These programs are already ongoing, while few articles already focus on this theme,
such as Tigner [20], which argues that NATO’s train-the-trainer mission in Iraq is
making progress on several fronts, including ordnance disposal, equipment codifi-
cation, and cyber-awareness training. An alternative to the previous suggestion is
to investigate the possibility of gender inclusion training modules in the ISF, which
would be useful in a male-dominated context. The challenge of integrating women
Military Training Mission in Iraq: An Exploratory … 291
into military and security forces is a hot topic in Western culture [40, 41], so it is
likely that the international community and NATO will also try to promote a culture
of equality within the ISF—a good first step is to start on the educational/training
side.
Acknowledgements Special thanks to the Erasmus + program, which sponsored all the expenses
related to data collection in Almeria-Spain, and the Military Academy Research Center (CINAMIL),
which funded the conference proceeding. Last but not least, thanks to the Erasmus team of the Por-
tuguese Military Academy, which facilitated the entire process related to the institutional mobil-
ity and the anonymous respondents from the Spanish legion, who decisively contributed to the
publication of this paper.
References
1. Zhao, S., Guo, N., Li, C., Smith, C.: Megacities, the world’s largest cities unleashed: major
trends and dynamics in contemporary global urban development. World Dev. 98, 257–289
(2017)
2. Baklanov, C., Molina, L., Gauss, M.: Megacities, air quality and climate. Atmos. Environ. 126,
235–249 (2016)
3. Jowell, A., Zhou, B., Barry, M.: The impact of megacities on health: preparing for a resilient
future. Lancet Planet. Health 1(5), e176–e178 (2017)
4. Saikal, A.: Afghanistan’s transition: ISAF’s stabilisation role? Third World Q. 27(03), 525–534
(2006)
5. Harris, B.: Stabilizing Iraq: Intelligence Lessons for Afghanistan. The Washington Institute
(2009)
6. Lynch, R., Janzen, P.: NATO Training Mission-Iraq: Looking to the Future. National Defense
University Washington DC Institute for National Strategic Studies (2006). Retrieved 12 Dec
2019 from https://apps.dtic.mil/dtic/tr/fulltext/u2/a521751.pdf
7. Gaub, F.: Building a New Military? The NATO Training Mission-Iraq. NATO Defense College
Research Paper, vol. (67), pp. 2 (2011)
8. Adams, D.: Current population trends in Iraq. Middle East J. 10(2), 151–165 (1956)
9. Tzu, S.: The art of war. In: Strategic Studies, pp. 86–110. Routledge (2014)
10. Petraeus, D. (2006). Learning counterinsurgency: observations from soldiering in Iraq. In:
Army Combined Arms Center Fort Leavenworth KS, pp. 1–12 (2006)
11. Donahue, B., Eno, R., Rowan, M.: Their leadership and ownership: concepts for warfare by,
with, and through. Infantry Mag. 107(1), 1–62 (2018)
12. Huntington, S.: The Clash of Civilizations and the Remaking of the Modern World. Simon and
Schuster, NY (1996)
13. Greaves, S.: A primer of middle Eastern leadership culture. J. Strateg. Secur. 5(4), 99–118
(2012)
14. Katzman, K.: Iraq: Politics, governance, and human rights. In: Library of Congress, Congres-
sional Research Service, Washington DC (2012)
15. Sjoberg, L.: Gender, Justice, and The Wars in Iraq: A Feminist Reformulation of just war
Theory. Lexington Books (2006)
16. Biddle, S.: Building security forces and stabilizing nations: the problem of agency. Daedalus
146(4), 126–138 (2017)
17. Kucera, J.: US Army brigades to train foreign forces. Jane’s Def. Wkly., 563–564 (2006)
18. NATO.: NATO Mission Iraq (NMI) (2019). Retrieved 9 Dec 2019 from https://www.nato.int/
nato_static_fl2014/assets/pdf/pdf_2019_10/20191023_191023-factsheet-NMI-en.pdf
292 J. Reis et al.
19. NATO.: NATO Secretary General in Iraq: Training National Forces is a Key Tool in Fight-
ing Terrorism (2019). Retrieved 9 Dec 2019 from https://www.nato.int/cps/en/natohq/news_
168923.htm
20. Tigner, B.: NATO’s training mission in Iraq gaining momentum. Jane’s Def. Wkly. (2019)
21. NATO3.: NATO Mission Iraq (2019). Retrieved 11 Dec 2019 from https://jfcnaples.nato.int/nmi
22. Miska, S.: Growing the Iraqi security forces. Mil. Rev. 85(4), 64 (2005)
23. Cordesman, A., Lanier, S.: Strengthening Iraqi military and security forces. Center for Strategic
and International Studies, Washington (2004)
24. Yin, R.: Case Study Research and Applications: Design and Methods. Sage publications (2017)
25. Galletta, A.: Mastering the Semi-structured Interview and Beyond: From Research Design to
Analysis and Publication, vol. 18. NYU press (2013)
26. Kothari, C.: Research methodology: methods and techniques. New Age Int. (2004)
27. Mills, A., Durepos, G., Wiebe, E.: Encyclopedia of Case Study Research. Sage (2010)
28. Saunders, M., Lewis, P., Thronhill, A.: Research Methods for Business Students, 4th ed..
Prentice Hall (2007)
29. Given, L.: The Sage Encyclopedia of Qualitative Research Methods. Sage publications (2008)
30. Reis, J., Amorim, M., Melão, N.: Service failure and recovery in technology-based business
networks. Int. J. Qual. Serv. Sci. 11(1), 2–15 (2019)
31. Saunders, M., Townsend, K.: Reporting and justifying the number interview participants in
organizational and workplace research. Br. J. Manag. 27(4), 836–852 (2016)
32. Drisko, J., Maschi, T.: Content Analysis. Pocket Guides to Social Work. Oxford University
Press, Oxford (2015)
33. Neuendorf, K.: The Content Analysis Guidebook. Sage (2016)
34. Skålén, P.: Service marketing control as practice: a case study. Qual. Market Res. Int. J. 14(4),
374–390 (2011)
35. NATO-ATP-99.: Urban tactics. North Atlantic Treaty Organization (2017). Retrieved 12 Dec
2019 from https://standards.globalspec.com/std/10145545/ATP-99
36. NATO4.: NATO Continues to Strengthen Iraqi Security Structure Through New Mission in
Iraq (2018). Retrieved 11 Dec 2019 from https://jfcnaples.nato.int/nmi
37. Pastor, I.: Leadership and emotional intelligence: the effect on performance and attitude.
Procedia Econ. Fin. 15, 985–992 (2014)
38. Singer, T., Klimecki, O.: Empathy and compassion. Curr. Biol. 24(18), R875–R878 (2014)
39. Preckel, K., Kanske, P., Singer, T.: On the interaction of social affect and cognition: empathy,
compassion and theory of mind. Curr. Opin. Behav. Sci. 19, 1–6 (2018)
40. Reis, J., Menezes, S.: Gender inequalities in the military service: a systematic literature review.
Sex. Cult. 1–15 (2019). https://doi.org/10.1007/s12119-019-09662-y
41. Reis, J., Gonçalves, R., Menezes, S., Kaczynska, M.: The obstacles women face in gaining
access to special operations forces. In: Developments and Advances in Defense and Security,
pp. 281–291. Springer, Singapore (2020)
Cultural Awareness for Civilian-Military
Cooperation in Sub-Saharan Africa
Abstract This research provides a brief overview of the context for the military’s
effort to build cultural capacity in the region of Sub-Saharan Africa. It goes on to
highlight the newest CIMIC doctrine about the importance of culture, the explanation
of idea and importance of cultural awareness and the cultural context of the region of
Sub-Saharan Africa with the ideology of post-tribal societies. It gives particular atten-
tion to the situation in Africa and misunderstanding as it goes with “westernization”
of peacekeeping operations.
1 Introduction
Over the past decade, so-called “clash of civilizations” was shaping policy at the high-
est levels and has stimulated and justified a range of strategic and tactical practices
within the military. As a consequence, problems that needed to be solved included
refugee settlement and evacuation, refugee camp management and civil assistance.
Gradually, the activities of civil-military cooperation became essential for the prepa-
ration and conduct of modern military operations. It became clear that to solve a
number of problems affecting both the civilian population and the military actors,
there is no one-sided decision [1]. Cultural knowledge becomes to be understood as
a warfighting strategy to extract influence over the context of conflict by controlling
“human terrain”. In 2007, the United States’ Department of Defence initiated the
© The Editor(s) (if applicable) and The Author(s), under exclusive license 293
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_26
294 M. Nowakowska et al.
Human Terrain System. It was the idea to provide combat commands personnel with
the human and cultural terrain expertise, so commanders could understand different
cultural environment [2].
The end of the Cold War and post 9/11 realities placed the understanding of
conflicts in cultural terms. In response to the military exigencies of Afghanistan and
Iraq exposed a “cultural knowledge gap” as Albro and Ivey described [1]. In the
twenty-first century, the military was tasked with operating in a domain covered by
humanitarian agencies and as a result to operate in a manner similar to a humanitarian
agency. Use of the culture for warfighting and the relevance of culture for effective
negotiations remains a potential challenge.
Contemporary conflicts have shown that establishing an agreement with the public
and its favorable attitude towards military operations determines the success of the
entire operation.
Changing social conditions and the need for environmental cooperation have
forced the military and civilian organizations to cooperate in order to achieve mission
success and solve a much wider range of issues. There are various situations when
the military must perform tasks that are not of a military nature. This puts even more
emphasis on civil-military relations and makes it necessary to analyze a relatively
new phenomenon in the army, i.e., civil-military cooperation (CIMIC). Coordination
and cooperation between commanders and the civilian environment—including the
society of a region, local and international authorities as well as non-governmental
organizations and agencies—is the broadly understood meaning of civil-military
cooperation [3]. According to the doctrine of NATO for CIMIC, the definition of
CIMIC is “The coordination and cooperation, in support of the mission, between
the NATO Commander and civil actors, including national population and local
authorities, as well as international, national and non-governmental organizations
and agencies” [4].
To understand civil-military cooperation it is essential to identify that civil
resources are increasingly more important for the success of the operation and
essentially depend on the appropriate level of coordination between the military
and unarmed actions.
The aim of the article is to theoretically approximate the issue of cultural awareness
in missions in culturally deprived areas. The latest NATO doctrine on civil-military
cooperation with an emphasis on cultural aspects has been analyzed. Freedom of
interpretation of the doctrine and the need to adapt it to the region of activity were
demonstrated. Particularly interesting is the Sub-Saharan African region, extremely
diversified even within one country. We cannot apply European or Middle or Far
East standards to the region of Sub-Saharan Africa.
Analysis of the literature on the subject showed a significant gap in research on
the cultural awareness of the area. In Western studies, cultural knowledge is limited
to the Middle East. Mostly local researchers deal with Sub-Saharan Africa, demon-
strating the dependence of peacekeeping missions on regional primarily economic
organizations [5], and demonstrating the inefficiency of supra-regional organizations
[6, 7].
Cultural Awareness for Civilian-Military Cooperation … 295
The literature reviews show the subject geared primarily to issues of humanitar-
ian aid in the African region, while there are no sufficient studies on the cultural
awareness of NATO soldiers participating in missions in the area [8]. There are
studies on military culture, but they deal with interaction and intercultural commu-
nication among soldiers within a single contingent, without the important issue of
communication with the local population [9].
This article is a theoretical introduction to research conducted among NATO
soldiers participating in peacekeeping missions in Sub-Saharan Africa to determine
their cultural awareness, deficiencies, and errors causing by “culture gap”.
We can find the specific descriptions in the doctrine about the importance of cultural
awareness: “cultural property protection as a subject of Cross-cutting topics (CCTs)
are a range of different topics which could affect the mission in a number of ways,
but which fall outside of the military’s primary responsibilities” [3]. This doctrine
highlights the importance of cultural awareness of every soldier serving as part of an
international mission.
We can also find the directions to act for the soldiers due to the subject of gender as
an integral part of the cultural awareness in the military: “during NATO operations,
it is important to obtain a clear understanding of the local culture, society and envi-
ronment (i.e., context) which are fundamentally influenced by the culture-specific
notions of gender” [4]. The doctrine emphasizes the promotion of gender equality
relevant to the operation. Understanding the local context need to be reiterated and
taking advice and recommendations from both women and men is one of the priority.
“The forces must understand the cultural context within which they are operating
and not simply apply their own norms, laws, and behavior. However, the distinction
between international and local law, human rights and culture must be analyzed and
addressed. Lessons learned indicate that a mixed-gender force enhances the sharing
of information and is instrumental in garnering trust and credibility” [4]. This part
shows how important it is to train soldiers, especially officers before going to cul-
turally different countries. The quoted text highlights the importance that should be
placed on cultural related training of soldiers and officers before a foreign deploy-
ment. The aim of such training is to bridge the gap between the soldiers’ own culture
and potentially many cultures that the soldier will come into contact during the period
of deployment.
A separate part of the doctrine informs us about cultural property protection (CP).
The history of the tenth century showed us the essence of the value of culture. The
destruction of heritage was recognized as a crime according to International Human-
itarian Law and ordered to protect all monuments, both material and immaterial.
“Culture plays an essential role in modern-day conflict as the identity of a group
of people is often connected to symbols reflected in buildings, monuments, and
296 M. Nowakowska et al.
3 Cultural Awareness
Cultural awareness becomes one of the most important factors determinate success
or failure during international peacekeeping operations. Nowadays, assailed as we
are by plenty of images, by permanent and rapid change, and by a strong need
for self-determination and identity, cultural competence has become of paramount
importance. It is difficult to overemphasize the importance of this competency in a
Cultural Awareness for Civilian-Military Cooperation … 297
period in which openness, optimism, and tolerance are placed under such strain all
over the world.
Culture is considered a central concept in the anthropology of culture, encompass-
ing the range of phenomena that are transmitted through social learning in human
societies.
The rise of cultural anthropology took place within the context of the late nine-
teenth century when questions regarding which cultures were “primitive” and which
were “civilized” occupied the minds of Europeans [10]. Colonialism and its processes
increasingly brought European thinkers into direct or indirect contact with “primitive
others.” The relative status of various humans, some of whom had modern advanced
technologies that included engines and telegraphs, while others lacked anything but
face-to-face communication techniques and still lived a Paleolithic lifestyle, was of
interest to the first generation of cultural anthropologists [11].
The term “cultural competence” is based on a great deal of research and scholarly
thinking, and requires not only learning but also practicing. It can sound like an over-
whelming concept to take in, particularly considering how many different cultures
there are worldwide, and the fact that each individual within a culture is just that:
one person, with unique feelings and perspectives on their own cultural beliefs and
values [11].
Some aspects of human behavior, social practices such as culture, expressive
forms such as art, music, dance, and religious rituals, as well as the development and
use of tools for cooking, building shelter, and making clothing are said to be cultural
universals found in all human societies.
The concept of material culture covers the physical expressions of culture, such
as technology, architecture, and art whereas the immaterial aspects of culture such
as principles of social organization (including practices of political organization and
social institutions), mythology, philosophy, literature (both written and oral), and
science comprise the intangible cultural heritage of a society.
A person’s cultural awareness “is their understanding of the differences between
themselves and people from other countries or other backgrounds, especially differ-
ences in attitudes and values”. According to Winkelman, awareness of cultural dif-
ferences and their impact on behavior is the beginning of intercultural effectiveness.
He states that “cultural self-awareness includes recognition of one’s own cultural
influences upon values, beliefs, and judgments, as well as the influences derived
from the professional’s work culture” [12]. Cultural awareness is the first step in
becoming proficient in working well with people from a variety of cultures.
In analyzing Sub-Saharan Africa, we should take into account: tribal/ethnic/nation
identity determinants, traditions, customs, lifestyles, and beliefs of others, cultural
norms and differences, awareness of verbal and non-verbal communication, human
dignity, equality, and non-racism.
298 M. Nowakowska et al.
In Africa, we don’t have tribe-nation, just tribe-state. North African countries were
united by religion—Islam, and language—Arabic. There, religion has become a
supra-political and supra-ethnic factor and has contributed to the formation of nations
in Saharan Africa, by applying a pre-industrial tradition, kept by the clergy, to the
formation of a national idiom and belief system adopted by the modern community.
The situation in Sub-Saharan Africa is even more complex and fluid in ethnic terms.
It should be remembered that in the pre-colonial era, the racial factor did not play
a role in identity formation. People living in tribal groups did not recognize skin
color as one of the main determinants of self-identification. In postcolonial Africa, a
model of the state remained based not on the community of culture, but on postcolo-
nial political and geographical structures. Modern countries appeared there among
linguistic communities, entangled in the system of tribal organizations, and at the
same time lacking expressive ethnic awareness. To unify culture and impose the
idea of a nation, a foreign, European culture was used. Colonial domination had left
effective governments with political units lingering in permanent, clearly delimited
areas. At the same time, the rule by white people caused the formation of nationalist,
separatist movements which unified all non-white inhabitants of a given territory,
designated by the colonial administration and covering areas with a heterogeneous
historical past.
Despite these trends connecting Sub-Saharan Africans, one cannot generally
speak in terms of nations, but rather tribes or ethnic groups. Language and cul-
ture were an important component of collective consciousness, but origin played a
key role. The tribe, understood as a homogeneous and culturally integrated local and
regional community, did not exist in the strict sense in Sub-Saharan Africa, although
the lives of the inhabitants were enclosed in small not necessarily homogeneous local
communities [13].
It is believed that the “tribe” appeared in the colonial era as a result of the inten-
tional actions of colonial states or the intentional actions of other institutions foreign
to Africans. Responsibility for the creation of this concept is attributed to (i) mission-
aries who, while creating religious texts in native languages, favored certain local
dialects at the expense of others, then selected which dialects to use to create the lan-
guage of the entire tribe, (ii) researchers, who in monographs of ethnic groups painted
the idealized image of homogeneous and culturally integrated communities thereby
creating them, and (iii) the state administration [14]. Researchers reconstructed the
reality they studied, guided by a vision they had created. As a result, models of static
and closed societies were created. Following a period of intensive non-European
field research, work relating to African Political Systems was published for the first
time in 1940 [15].
In the colonial period, when most research was conducted on tribal communities,
the political context was of decisive importance for the theoretical construction of the
subject of research. Researchers received financial support from institutions that were
interested in maintaining and consolidating the colonial order. Anthropologists were
Cultural Awareness for Civilian-Military Cooperation … 299
the premise of integrating French-speaking ethnic groups. From this idea comes the
ideology of Negritude, i.e., a set of civilization-cultural, economic and political values
characteristic of black people. These values, contrasted with Westerner’s civilization,
were to become an instrument in the fight against colonial domination. The unification
of African states was also served by the African Unity Organization established in
1963, renamed the African Union in 2002.
In Sub-Saharan Africa, we can find the new idea of identity—post-tribal one. A
post-tribal society is a society in which the cultural features and elements of the
structure that are typical of tribal society, such as small scale of social systems,
the dominance of ethnocentric attitudes, concentration of social roles in the same
people or institutions, collectivism and the resulting concept of a human being sub-
ordinated to the community, advantage of blood relationships over any relationships
and related ones: principles of loyalty and traditional sources of prestige (seniority
relations), etc., continue to prevail. In a selective and processed way, they are mixed
with institutions and principles imported from the Western cultural circle such as a
relatively large scale social systems, the project of the nation as an integrated—but
pluralistic—community, the concept of “freedom” raised to the rank of doctrine, a
social organization based on the dominance of free trade unions, parliamentarism,
the drivers of personal success based on education, individualistic attitudes regarding
women’s rights, consumerism and more generally an approach of putting the rights
and needs of the individual over the needs of the community [14].
So post-tribal is a society in which the characteristics of culture and elements
of structure which are typical of tribal society blend in with institutions and rules
imported from the Western cultural circle.
In spite of many attempts at integration in postcolonial Africa, conflicts still go
back to their tribal divisions, which have little in common with the colonialist states
and the nations inhabiting them, that were created using the model of European
countries and nations.
But in the African context we most of the time have contacts with government-
linked paramilitaries to local groups [17]. Where structures are formalized, partic-
ularly in Sub-Saharan Africa armed groups often present themselves as alternative
governments in order to extract money and favors from civilians, while hiding behind
a facade of legitimacy and marginalization.
Therefore, based on the research of military relations from an insider’s point of
view by Francis Onditi and Pontian Okoh we can observe that first knowledge of the
fact that “the success of civil-military relationship has been attributed to structured
civil-military coordination” [7], where we can see the inconsistency of applying pre-
viously agreed upon standards between the AU and REC has created new grievances
which have resulted in renewed conflict.
Second, “the geopolitics of regions has been found to facilitate or hinder devel-
opment of ASF structures” [7], which means that regional forums are more capable
of facilitating a collective approach to social affairs.
Third “Regional Mechanisms have evolved into a militarized culture” [7], where
over 50% of the ASF structures were military in nature.
Fourth, the fact that “key actors in African PSO have inadequately addressed the
causes of training-deployment transition gap” [7]. In this case, military academies
are recommended to embrace the concept of the “thinking soldier” and peacekeepers
must be willing to be more flexible and more adaptive to the operational environment.
And the last issue is the lack of ideological orientation and the inability of peace-
keepers within the ASF structures to adopt a new mindset. Most military personnel
is conservative in outlook due to traditional values and connect to the ruling party
[7] which has resulted in military officers adapting the same values and behavior
patterns as the politicians.
As we can see there is a need for innovation in how to embed non-state actors in
the decision-making processes.
Therefore, within the context of AU PSO, it is important that structures established
to develop peacekeeping and the capacities of peace operations (including regional
mechanisms, regional economic communities, regional organizations, Peacekeep-
ing Training Centres of Excellence, the African Peace Support Trainers Associa-
tion (APSTA), Think Tanks and civil society organizations and decision-making
processes (AU) and governments) are inclusive of civilians, police and the military.
6 Conclusions
Many civilians as well as military institutions critique AU and its institutions for their
responsibility in restraining Africa from achieving “development, peace and security
goals is the way in which governance in Africa and institutions at various levels are
constituted, structured and manager” [18]. The doctrine that should regulate CIMIC
on the African continent is the African Capability for Immediate Response to Crisis
(ACIRC), which is a military concept with the lethal potential of increasing the
dimension of African conflicts with African Standby Forces (ASF). But adapting
302 M. Nowakowska et al.
References
1. Grigorov, G.: Emergence and development of civil-military cooperation. Int. Conf. Knowl.
Based Organ. 23(1), 119–123 (2017)
2. Gonzales, R.: ‘Human terrain’ past, present and future applications. Anthropol. Today 24(1),
21–26 (2008). http://onlinelibrary.wiley.com/doi/10.1111/j.1467-8322.2008.00561.x/pdf. Last
accessed 10.01.2019
3. Albro, R., Ivey, B.: Introduction: military cultural capacity after Afghanistan. In: Albro, R.,
Ivey, B. (eds.) Cultural Awareness in the Military. Palgrave, New York (2014)
4. NATO: Allied Joint Doctrine for Civil Military Cooperation—AJP-3.4.9. NATO Standardiza-
tion Office (2018)
5. Ferreira, R.: Irregular warfare in African conflicts. S. Afr. J. Mil. Stud. 38(1) (2010)
6. Mays, T.: African solutions for African problems: the changing face of African mandated peace
operations. J. Confl. Stud. 23(1) (2003)
7. Onditi, F., Okoth, P.: Civil-military relations and the African standby forces’ multidimension-
ism. J. Afr. Confl. Peace Stud. (2). http://dx.doi.org/10.5038/2325-484X.3.1.1087
8. Ankersen, C.: Civil-Military Cooperation in Post-Conflicts Operations. Emerging Theory and
Practice. Routledge, London (2013)
9. Ruffa, C.: Military Cultures in Peace and Stability Operations. University of Pennsylvania
Press, Philadelphia (2018)
10. Tylor, E.: Primitive Culture. Dover Publications, Mineola-New York (2015)
11. Burszta, W.: Antropologia kultury (in eng. Anthropology of Culture). Zysk I S-ka, Poznan
(1998)
12. Winkelman, M.: Cultural Awareness, Sensitivity and Competence. Kindle (2005)
13. Nowakowska, M.: Kulturowe Aspekty Bezpieczeństwa (in eng. Cultural Security Aspects).
AWL, Wroclaw (2017)
14. Vorbrich, R.: Plemienna i postplemienna Afryka (in eng. Tribal and Post-tribal Africa).
Wydawnictwo Naukowe UAM, Poznan (2012)
Cultural Awareness for Civilian-Military Cooperation … 303
15. Fortes, M., Evans-Pritchard, A.: African Political Systems. Routhledge, London (2015)
16. United Nations Department of Peacekeeping Operations (1990–2012) Monthly summary
of country contributions detailed by missions. http://www.un.org/en/peacekeeping/resources/
statistics/contributors.shtml. Last accessed 2019/02/12
17. Anders, B.: Tree-huggers and baby-killers: the relationship between NGOs and PMSCs and its
impact on coordinating actors in complex operations. Small Wars Insur. 24(2), 278–294 (2013)
18. Maphosa, S.: Partnerships in peace operations-emerging and promising future orientations of
peace support operations in Africa. Afr. Insight 44(3), 111–128 (2014)
Situational Awareness of Leadership
in Ecuador and Its Applicability
in the Multilevel Military Leadership
Model
1 Introduction
On the broad topic of leadership, there is no unified theory, so Kort [1] mentions
that after reviewing more than two hundred definitions of leadership, the common
aspect is that leadership is about a person, who is the leader, which makes other
people (influence), known as followers, perform activities in search of a goal. The
definitions differ in detail regarding the roles of leaders and their characteristics [2].
C. H. Puga (B)
Programa de Doctorado de Economía y Empresa, FAE, Universidad de Málaga, Malaga, Spain
e-mail: [email protected]
P. Suárez · V. Ramos
Escuela Politécnica Nacional, Quito, Ecuador
I. Abad
Universidad de Málaga, Malaga, Spain
A. F. Jimenez
Centro de Investigación y Desarrollo FAE, Pedro Escobedo, Ecuador
© The Editor(s) (if applicable) and The Author(s), under exclusive license 305
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_27
306 C. H. Puga et al.
Likewise, Bennis and Nanus (1985) as cited in [3] indicate that one of the dif-
ferences between leader and boss is manifested in the representation of authority,
leadership represents informal authority, from the moral and emotional; while the
boss is linked to the formal institutional authority, with specific specifications to the
position and hierarchy given according to the organizational one. Thus, Luthe in his
book El Líder, from 2006, mentions that leading, directing, guiding others is not a
simple task, since it is not just about issuing provisions or orders for subordinates to
route their fulfillment, but to develop in the followers the task of making themselves.
In this sense, the researchers Avolio et al. [4] determine leadership as a universal
phenomenon, which deserves to be studied and deepened in various places around the
world. Therefore, there are several studies in Latin America that seek to understand
and determine what kind of leadership has the greatest impact or influence to obtain
better results within the lines of command in various fields, such as organizational,
political, military, social, or environmental. In addition, they add that leadership is
linked to the culture of a place, through values, ideals, norms, and beliefs [3].
Therefore, the need to study leadership in the specific Ecuadorian context is con-
sidered relevant under the conceptions mentioned above of leadership, specifically
seeking to establish the relationships between the type or style of leadership and the
culture of a nation and its link to progress of societies.
At the international level, some leaders such as Gandhi, Mandela, Luther King,
among others, have influenced with their leadership style in the transformation of
several countries, in the social, political, economic aspect, generating actions of
change in society and in some organizations [5].
On the other hand, several researchers affirm that the type of leadership is influ-
enced by the environment, values, specific norms of each culture, that is, the lead-
ership could have specific characteristics according to the country where the study
is carried out. Specifically in Ecuador, after the literature review, no other studies
have been found that tend to identify the predominance of a leadership style in the
Ecuadorian population, nor specifically in the Ecuadorian Armed Forces. Therefore,
the importance of research lies in trying to establish other dimensions related to
leadership in Ecuador.
So, it is essential to know the predominant leadership style in Ecuadorian orga-
nizational management, which corresponds to the specific culture of this country. In
order to determine the leadership style, it is pertinent to use important tools, known
and proven internationally; for this, it is necessary to indicate that the theory on which
this study was based is related to the Multifactor Leadership Questionnaire (MLQ),
of Bass and Avolio [4, 6].
This questionnaire has been applied in research in several countries with the
purpose of determining the predominant leadership style; for which, in some cases,
it has adapted to the specific needs of the place where it has been applied. In this
Situational Awareness of Leadership in Ecuador … 307
The Full Range Leadership Model (FRLM) was proposed by Bass and Avolio,
leading leadership researchers, who based their theory on charismatic and trans-
formational leadership, to establish this leadership model, also called Multifactorial
Leadership Theory. This model includes three types or styles of leadership that are:
transformational, transactional, and laissez-faire.
Likewise, they raised the aforementioned MLQ questionnaire, with the purpose of
having a tool that allows evaluating and determining these three types of leadership,
with their characteristics and effects.
Transformational leadership focuses on motivating, transforming, inspiring, pay-
ing attention to their followers, modifying their way of thinking, leading them to over-
come personal interests, seeking optimal performance based on a new vision, seeking
to achieve group goals, in organizational benefit. This leadership style comprises five
factors listed below [3, 7] (Fig. 1 and Table 1).
Transactional leadership is characterized in that the achievement of established
goals, or good performance involves a reward, be it financial or moral; so too, the
negative results bring negative actions of the leader. It does not present a vision of
the future; on the contrary, it concentrates on the current. The leader acts actively
through corrective actions, and his passive action ends when he must solve problems.
It comprises three factors, listed in Table 2 [3, 7].
The leadership laissez-faire (whose translation from French is “let do”) is consid-
ered the most passive and least effective, is a lack of leadership, in which the leader
avoids making decisions, evades tasks, and be involved in matters transcendental.
Fig. 1 Leadership styles FRLM. Source Prepared by the authors, adapted from Bass and Avolio
Subsequently, the extended multilevel model classifies the levels into three accord-
ing to the complexity of the tasks, with the direct or production level being the lowest
in the organization; the organizational is the middle level; the systems or strategic
level is the highest [10, 11]. In the same vein, Reeves [12] presents the classification
of leadership as junior with lower levels, medium with its role in the integration of
the company, and superior with strategic execution.
Hence, the conception of the type of individual leadership in the 1980s, organiza-
tional in the 1990s and multilevel since 2000 [13]. Similarly, it establishes the basis
for the application of multilevel leadership theory in the organizational field, which
is very compatible with a classification of military leadership on three levels, which
is related to the specific characteristics of the Armed Forces.
Thus, military leadership is made up of three levels: tactical, operational, and
strategic leadership; division that correlates with the classification of the three levels
of military leadership, which is widely known and is part of the doctrine of the Armed
Forces.
Tactical leadership is the lowest level in the military institution; it pursues the
development of the capacity to execute actions with the available means, in search
of achieving the proposed ends. It is the level that has more certainty and less com-
plexity. Without it being a rule, in general, it can be constituted by the personnel of
officers in the first ranks of the military career, although it depends on the leadership
development that they are reaching.
Operational leadership is of medium level; in it, the ends related to the means,
as well as the complex decisions and guidelines of the strategic level with the tasks
to be fulfilled at the tactical level. It is a level that examines a lot of information to
advise at a higher level, based on the understanding and interaction of organizational
systems. The officers who are in the middle ranks, the so-called middle management,
could be part of this level.
Strategic leadership is the one of superior levels because it establishes the orga-
nizational objectives. It takes place in a volatile, uncertain, complex, and unknown
environment, in which the leader relates to external organizations, with different
characteristics. It requires a thorough knowledge of the national, regional, and world
levels, with a capacity for negotiation and successful decision making, due to the
310 C. H. Puga et al.
These are the skills that must be developed by the leaders for the evolution and growth
of their leadership.
Among the institutional competencies are technical, personal, and conceptual.
Technical competencies, which cover specific technical knowledge, decrease as
the level of leadership increases from tactical to strategic; on the other hand, per-
sonal competences, which include interpersonal and intrapersonal, are maintained,
as they are essential at all levels and leadership, while conceptual competences,
which includes the ability to think and conceptualize, grow as the level of leader-
ship increases, until reaching the strategic level in which important aspects of the
organization are resolved.
In reviewing these institutional competencies in more detail, we have to, technical
competencies refer to the ability to use technical knowledge, procedures, and tools
in the development of specific tasks, required at all levels of leadership, but to a
different degree; at the tactical level, it consists of using or maintaining a team or
system, seeking to solve specific problems, as well as performing specific tasks. At
the operational level, it may refer to establishing a network of systems, while, at
the strategic level, they contribute in decision making, by synchronizing information
with a system of systems, or an articulated structure between the Armed Forces or
military units, seeking the resolution of major organizational problems [7, 14], (Katz,
1974, as cited in [15]).
Personal skills mention the ability to interact effectively in the personal, team
and organizational field; which is starting with the development of self-leadership,
self-awareness, values, emotional intelligence, teamwork, developing relationships
of trust and solidarity, fostering an environment of empowerment and motivation,
aimed at achieving goals. Therefore, it is essential at all three levels of leadership, but
in a different way; in the tactical level, they can refer to interpersonal relationships
related to subordination; at the operational level, it interacts with the upper and lower
levels; at the strategic level, they are more lateral relationships, with collaboration,
persuasion, negotiation skills being necessary, within a framework of trust and mutual
respect [7, 14, 16], (Katz, 1974, as cited in [15]).
Finally, conceptual competencies encompass the ability to think and conceptu-
alize abstract and complex situations, by they are more developed at the strategic
level than at the other levels, since relevant information is analyzed and processed,
whether external and internal, that makes it easier to understand and project suitable
planning, as well as adequate decision making, visualizing key situations, identifying
Situational Awareness of Leadership in Ecuador … 311
Military leadership has been an interesting and permanently topical issue for some
leadership researchers, due to the opportunities and importance of research in this
field, bringing up the Hunt multilevel leadership model, due to the various aspects it
considers [17]. Classified in three levels, which can be adequately related to military
driving levels.
The military must develop different competencies required by the institution,
among which are the technical, personal and conceptual, that will allow to advance to
the following levels of military leadership, and that within the sphere of organizational
leadership, are related to the skills or managerial skills of Katz (Fig. 2).
Thus, predominantly technical skills, due to their specificity, are more necessary
at the tactical level, and they decrease as the leader is at a strategic level, which is no
longer purely technical. On the other hand, personal competencies are required at all
levels, although they evolve, from individual leadership, through team leadership and
reaching leadership of the organization, with the capacity for the relationship that this
implies. In the end, the conceptual competences must be developed until they reach
the strategic level, in which a global concept is required to lead the organization.
Fig. 2 Multilevel military leadership model. Source Prepared by the authors, based on [7, 14, 16]
312 C. H. Puga et al.
The results obtained will be useful for the organizational authorities, who can ana-
lyze them and make decisions regarding the diagnosis of institutional leadership and
direct the institutional projection of this issue. Additionally, the study, methodology,
tools, related variables, and structured model expected to be a reference for research
of this type, at regional and global level, highlighting the importance of the influence
of leadership style in the organizational management of Armed Forces, considering
multilevel military leadership.
4 Results
The study conducted on the Ecuadorian population was applied randomly, not to a
specific group or organization, obtaining 536 responses, in several cities in Ecuador,
that is, with a national impact, with 95.77% reliability and a margin of error of
±4.23%, which reflects some results, mainly those commented on in the following
paragraphs [3].
Transactional leadership is the one that predominates in Ecuadorian society, prob-
ably due to the condition of telling the followers what to do to be rewarded and have
rules that regulate their performance.
Regarding leadership and personal characteristics, Ecuadorian women use trans-
actional leadership more. Besides, leadership is also influenced by age so that the
youth of the country tend to have the type of leadership laissez-faire, which, as they
progress in age, varies in the style of transactional leadership. Other results relate
to leadership with personal characteristics such as marital status, and with organiza-
tional characteristics such as the industry sector and the time of organizations in the
market.
In the military field, the pilot testing was carried out on 65 officers of the
Armed Forces, obtaining as a result that the predominant leadership style is
transformational—transactional.
Stratifying the results according to the level of leadership, at the strategic, oper-
ational, and tactical, the transformational leadership predominates, as much as the
transactional, because the results are very close, as shown in Table 3.
This chapter proposes the use of the MLQ-6S questionnaire, after a validation stage
to adapt it to the Ecuadorian context, to determine the predominant leadership style
(transformational, transactional, or laissez-faire) within Ecuadorian society, as the
first step, and within the Ecuadorian Armed Forces, as a second step.
The data allow us to conclude that the management of Ecuadorian society is pre-
dominantly based on the transactional leadership style in its formal actions, and the
laissez-faire leadership at the informal level. This information allows to evidence
314 C. H. Puga et al.
References
1. Kort, E.D.: What, after all, is leadership? ‘Leadership’ and plural action. Leadersh. Q. 19(4),
409–425 (2008)
2. Castro Solano, A.: La evaluación de los estilos de liderazgo en población civil y militar
argentina. Rev. Psicol. la PUCP XXII(1), 63–88 (2004)
3. Suarez, P.: Estudio del Liderazgo en Ecuador a partir de la validación del cuestionario
multifactorial de liderazgo. Escuela Politécnica Nacional (2017)
4. Avolio, B., Bass, B., Jung, D.: Re-examining the components of transformational and transac-
tional leadership using the multifactor leadership questionnaire. J. Occup. Organ. Psychol. 72,
441–462 (1999)
5. Molero Alonso, F., Recio Saboya, P., Cuadrado Guirado, I.: Transformational and transactional
leadership: An analysis of the factor structure of the multifactor leadership questionnaire (MLQ)
in a Spanish sample. Psicothema 22(3), 495–501 (2010)
6. Avolio, B., Bass, B.: You can drag a horse to water but you can’t make it drink unless it is
thirsty. J. Leadersh. Stud. 5(1), 17 (1998)
7. Puga, C., Jiménez, A., Caballero, R., Fosado, O.: Multilevel military leadership model: corre-
lation between the levels and styles of military leadership using MLQ in the Ecuadorian armed
forces. In: Developments and Advances in Defense and Security Proceedings of MICRADS
2019, vol. 152, pp. 161–170 (2019)
8. Ganga-Contreras, F., Navarrete, E., Alt, C., Alarcón, N.: Percepción de los estilos de liderazgo:
el caso de un campus universitario IV(1), 1–35 (2016)
9. Dionne, S.D., et al.: A 25-year perspective on levels of analysis in leadership research. Leadersh.
Q. 25(1), 6–35 (2014)
10. Hunt, J., Ropo, A.: Multi-level leadership: grounded theory and mainstream theory applied to
the case of general motors. 6(3), 379–412 (1995)
11. Van Wart, M.: Leadership in Public Organizations, 2nd edn. Routledge, New York (2014)
12. Reeves-Ellington, R.: Enviroscapes: a multi- level contextual approach to organizational
leadership, pp. 337–420. Emerald Gr. Publ. Ltd. (2015)
13. Batistič, S., Černe, M., Vogel, B. (2016) Just how multi-level is leadership research? A document
co-citation analysis 1980–2013 on leadership constructs and outcomes. Leadersh. Q., 1–18
(2016)
14. Jacobs, T.O.: Strategic Leadership: The Competitive Edge (2002)
15. Sebastián López, E.: Habilidades directivas y administración del cambio en la calidad educativa
de los docentes de EBA–UGEL 04, 2018. Univ. César Vallejo, 186 (2019)
16. Air-University: USAF Leadership Doctrine, vol. II, p. 71 (2015)
17. Wong, L., Bliese, P., McGurk, D.: Military leadership: A context specific review. 14(6) (2003)
18. Samanta, I.: Modern leadership types and outcomes: the case of Greek public sector. J. Contemp.
Manag. Issues 23(1), 173–191 (2018)
19. Corral, Y.: Diseño de cuestionarios para recolección de datos. Rev. ciencias la Educ. 36, 152–
168 (2010)
Defense Engineering
A Portable GSM Base Station Solution
for Military Communications in Hostile
Environments
© The Editor(s) (if applicable) and The Author(s), under exclusive license 319
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_28
320 C. D. Altamirano et al.
1 Introduction
An adequate institutional structure is the basis of the security and defense of the coun-
tries, in which the cohesion of the population with a duly equipped armed forces is
fundamental [8]. Thus, the combat power assigns a significant weighting to the com-
mand and control of the belligerent forces; in turn, this command and control are
enhanced based on the available telecommunications systems; otherwise, the avail-
able capacities of each nation could not act in coordination and synchronization. The
armed forces have the responsibility for sovereignty and territorial integrity. Thus,
it is necessary to tend to technological sovereignty with the capacity of developing
its own military technology. In this context, an enabling technology for developing
military communications systems is software-defined radio (SDR) [2].
SDR is a technology where several of the typical components such as filters, mix-
ers, modulators and demodulators of communications systems are implemented in
software. The communication system consists of a re-configurable hardware named
universal software radio peripheral (USRP), where the algorithms are processed via
a host or other embedded device [15]. The growth in the use of these technologies
will promote the demand for a solution that can provide dense, scalable and secure
user environments [16].
For the host processing stage, there has been a significant increase in the devel-
opment of virtualization technologies allowing the partition of a computer system in
multiple isolated environments called container-based virtualization which offers a
lighter and more efficient environment [5].
The flexibility of the SDR technology makes possible to implement different
communications standards. The Global System for Mobile Communications (GSM)
is one of the first technologies developed in mobile communications systems that
were first developed in the late 1980s. According to the GSM Association, it is
the most successful wireless standard in the world, covering more than 90% of
the world population [1]. GSM systems have traditionally been implemented using
expensive hardware components. The development of solutions in SDR makes it
more economical to implement.
On the other hand, the USRP devices have limited RF output power in order to
meet regulations, and they are suitable as laboratory instruments. For long-range
military communication, more output power is required. Thus, in order to boost the
signal to a required level, it is necessary to use a power amplifier. However, using
amplification could result in signal distortion and out-of-band spurious emissions
depending on the implemented communication standard. Finally, the new coverage
radio can be predicted by calculating the link budget.
In the literature, there are several similar projects based on SDR technology. For
instance, in [7], the authors work on the problem of lack of cell phone service by the
implementation of a GSM base station based on open-source software in places of
difficult access. In another similar work [13], the GSM network architecture based
on free software is implemented for digital and social inclusion in isolated rural
communities in the Amazon.
A Portable GSM Base Station Solution for Military Communications … 321
2 Methodology
2.1 Implementation
that allows to use virtual containers, which in turn are operating system independent.
On the other hand, OpenBTS has several services that allow the GSM network to
start, which are:
• SMQueque: This is a server for storing and forwarding text messages in the
OpenBTS system. It is necessary to have this server to send a message from one
mobile station (MS) to another. SMQueque operates similarly to an email server,
since the core is a message queue waiting to be delivered.
• SIPAuthServe: implements the subscriber information database, thus replacing
the Asterisk SIP registry and the Home Local Register(HLR) of a traditional GSM
network.
• Asterisk: to perform the call switching functions OpenBTS uses a PBX or SIP
router. As of version 4.0 of OfpenBTS, the standard SIP router is Asterisk.
• OpenBTS: Through the OpenBTS command line interface (CLI), it is possible to
monitor the system status, as well as making changes to several parameters in real
time.
• Osmo TRX: works as a transceiver that manages the radio interface, also includes
the band tuner.
A Portable GSM Base Station Solution for Military Communications … 323
The hardware stage is implemented by using the USRP N210 [6] and the WBX
50-2200 daughterboard. The OpenBTS sets the USRP as a GSM base station with an
output maximum power of −12 dbm that allows a coverage of 30 m. The OpenBTS
application allows to regulate the transmission output power through the power com-
mand. In order to increase the coverage area, at the USRP output, we have connected
a power amplifier. Specifically, the ZVE-83 + mini-circuit amplifier [10] allows a
power gain of 20 dB. Thus, the maximum output power is +8 dbm, as shown in Fig. 3.
As a radiator element, we have used the Kathrein panel antenna [9] with 15 dBi
of gain. The antenna radiation pattern is presented in Fig. 4. For integration with the
amplification stage and for the reception channel in the USRP, we used a 7/16 DIN
to SMA adapter. Additionally, the reception sensitivity in the USRP can be modified
in the OpenBTS CLI through the rxgain command.
Finally, the antenna is placed at a height of 12 m, located in the facilities of the
Military Applications Research Center, CICTE, with a pointing direction of N30W.
2.2 Analysis
model. In this work, the Okumura–Hata model is used for calculating the link budget
[12]. The receiver sensibility is given by:
3 Results
The MOS test allows us to determine the voice quality. MOS is the value that an
individual attributes based on their own opinion about the quality voice of a telephone
system either during a conversation or only when listening [11]. The MOS test was
performed to a universe of 50 people of an average age between 22–31 years under
the guidelines shown in Table 2.
The test was applied at a distance of 480 m, where the obtained average rating was
3.88/5, which is quite acceptable for the system. Subsequently, the test was applied
at a distance of 200 m, where the average rating was 4.2/5. At a closer distance
from the antenna, the voice quality perception was improved as expected. Figure 6
summarizes the distribution of MOS results according to the number of people.
Finally, it is worth noting that since the amplification stage introduces distortion,
the average rating results do not reach 5 points. Still, in neither case, the obtained
result was bad, and most of the people rated the system as good.
Fig. 6 MOS results according to the number of people in 480 and 200 m
A Portable GSM Base Station Solution for Military Communications … 327
For the coverage analysis, the G-NEtTRACK LITE application is used, which is
a wireless network monitor for devices with Android operating system. It allows
monitoring and recording parameters of a mobile network without using special
equipment. Using the G-NEtTRACK application, we measured the received power
by means of a drive test over the base station adjacent area. As a result of this mea-
surement, we obtained power parameters in dBm, latitude and longitude at several
points. Then, using the MATLAB tool, we interpolated these points to obtain the
coverage.
Figure 7 shows the resulting heat map that describes the received power distribu-
tion from the base station. As a result, it can be seen that the highest concentration
of energy is in the center of the map which dissipates as it moves away from the
base station. Notice that there is an increase in power at the upper end due to the
unevenness of the ground causing that some areas are at a greater height. Finally,
since the antenna is directive, there is directional radiation lobe with a maximum
coverage distance of 500 m, which is in accordance with the Okumura–Hata model
prediction.
Fig. 7 Heat map of coverage area for the GSM base station
328 C. D. Altamirano et al.
4 Conclusion
References
1. Azad, A.: Open BTS Implementation with Universal Software Radio Peripheral. Department
of Electrical and Computer Engineering, Virginia Polytechnic and State University, Virginia,
VA, USA (2011)
2. Bergstrom, C., Chuprun, S., Gifford, S., Maalouli, G.: Software defined radio (SDR) special
military applications. In: MILCOM 2002. Proceedings. IEEE
3. Boettiger, C.: An introduction to docker for reproducible research. ACM SIGOPS Oper. Syst.
Rev. 49(1), 71–79 (2015)
4. Burgess, D., Samra, H., et al.: The openbts project. Report available at http://openbts.
sourceforge.net, http://openBTS.org (2008)
5. Combe, T., Martin, A., Pietro, R.D.: To docker or not to docker: a security perspective. IEEE
Cloud Comput. 3(5), 54–62 (2016)
6. EttusResearch: Usrp n200/n210 networked series, datasheet. https://www.ettus.com/wp-
content/uploads/2019/01/07495_Ettus_N200-210_DS_Flyer_HR_1.pdf
7. Guerrero, H., García, D., Juárez, M., Rico, U., Navarro, S., Casas, A.A.: Implementación de
red celular de bajo costo para comunidades rurales basada en sdr y openbts (Implementation of
A Portable GSM Base Station Solution for Military Communications … 329
a low cost cellular network for rural communities based on sdr and openbts). Pistas Educativas
40(130) (2018)
8. Jarrín, Oswaldo, E.A.: Política de la Defensa Nacional del Ecuador. Instituto Geográfico Militar
(2018)
9. Kathrein, A.E.: Kathrein Scala Division, Kathrein 739 665 Panel Antenna datasheet. https://
cosconor.fr/GSM/Divers/Equipment/Kathrein/Kathrein%202004.pdf
10. MiniCircuit: Gan power amplifier zve-3w-83+, datasheet. https://www.minicircuits.com/pdfs/
ZVE-3W-83+.pdf
11. Ribeiro, F., Florêncio, D., Zhang, C., Seltzer, M.: Crowdmos: An approach for crowdsourcing
mean opinion score studies. In: 2011 IEEE International Conference on Acoustics, Speech and
Signal Processing (ICASSP), pp. 2416–2419. IEEE (2011)
12. Singh, Y.: Comparison of okumura, hata and cost-231 models on the basis of path loss and
signal strength. Int. J. Comput. Appl. 59(11) (2012)
13. Teixeira, F., Oliveira, E., Brito, L., Leite, J.: Telefonia celular comunitária utilizando tecnologia
open source na amazônia. In: Anais de XXXIV Simpósio Brasileiro de Telecomunicações.
Sociedade Brasileira de Telecomunicações (2016)
14. Torres, M., Vacas, C., Altamirano, D., Bernal, P.: Design and implementation of a communi-
cations system for streaming real-time voice using SDR technology in USRP e110 and n210
devices. In: 2014 IEEE Central America and Panama Convention (CONCAPAN XXXIV).
IEEE (2014)
15. Tuttlebee, W.H.: Software-defined radio: facets of a developing technology. IEEE Pers. Com-
mun. 6(2), 38–44 (1999)
16. Ulversoy, T.: Software defined radio: challenges and opportunities. IEEE Commun. Surv. Tuto-
rials 12(4), 531–550 (2010)
Characterization and Simulation
of a Propagation Model to Determine
the Secondary Effects that Generate High
Power and Frequency Electromagnetic
Signs When Impact on Electronic
Systems and Surface of Vehicles Family
AMX13 of The Land Force
Abstract This article consists of the study and analysis of the armor effectiveness
of a military combat vehicle against possible attacks with electromagnetic weapons.
For the study, it is necessary to use two important softwares namely ALTAIR FEKO
and MATLAB. ALTAIR FEKO allows the creation or importation of a 3D model of
an armor vehicle and work with the model changing their characteristics like relative
permeability, electrical conductivity, and material thickness. With this software, we
can simulate the 3D model and analyze its shielding effectiveness with the obser-
vation of induced currents inside the vehicle and determine if these currents can
cause the destruction of the electronics systems of vehicle. The use of MATLAB
toolboxes like an App Designer to develop an application to calculate the shielding
effectiveness of an armored vehicle is an additional and quick option to calculate
armor losses because this application represents a significative save of memory and
computational resources.
© The Editor(s) (if applicable) and The Author(s), under exclusive license 331
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_29
332 J. D. Alvarez et al.
1 Shielding Effectiveness
The shielding effectiveness (SE) of equipment cases and spacecraft skin is determined
by the type of material used and the holes in that material. Typical metals, thick
enough to provide adequate mechanical strength when used for equipment cases and
spacecraft skin, provide acceptable SE. Holes and slots in the metal are the most
common detriment to SE. Therefore, most shielding design effort concentrates on
reducing the number and size of openings [1].
Shielding can be specified in terms of the reduction in magnetic and/or electric
field strength caused by the shield. It is convenient to express this shielding effec-
tiveness in units of decibels (dB). The use of decibels then permits the shielding
produced by various effects to be added to obtain the total shielding [2].
The equations to determine the shielding effectiveness are the next:
Sd B = Ad B + Rd B + Bd B [1] (1)
where
• Ad B : Attenuation due to absorption
• Rd B : Loss due reflection
• Bd B : Reflection Correction
The SE of the barrier is caused by reflection from the surface due to the impedance
mismatch between the two mediums and attenuation by absorption loss within the
barrier [1].
Some absorption loss occurs each time the wave traverses the thickness of the
barrier. The rereflected component usually reduces SE by adding power to the output.
The reduction may be significant if the absorption losses are low [1].
And
where E 1 (H1 ) is the wave intensity at a distance t within the shield [2]. The distance
required for the wave to be attenuated is defined as the skin depth, the equal is:
Characterization and Simulation of a Propagation Model … 333
2
δ= [2] (4)
ωμσ
Substituting numerical values for μ and σ and changing units so the skin depth
is in inches and meter gives:
2.6
δ=√ [2] (5)
f ∗ μr ∗ σr
1
δ=√ [1] (6)
μr ∗ σr ∗ f MHz
where
• μr : Relative permeability.
• σr : Relative conductivity.
The absorption loss can be written as:
E0
A = 20 log = 20 log e−t/δ [2] (7)
E1
t
A = 20 log(e)d B[2] (8)
δ
t
A = 8.69 d B[2] (9)
δ
Substituting Eq. 5 into Eq. 9 gives the following expression for absorption loss:
Ad B = 3.34 ∗ tin ∗ f ∗ μr ∗ σr [2] (10)
And
Ad B = 1314 ∗ tcm ∗ μr ∗ σr ∗ f MHz [1] (11)
where t = thickness.
The ratio (K) of wave impedance to metal impedance is used to determine reflection
components in the shielding effectiveness [1]. The equations are given:
Zw
K = for t > 3δ[1] (12)
Zm
334 J. D. Alvarez et al.
And
Zw
K = for t < 3δ (13)
ZB
where
• Z w : Wave impedance.
• Z m : Intrinsic impedance of metals.
• Z B : Intrinsic impedance for thin metal.
The equation for reflection losses is the next expression:
For K 1
(1 + K )2 K
R = 20 log = 20 log [1] (14)
4∗K 4
λ
In the far field, r ≥ 2π
,
For plane waves:
μr ∗ f M H z
Rd B = 108.1 − 10 log [1] (15)
σr
λ
In the near field, r ≤ 2π
,
For E fields:
μr ∗ f M3 H z ∗ rm2
Rd B = 141.7 − 10 log [1] (16)
σr
Bd B = 20 log 1 − e− δ [1]
2∗t
(17)
Characterization and Simulation of a Propagation Model … 335
3 MATLAB Application
Using the toolbox App Designer, we can develop an application that allows to deter-
mine the shielding effectiveness and calculate the losses when an armored vehicle is
being attacked with an electromagnetic weapon. EM weapons come in a variety of
forms, differing in cost, complexity, and lethality to electronic systems [4].
App Designer integrates the two main tasks involved in creating an app: the
organization of the visual components of a graphical user interface (GUI) and the
programming of the app’s behavior. It is the recommended environment to create
apps in MATLAB [5].
338 J. D. Alvarez et al.
The application has four tabs, two of them are main and are used to enter parameters
such as shielding thickness, relative permeability, electrical conductivity, frequency,
etc. At the other tab, it’s possible to view the results with a graphic. The use of
application for the users is easy and also, it’s possible to download a user manual.
Figure 5 shows the Main Tab where it’s possible to enter the necessary parameter
to calculate de losses for shielding effectiveness.
• It was determined that the main electronic systems that the armored vehicles of the
AMX-13 family of the Land Force have are Thompson TRVP13 communication
radios which are of the original manufacture and the Motorola DGM8500 E radio
that has adapted to the vehicle.
• It was determined that the armor material with which the armored vehicles of
the AMX-13 family of the Land Force have been constructed is 5083 Aluminum
whose electrical conductivity is 16,558,500 s/m and relative permeability of 1, key
parameters for simulations in Feko, and propagation loss analysis and shielding
efficiency in MATLAB.
340 J. D. Alvarez et al.
References
1. Evans, R.W.: Design guidelines for shielding effectiveness, current carrying capability, and the
enhancement of conductivity of composite materials. NASA Contractor Report 4784, 19–27
(1997)
2. Henry. W. Ott.: Electromagnetic Compatibility. 1st end. A John Wiley & Sons. Hoboken, New
Jersey (2009)
3. Altair Feko, https://altairhyperworks.com/product/FEKO. Last accessed 2019/12/12
4. Miller, C.R.: Electromagnetic pulse threats in 2010. Defense Technical Information Center,
pp. 385–389 (2010)
5. The MathWorks. https://www.mathworks.com/products/matlab/app-designer.html. Last
accessed 2019/12/12
Public Order Disruption Event Detection
Based on IoT Technology. An Approach
for the Improvement of Public Security
Conditions
Pablo Albán, López Roberto, Alexander Mejía, Isaac Vallejo, Itaty Alban,
Shakira Cofre, and Esteban Molina
Abstract The institutions that are responsible for the security of the state, in many
scenarios, face insurgent groups and organized crime that put people’s lives at risk.
So, these institutions should tend to improve their equipment and training. Funda-
mentally, the use of technology should allow to improve the procedures, techniques,
and tactics used in military and police operations. Today, a great technological trend
is within reach, this is a communication technology based on the Internet of Things
or IoT. This study proposes the development of a solution based on the IoT paradigm
in the field of security and defense. This will allow the timely recognition of public
order alteration and unrest that will allow time planning and fast displacements in
operations, while considering geographic locations and the optimization of resources.
It is intended to provide a solution that improves the capacity and response time in
operations, through the capture of information in real time. Likewise, it will allow the
sharing of information to the necessary units. The results achieved show the potential
emergence of a new system of surveillance and recognition of abnormal based on
sensors and IoT.
1 Introduction
Since the emergence of conventional wars, the use of technology has marked sig-
nificant differences in the strategic, operational and tactical execution of military
operations. Since the Second World War, the importance and precedence of technol-
ogy has been noted in the tactics, techniques, and procedures used by the institutions
© The Editor(s) (if applicable) and The Author(s), under exclusive license 343
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_30
344 P. Albán et al.
responsible for state security, when challenged by public order alterations, frontier
trespassing, and/or rights violations
The process of globalization and the increasingly recurring participation of non-
state actors, both outside and inside a state, is a genesis-like, varied and imminent
reality. Therefore, it is not alien to any nation, to seek to enter the modern dynam-
ics that give benefits to international relationships and development. On the other
hand, security threats to a state have also changed, acquiring multidimensional and
asymmetric characteristics that change its internal management and assessment [1].
In this sense; both inter-state and intra-state armed conflicts are materialized
by conventional warfare, terrorism, transnational organized crime, drug trafficking,
migration, environmental deterioration, among others that constitute threats to the
integrity of a nation. These threats, many times, cannot be confronted in a traditional
way, so they force states to redesign their security strategies. This provokes estab-
lishing public and/or private, national and/or international response systems, whose
resources; human, operational and technical, allow to meet the needs of survival,
reactivation, and development, which guarantee its integrity and permanence, within
and outside its borders [2, 3].
One of the tools with which a state has to consolidate resources to face threats
and risks is the IT infrastructure and information systems installed throughout its
national territory. Also, another element of support is the military communications
equipment that allows the command and control of the operations that are carried
out in support of the civilian population, and that can be used in cases of aggression,
international or internal armed conflict, serious internal unrest, public calamity or
natural disasters [4].
The Ecuadorian Armed Forces have a nationwide telecommunications infrastruc-
ture. However, in this study, a possibility is proposed that a strategic network of
military or police communications should incorporate new technologies, such as the
Internet of Things (IoT) technology that will mitigate the effects of these threats.
Hence the need to share information through the information and communication
technologies systems, forces the materialization of new communication networks
between different institutions [5, 6].
The present work proposes an improvement in obtaining information through the
use of sensors and typical IoT devices, in order to contribute specifically with the
detection of events of public order alteration and improve the security conditions of
the citizenship.
Section 2 of this article explores the background and related works related to this
investigation. Section 3 describes the architectures, system, and operation of this IoT
based proposal, by describing methodologically each element. Section 4 details the
way of experimentation. Section 5 shows results and finally Sect. 6 gives conclusions
and a dive into possible future works related to this investigation.
Public Order Disruption Event Detection … 345
Current technology gives strategic support to the most sophisticated military opera-
tion across the world. In base on a preliminary literature review, it was found that the
mentioned support is based on the usage of WSN, WiFi, Cellphones, and Satellite
networks. For example, to monitor soldiers during mission, Gondalia and others [7]
propose a real-time system that tracks location and monitors the health of soldiers
via a GPS module and Wireless Body Area Sensors (WBASn). Patil and Ambedkar
[8] present a system like [7], with the difference that IoT devices are used and all
data is transmitted to a command center. Also, Iyer and Patil [9] present a portable,
useful and low-cost system based on Arduino and global positioning, focused on
monitoring (location and temperature) soldiers during military operations.
In the military security area, multiple studies and investigations have been made.
For example, Anuradha and others [10] propose a walkie-talkie secure system based
on the cardiac signal frequency, like biometric systems. This system makes use of a
wireless network with an IoT based system to detect the ECG of soldiers, securing
the communication. If the cardiac pulse is of the registered users, the connections
are made between the walkie-talkie and the command center, if not, no connection
is made. The walkie-talkie also has global positioning module.
Ziegler’s proposal describes a solution centered on using IoT and wireless het-
erogeneous sensors. This solution has two new algorithms for crowd analysis. This
allows for detecting critical areas, countercurrents that could put at-risk people in the
crowd. Different aggrupation algorithms are compared to get an effective and robust
crowd detection. The results were satisfactory for the detection process, but not for
the analysis [11].
Vithiya et al.’s investigation, IoT is presented as a tool to track for survivor of
remote locations. This allows for the monitoring of temperature, heartbeat, atmo-
sphere gas composition, current geographic location, and the transmission of this
data to a central database. Each of these are easily visualized in a web site. With
these results, tests have been planned in real soldiers and security improvements
[12].
Meiyi Ma presents a conscious surveillance architecture bases in simulated sectors
of New York City. All of this with the object of the event, unrest and alteration
detection in public spaces. A demonstration was held in three situations. The first in
the city of Manhattan without any smart service. The second one with smart services
implementation. Finally, the third one used smart service with CityGuard, showing
off conflict and insecurities detection [13, 14].
Another Meiyi Ma investigation presented CityResolver as smart support for
addressing smart cities. It used a whole linear programming based method to generate
a small group of a possible solution and a focus in verification based in temporal
signal logic to calcite the possible impact of each option. CityResolved proved to be
useful when comparing just using CityGuard [15].
From another perspective, Boris Pokric describes an approach based in the
involvement of citizens based in the mix of the digital and physical world. EkoNET,
346 P. Albán et al.
based on IoT presents real-time monitoring of air quality and other atmospheric
data. It has augmented reality data visualization for mobile platforms. This way, this
real-time data is used in the ARvatar videogame [16].
As can be seen, there is a great deal of investigations and advancements in these
topics. But they are not fully focused on the detection of events, unrests or alterations
in public spaces. In this context, this investigation proposes and system for detecting
unrest events that damage public order; mainly focused on public security, giving
the ability to establish public and political control strategies.
3.1 Architecture
The proposed system has an architecture that uses different devices for monitoring
the level of gas of presence of fire in an environment. All the data gathered can be
sent to the cloud so it could be shown in a simple and useful manner through a web
interface. Based in Fig. 1, four principal elements can be found:
• Hardware
• Sigfox Cloud
• AWS (Amazon Web Services) Cloud
• Web client.
3.2 Hardware
The used hardware has the capacity to send information to the cloud. An Arduino and
a Thinxtra Sigfox development kit had been used. In addition, a fire sensor (LM393)
and a CO gas sensor (MQ-7) had been added. The development kit also includes
pressure and temperature sensor. Figure 2 presents the circuit designed.
To make everything work, custom code has been developed that sends the sensor
data to Sigfox Cloud. This data is sent through radio frequencies based on sigfox
specifications and limitations. Messages sent can’t exceed 12 bytes of information
and only 140 messages can be sent per day.
The message size and max number per day are controlled using simple data types
and timed message deliveries. All sensors are limited to only use 16 bits or 2 bytes
and a message is sent every 10 min.
Sigfox Cloud
Sigfox Cloud allows the data from the hardware node is received and redirected to
other cloud service providers. For this to work, the sigfox kit inside the node needs to
be registered in a specific Sigfox Cloud account. All data that is sent from the node
arrives in the form of unprocessed bytes and they have to be parsed to a readable
format. This is made setting a byte interpretation specification, like this:
temperature: uint:16 pressure: uint:16 gas: uint:16 fire: uint:16
To allow that the received data is sent to other cloud providers, in this case AWS,
is necessary to setup callbacks. These callbacks redirect the info to a HTTP endpoint.
In this case, the endpoint came from an AWS lambda function. For better use of the
348 P. Albán et al.
callbacks, it is necessary to setup the body that will be sent. This body needs, besides
the processed sensor data, the id of the node and location.
AWS
All captured data is redirected and stored in AWS. The web site then calls services
in AWS to show the necessary information. Two services had been used: Dynamo
DB and AWS Lambda.
• Dynamo DB is a key-value non-relational database provided by AWS. This
database is used to store all data captured by the hardware nodes.
• AWS Lambda as a serverless functions service. Two functions with endpoints
were created. One endpoints store data into DynamoDB and the other endpoint
gives the data from DynamoDB to the web client.
The web client or web site allows that all the information is presented in a simple,
easy to read and is constantly updated. There are three fundamental elements that
allow for an accurate presentation of information. These elements are as follows:
• A map, with the use of Google Maps API, as in Fig. 3, shows pins where a
hardware node is deployed. These pins change colors based on the status of the
node.
• A table that shows the same information that of the map, but with text only.
• A history page that shows all captured data across time.
4 Experimentation
Based on the sensors used and architecture implemented testing is needed to under-
stand the usefulness of the elements presented. This way, the testing will help validate
the investigation. The testing was made in CICTE, located inside “Universidad de
las Fuerzas Armadas ESPE”. Old tires in the fire were used to simulate conditions
where fire is present.
For the testing process was needed: a calibrated fire sensor and a CO sensor. The
fire sensor is calibrated with a power meter that adjusts the sensibility of the sensor.
With this and a default measurement of CO in normal conditions, testing is done:
• Prepare the circuit as shown in Fig. 2.
• Power the Arduino with a 5 V input, preferably a PC.
• Enable all cloud services, AWS and Sigfox Cloud.
• Without the fire calibrate the fire sensor LM393 until its LED is off.
• Take the default level of CO with the MQ-7 sensor as a point of reference.
• Turn on a tire.
• Adjust the fire sensor until it activates when it finds fire from the tire.
Closed environment testing scenario
In contrast with the open environment test, measurements were made in a closed
space. A closed space is easier to control and lacks strong wind currents and other
meteorological factors. This way, the sensors are not affected by these variables and
more precise measurements could be made. The steps taken for this test was:
• Initialize and prepare the testing procedure.
• Prepare a closed environment where CO gases can concentrate when burning tires.
• Measure the levels of CO with the sensors based on previous tests.
• The number of measurements needs to be the same as the previous tests.
• Compare and contrast the obtained measurements with the previous test. This
way a comparative curve graph and histograms could be made so the differences
between the data could be understood.
5 Results
For the testing, five samples were gathered. Each sample had measurements of levels
of CO in ppm in four different conditions. These conditions were: Default environ-
ment without fire, open environment with sensor within 5 m form a burning tire, open
environment with sensor within 1 m form a burning tire, and a close environment
with a burning tire. Table 1 presents a summary of the results gathered.
350 P. Albán et al.
Based on the testing done and Fig. 4, the ppm of CO quantity is greater in closed
environments and closer to reality and the situation trying to detect. Also, is important
to note that the results are more precise when the sensor is at a shorter distance from
the fire. When the larger the distance from the fire, the sensor shows data that is like
the default CO measurement in the environment. In addition, it was determined that
when the sensor shows sudden changes in data without changes or environment, it
mostly due to faulty and imprecise captures.
In the base of the testing done and Fig. 5, the sensors used are better suited for
closed environments. The CO sensor is more precise and consistent, giving results
closer to real life. This happens mainly because of a lack of strong air currents or
wind.
Fig. 5 CO levels when a fire is presented in closed (orange) and open (blue environments
comparison
6 Conclusions
The sensors and tools used during this experiment, when using radiofrequency sig-
nals, can without internet connectivity limitations send useful data. This allows for a
rather useful scope of surveillance and early response to any incidents. Public order
forces can find these tools as a meaningful way to respond to get to know and respond
to incidents regarding the public order.
Based on the testing made, normal conditions have 20–30 ppm of CO. When a fire
is present, in this case, a tire was the source, 50 ppm of CO is indication enough of an
incident when tested in a closed and controlled environment. Effective results could
only be gathered when the sensor was within 1 m distance from the fire, making
it really limited for mass use. These setbacks are because of the simple and cheap
construction of the sensors.
Sadly, when testing the sensor in an open environment, the results are even more
limited than in a closed space. Due to a constant and unpredictable airflow, the
sensor cannot gather conclusive levels of CO of the atmosphere, making them rather
useless. The usage of better and more diverse gas sensors are needed and other types
of sensors to detect fire existence.
Based on the current approach, several improvements are needed. While the over-
all architecture and data delivery present to be useful, the sensors used are ineffective.
Improving the sensors used is necessary. Also implementing new elements to detect
like tear gas in a specific area. Lastly, expanding the delivery of information with a
phone app. This is a way for better solutions for responding to threats to the public
order and a faster way to restoring peace.
352 P. Albán et al.
References
1. Alda Mejías, S., Sampo, C.: Las Fuerzas Armadas en América Latina ante el crimen organizado.
Real Instituto Elcano-Centro de Estudios Estratégicos del Ejército del Perú (Lima, Perú), (2019)
2. Guamán, J., Toapanta, M. Orizaga, J.: An information security approach in the armed forces
of Ecuador, p. 5, (2017)
3. Narváez, C.H.P.. Vélez, A.F.J., Fernández, R.C., Téllez, O.F.: Multilevel military leadership
model: Correlation between the levels and styles of military leadership using MLQ in the
ecuadorian armed forces. In: Developments and Advances in Defense and Security, Singapore,
2020, pp. 161–170. https://doi.org/10.1007/978-981-13-9155-2_14
4. Albán Ruiz, P.F., Montoya Lara, L.H., de Jesús Pereira, A.M.: Conformation of a non tripulated
tactical center of the army for intervention in natural or anthropic disasters in Ecuador. In:
Recent Advances in Information Systems and Technologies, Cham, 2017, pp. 586–595. https://
doi.org/10.1007/978-3-319-56541-5_60
5. Renato, C., María, N.: Technologies’ application, rules, and challenges of information secu-
rity on information and communication technologies. In: 2015 Asia-Pacific Conference on
Computer Aided System Engineering, 2015, pp. 380–386. https://doi.org/10.1109/apcase.
2015.74
6. Corral-De-Witt, D., Carrera, E.V., Matamoros-Vargas, J.A., Muñoz-Romero, S., Rojo-Álvarez,
J.L., Tepe, K.: From E-911 to NG-911: Overview and challenges in Ecuador. IEEE Access,
vol. 6, pp. 42578–42591, 2018. https://doi.org/10.1109/access.2018.2858751
7. Gondalia, A., Dixit, D., Parashar, S., Raghava, V., Sengupta, A., Sarobin, V.R.: IoT-based
healthcare monitoring system for war soldiers using machine learning. Procedia Comput. Sci.
vol. 133, pp. 1005-1013, (2018). https://doi.org/10.1016/j.procs.2018.07.075
8. Patii, N., Iyer, B.: Health monitoring and tracking system for soldiers using Internet
of Things(IoT). In: 2017 International Conference on Computing, Communication and
Automation (ICCCA), 2017, pp. 1347–1352. https://doi.org/10.1109/ccaa.2017.8230007
9. Iyer, B., Patil, N.: IoT enabled tracking and monitoring sensor for military applications. Int. J.
Syst. Assur. Eng. Manag. 9(6), 1294–1301 (2018). https://doi.org/10.1007/s13198-018-0727-8
10. Anuradha, M., Sheryl Oliver, A., Jean Justus, J., Maheswari, N.: IOT based monitoring system
to detect the ECG of soldiers using GPS and GPRS. (20180
11. Ziegler, H.G.: Privacy-preserving and IoT-capable crowd analysis and detection of flow dis-
turbances for enhancing public safety. In: 2016 5th International Conference on Smart Cities
and Green ICT Systems (SMARTGREENS), pp. 1–8 (2016)
12. Vithiya, R., Karthika, S., Sharmila, G.: Detection, monitoring and tracking of survivors under
critical condition using Raspberry-Pi. In: 2019 IEEE International Conference on System,
Computation, Automation and Networking (ICSCAN), pp. 1–5 (2019). https://doi.org/10.1109/
icscan.2019.8878711
13. Ma, M., Preum, S.M., Stankovic, J.A.: Demo abstract: Simulating conflict detection in het-
erogeneous services of a smart city. In: 2017 IEEE/ACM Second International Conference on
Internet-of-Things Design and Implementation (IoTDI), pp. 275–276 (2017)
14. Ma, M., Preum, S.M., Stankovic, J.A.: CityGuard: A watchdog for safety-aware conflict detec-
tion in smart cities. In: Proceedings of the Second International Conference on Internet-of-
Things Design and Implementation—IoTDI’17, Pittsburgh, PA, USA, pp. 259–270 (2017).
https://doi.org/10.1145/3054977.3054989
15. Ma, M., Stankovic, J.A., Feng, L.: CityResolver: A decision support system for conflict res-
olution in smart cities. In: 2018 ACM/IEEE 9th International Conference on Cyber-Physical
Systems (ICCPS), Porto, pp. 55–64 (2018). https://doi.org/10.1109/iccps.2018.00014
16. Pokrić, B., Krčo, S., Pokrić, M., Knežević, P., Jovanović, D.: Engaging citizen communities
in smart cities using IoT, serious gaming and fast markerless Augmented Reality. In: 2015
International Conference on Recent Advances in Internet of Things (RIoT), pp. 1–6 (2015).
https://doi.org/10.1109/riot.2015.7104905
Vibration Effects of the Fixed-Wing
Aircraft of the Army Aviation
from Ecuador on the Human Body
Abstract The study of the seats of the pilot crew in the aircraft of the Aviation
of the Army from Ecuador and the effects they cause on the human body due to
the transmission of vibrations through the back, seat, and floor is described. Five
transport aircraft are evaluated: CN-235, CASA 212, Aravá T-201, CESSNA 206,
and Beechcraft King Air B-200, based on ISO 2631-1 (1997). The evaluation was
carried out by taking measurements on the seats, backrests, and floor of the cockpit,
using acceleration sensors Waspmote–Libelium, which allows the evaluation of fre-
quencies until 50 Hz. In order to have greater certainty in the evaluation, the flights
were divided into different phases according to the type of aircraft, considering as
common: engine start, takeoff, free flight, descent, landing. The processed data is
compared with the flight records, and the exposure level in the aircraft is determined.
Human exposure is defined by two types of vibrations: whole-body vibration and
local vibrations; they are associated with complications in the occupational health
of specific machinery operators. Aircraft pilot’s reports indicate that exposure to
vibrations triggers changes in health, well-being, and professional performance. The
incidence of vibrations in the human body is examined as an overview of the prob-
lem, along with the review of related documents, which are discussed in order to
determine the possible consequences of exposure and present recommendations for
handling the issue.
© The Editor(s) (if applicable) and The Author(s), under exclusive license 353
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_31
354 V. Yépez et al.
1 Introduction
Aircraft flights are exposed to vibrations and noise. Exposure to high vibrations for
prolonged times can have effects on the physical and mental health of the pilot, such
as fatigue, decreased reaction capacity, and decision-making during the flight. [1].
In a study conducted on the C-130 J Hercules aircraft, [2] determines that horizontal
vibrations in the cargo area can cause discomfort and fatigue.
The study of the aircraft of the Aviation of the Army of Ecuador, has a research
base with the objective of determining the effects of the vibrations produced by
the aircraft in the different phases of flight, the procedures detailed in ISO 2631-
1 (1997) “Mechanical Vibrations and Shocks - Evaluation of Human Exposure to
Whole-Body Vibrations” are taken. This standard defines the methods for measuring
periodic, random and transient vibration in the whole body, focusing on the frequency
range of 0.5–80 Hz (for health, comfort, and perception) and 0.1–0.5 Hz for motion
sickness.
of long duration; however, the program can store between 50 and 55 min of data,
which are: time and acceleration in milli gravities in the three orthogonal planes.
This sensor allows the evaluation of 50 Hz frequencies.
Accelerometers are started minutes before the engine starts, with the aim of start-
ing the measurement at all flight stages. The data was obtained on flights of different
aircraft. The general flight conditions were similar to the routine ones; likewise, the
routes that the flights followed, obey routes known to the pilots and for which they
carry out flights periodically. These conditions prevent the study affects their daily
activities or that the resulting vibrations are different from those to which the pilots
endure daily.
ISO 2631-1 (1997) provides the methodology for processing data obtained during the
tests performed, primarily evaluates the acceleration signals and by Fourier Trans-
form the dominant frequencies are identified. Finally, on the vibrations transmitted
to the whole body, the evaluation of the risks of the vibrations is based on the calcula-
tion of the daily exposure A (8) expressed as the equivalent continuous acceleration
for a period of 8 h. The flight stages analyzed are engine ignition, engine power test,
taxiing, takeoff, ascent, flight, descent, landing, taxiing, engine shutdown [5].
The effective value of the frequency-weighted acceleration uses the following
information: a is the effective value of the acceleration (m/s2 ), w is the frequency
weighting, aw is the effective value of the frequency-weighted acceleration, aw (t) is
the instantaneous value of the frequency-weighted acceleration, whether translational
or rotational, as a function of time, measured in meters per square seconds (m/s2 )
or radians per square seconds (rad/s2 ), T is the measurement duration in seconds; it
is expressed according to the following Eq. (1), (2) and (3) or its equivalents in the
frequency abscissa [6]:
⎡ ⎤1/2
T
1
aw = ⎣ 2
aw(t) dt⎦ (1)
T
0
1 1
aw1 ∗ T = aw1 ∗ T 2 ,
2 (2)
1 1
aw1 ∗ T 4 = aw1 ∗ T 4 . (3)
According to the research carried out, it was shown that the integral of Eq. (1) is
not necessary when working with discrete values, so it is expressed as Eq. (4):
n
21
1
aw = aw2 i (4)
i=1
T
356 V. Yépez et al.
3.1 Comfort
3.2 Health
ISO 2631-1 (1997), presents Fig. 1 [7, 9], for which the analysis is performed using
the strip corresponding to Eq. (2), which is related to Eq. (1) previously presented
and refers to the quadratic relation while Eq. (3) refers to the relation grade 4, which
is not used in this asses. The interpretation of results evaluates corrective measures if
they have a prolonged period of exposure and if the weighted acceleration is marked
inside the range. Similarly, greater certainty is established in the evaluation, if the
exposure is 4–8 h.
4 Results
In order to ease the understanding of the results obtained and analyzed during the
different flights, they are presented in bar diagrams to summarize the comfort criteria
based on Table 1, the ordinates show the sum of the values of the comfort evaluation
in all the stages and the abscissas present the condition of the passenger sensations.
Scatter plots are used to identify the critical values that affect the health superimposed
in Fig. 1, using strip corresponding to Eq. (2), so that the values of the 10 stages
studied are quantified for a better appreciation of the impact that vibrations have on
the human body.
Vibration Effects of the Fixed-Wing Aircraft … 357
10
6.3
4
Weighted acceleration (m/s2)
Equation (2)
2.5
1.6
0.4
0.315
0.25
10 dB
0.16
0 10
10 min 0.5 1 2 4 8 24
(Hours)
2 Floor
0 Backrest
5 4 3 1
Condition
The results are presented according to the following detail: Fig. 2 shows that there are
high levels of discomfort in the seat and back; Fig. 3 presents values of 3.82, 3.99 and
3.71, and 4.12 for the weighted acceleration, which enter the control strip, however,
due to the short exposure periods, they do not represent dangerous conditions for the
health of the pilots in none of the phases evaluated for the CESSNA 206 aircraft.
The results are presented according to the following detail: Fig. 4 shows that the seat
is the one with the highest level of discomfort. Figure 5 presents values of 3.49, 3.87,
358 V. Yépez et al.
1
0.01 0.01 0.02 0.04 0.08 0.16 0.32 0.64 1.28 2.56 5.12 10.24 20.48
0.1
0.01
Hours
BeechcraŌ (Comfort)
6
IMPACT
4 Seat
2 Floor
0
5 4 3 1
CondiƟon
BeechcraŌ (Health)
10
Weighted acceleraƟon (m/s2)
1
0.01 0.02 0.04 0.08 0.16 0.32 0.64 1.28 2.56 5.12 10.24 20.48
0.1
0.01
Hours
and 5.54, for the weighted acceleration entering the control strip, however, due to the
short exposure periods, they do not represent conditions of danger to the health of
the pilots in any of the phases evaluated for the Beechcraft King Air B-200 aircraft.
The results are presented according to the following detail: Fig. 6 shows a low level
of discomfort in the seat components. Figure 7 presents values of 5.34, 5.51, 4.04,
and 4.14, for the weighted acceleration entering the control strip, however, due to
the short exposure periods, they do not represent conditions of danger to the health
of the pilots in any of the phases evaluated for the CN 235 aircraft.
CN 235 (Comfort)
5
Impact
3
Seat
1
Floor
-1
5 4 3 1
CondiƟon
CN 235 (Health)
10
Weighted acceleraƟon (m/s2)
1
0.01 0.01 0.02 0.04 0.08 0.16 0.32 0.64 1.28 2.56 5.12 10.24 20.48
0.1
0.01
Hours
Aravá (Comfort)
6
Impact
4
Seat
2
0 Floor
5 4 3 1
CondiƟon
Aravá (Health)
10
Weighted acceleration (m/s 2)
1
0.00 0.00 0.00 0.01 0.02 0.03 0.06 0.13 0.26 0.51 1.02 2.05 4.10 8.19 16.38
0.1
0.01
Hours
The results are presented according to the following detail: Fig. 8 shows that there
is a low level of discomfort in the seat components. Figure 9 does not present values
for the weighted acceleration that enter the control strip, so they do not represent
conditions of danger to the health of the pilots in any of the phases evaluated for the
Aravá T-201 aircraft.
The results are presented according to the following detail: Fig. 10 shows that there
is a low level of discomfort in the seat components. Figure 11 presents values of 4.55,
4.32 and 3.72; for the weighted acceleration entering the control strip, however, due
to the short exposure periods, they do not represent conditions of danger to the health
of the pilots in any of the phases evaluated for the CASA 212 aircraft.
Vibration Effects of the Fixed-Wing Aircraft … 361
Impact
5
Floor
0
5 4 3 1
CondiƟon
1
0.01 0.02 0.04 0.08 0.16 0.32 0.64 1.28 2.56 5.12 10.24 20.48
0.1
0.01
Hours
The study of the vibrations produced in the fixed-wing aircraft of the Aviation of the
Army of Ecuador has great importance and application in the occupational health
of military pilot staff, since the effects that could occur decrease performance and
reaction capabilities while driving the aircraft. In this study, the impact on the comfort
of military personnel is denoted as a subjective and difficult to identify parameter
because it is up to each crew member to assess the comfort provided by the seat,
despite this, ISO 2631-1 (1997) proposes limit values to identify the conditions that
influence the pilot. It was determined that the most uncomfortable elements are: the
back and the base of the seat, having the highest rate that occurs in the CESSNA
206, while the other aircraft have tolerable levels of comfort.
Regarding the effects on the health of the pilots, due to the exposure they have
during the flight, it was identified that by dividing it into phases the evaluation has
more detail in the measurements, so the exposure times do not represent a threat.
However, it is recommended that with the described values improvements be made
362 V. Yépez et al.
to the support systems in order to increase the health security for the aircraft and
their crew. It is advisable to carry out the measurement process in the other places of
the aircraft, to identify effects on the cargo area and the flight mechanics personnel.
References
1. Smith, S.D.: Dynamic characteristics and human perception of vibration aboard a military
propeller aircraft. Int. J. Ind. Ergon. 38, 868–879 (2008)
2. Ilić, Z.: Impact of pilot seat position on the seat’s vibration spectrum on piston propeller aircraft.
In: 6th International Scientific Conference on Defensive Technologies, Belgrade, Serbia (2014)
3. Smith, S.D.: Seat Vibration in military propeller aircraft characterization, exposure assessment,
and mitigation. Aviation Space Environ. Med. 77(1) (2006)
4. Yépez, V., Arcentales, I.: Efecto de la vibración de las aeronaves de la Aviación del Ejército
del Ecuador en el cuerpo humano. Centro de Investigación de Aplicaciones Militares CICTE,
Quito (2019)
5. Instituto Português da Qualidade: Vibrações mecânicas e choque—Avaliação da exposição do
corpo inteiro a vibrações Parte 1 - Requisitos gerais (ISO 2631-1:1997). Instituto Português da
Qualidade, Monte de Caparica (1997)
6. Hopcroft R.: C-130 J Human Vibration. Australia Government, Department of Defense (2005)
7. Begoña, J.S.: Vibraciones cuerpo entero. Centro Nacional de Verificación de Maquinaria—
CNVM (2014)
8. NEC INEN, Mechanical vibration and shock—Evaluation of human exposure to whole-body
vibration. ISO 2631-1, (1997)
9. Gualotuña, E.P.: Medición y análisis de las vibraciones mecánicas en un bus de transporte de
pasajeros y sus efectos en la salud y confort mediante la norma ISO 2631. Quito (2016)
10. Marjanen, Y.: Validation and improvement of the ISO 2631-1 (1997) standard method for
evaluating discomfort from whole-body vibration in a multi-axis environment. Loughborough
University, Loughborough (2010)
Determination of Optimal Procedures
for Maintenance and Repair Operations
of the GDU-620 Garmin Applied
to the DA20C-1 Aircraft
Abstract The purpose of this paper is to determine the optimal procedure for the
repair and maintenance of the Garmin GDU-620 applied to the aircraft DA20C-
1 for the basic training and training of future pilots of the Ecuadorian Air Force.
The aircraft has a Garmin GDU-620 as part of the Garmin G500 integrated system
where it presents all the information of navigation instruments and map types, this
is formed by two screens PFD (Primary Flight Display) and MFD (Multi-Function
Display). This system usually shows faults while night flights were made, once
analyzed the faults that are presented in the GDU 620 system, the preventive and
corrective maintenance actions are executed, such as maintenance of the internal
and external electronic connectors, maintenance of the electronic cards, adequate
reconnection of data buses. Later it was installed in the aircraft, where it was evident
that the discrepancies were solved and the operation of the equipment in question
was carried out without incident. If these discrepancies of failure appear in the GDU-
620 equipment displays, it is recommended that the same preventive and corrective
maintenance work be performed in order to resolve the discrepancy.
© The Editor(s) (if applicable) and The Author(s), under exclusive license 363
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_32
364 M. Palma et al.
1 Introduction
The Military Aviation School “Cosme Renella Barbatto” (ESMA), which is located
in Salinas, Ecuador, offers two degrees in Aeronautical Science for the cadets who
aspire to become Pilots and Technicians of the Ecuadorian Air Force.
There have been 68 promotions of Pilots and Technicians Officers and 25 of
Specialists Officers, who have received high standard education in order to satisfy
institutional as well as national requirements. In the year 2012, the Ecuadorian Air
Force acquires 12 Diamond DA20C-1 Eclipse aircraft to provide the cadets with
flight training at the ESMA. The Canadian company “Diamond Aircraft Industries”
was in charge of on-site support, and flight instructor and maintenance training.
The aircrafts are used throughout the flight courses, the cockpit provides seating
for two pilots, which in this case are: the military instructor and the cadet. It is
important to clarify that this aircraft is not designed to cover long-distances or to
transport any kind of goods. Its maximum airspeed is 275 km/h, there are four
single-acting cylinders model Continental IO-240-B3B which is able to develop 125
HP of tensile strength depending on the specific modification (Avia.Pro 2015).
The aircraft is equipped with a GDU-620 Garmin display, which has a system
that provides the necessary information such as attitude (pitch and roll), rate of turn,
skip/slip, heading, airspeed, altitude and vertical speed to perform operations safely.
This digital data is more accurate than analogue instruments which are part of the
aircraft´s panel. It is also necessary to mention that this system makes the instruction
process easier due to its exactness and it is strategically located to relieve the workload
that the pilot has while flying, increasing the effectiveness and operational safety.
2 Objectives
To determine the optimal procedures for maintenance and repair operations of the
GDU620 Garmin applied to the DA20C-1 aircraft for the flight training process of
the future Pilot Officers of the Ecuadorian Air Force.
2.1 Maintenance
Table 1 Types of
Types of maintenance Application
maintenance
Planned Maintenance or flight hangars
Unscheduled Maintenance or flight hangars
Planned Maintenance
Unscheduled Maintenance
The levels of maintenance are the specific maintenance inspections that are applied
to the aircrafts or equipment according to tasks required in each type of damage
(Table 2).
These are the places where the tasks are performed as well as the organization or
department responsible for authorizations and execution of maintenance procedures
(Table 3).
366 M. Palma et al.
El GDU 620 PFD/MFD is the device that displays the real-time true airspeed cal-
culations and selectable winds aloft data, as well as airplane ground speed, GPS
active waypoint, distance-to waypoint, desired/actual track. It is a suite of advanced
technology to replace six-pack of instruments (ADI, HSI/CDI, airspeed indicator,
altimeter, turn coordinator and vertical speed indicator all displayed on dual 6.5
color screens.
The G500 is an avionic system designed to replace the traditional pack of flight
instruments in the panel of an aircraft. (In many cases the existing airspeed indicator,
artificial horizon, and altimeter can be relocated to serve as standby instrumentation).
This is an integrated navigation and communication system which combines
instrumentation of primary flight, the information of navigation and the map which
is displayed on the screens. The G500 system is made of Line Replaceable Units
(LRU). They have a modular design and can be directly installed. Each LRU has a
particular function or set of functions that contribute to the system operations.
The system has the following Line Replaceable Units (LRU):
• The GDU 620 has dual VGA (640 × 480 pixels) 6.5 inch LCD displays;
• The left side of the GDU is a PFD and the right side is the MFD. The MFD shows
a moving map, flight plan, weather, and more;
• The PFD shows primary flight information, in place of traditional pitot-static and
gyroscopic systems and also provides an HSI for navigation;
• Attitude and Heading Reference Systems (AHRS);
• Temperature probe (GTP 59);
• Magnetometer (GMU 44), and;
• GNS 480, CNX 80, GNS 400 W series, GNS 500 W series, GTN 600 series, GTN
700 series or a compatible GPS navigator.
The aircraft system that is part of the repairing process (Figs. 1 and 2).
Determination of Optimal Procedures for Maintenance … 367
See Fig. 3.
368 M. Palma et al.
According to Hernández and Mendoza (2018) to accomplish all the flight missions,
pilots must have an efficient airworthy aircraft. The GDU Garmin 500 must be in the
best conditions because it is an important and useful tool that allows cadets to reach
their goals while flying.
Determination of Optimal Procedures for Maintenance … 369
To determine the best choice for this process, there was first brainstorming with
all the personnel in the Electronics Department to identify the possible gaps. They
suggested several alternatives to improve the GDU620 of the 500 Garmin system
in order to have an efficient airworthy aircraft which cadets can use in their flying
training process.
After identifying the most significant gaps, the alternatives which would effectively
contribute to improve the system are classified as well as the benefits they generate
to the organization.
The alternatives are shown in Table 4.
Once identified the most relevant gaps, the benefits to each of them are deter-
mined. This will contribute to the process of reaching the determination of effective
alternatives to improve the system (Table 5).
Once the benefits have been identified, the prioritization and selection take place by
using the specified criteria (Table 6).
4 Implementation
It was determined the failures of not presenting parameters on the display PFD
(primary screen) in two GDU-620, the LRU showed distorted images (Figs. 4
and 5), impeding the visualization of information in a different type of navigation
instruments.
The maintenance manual GDU 620 P/N 190-00601-10 establishes the limitations
of repairing the equipment GDU-620, stated in chapter 1.2, where it is only detailed
the different requirements and complications of repairing the cooling fan; and in any
other case, the equipment must be sent to the Garmin company.
370 M. Palma et al.
Table 4 (continued)
Prioritization matrix
Id Gaps Possible solutions
A3. Maintenance by the
personnel of the Electronics
Department
Br08 Physical damages or crew A1. Acquisition of a new
stress equipment, Gdu620
A2. Repairing the Gdu620
A3. Maintenance by the
personnel of the Electronics
Department
Br09 Lack of resources A1. Acquisition of a new
(human–material) equipment, Gdu620
A2. Repairing the Gdu620
A3. Maintenance by the
personnel of the Electronics
Department
Br10 Reschedule of flight operations A1. Acquisition of a new
equipment, Gdu620
A2. Repairing the Gdu620
A3. Maintenance by the
personnel of the electronics
department
Después del vuelo Br011 Aircraft unavailability A1. Acquisition of a new
equipment, Gdu620
A2. Repairing the Gdu620
A3. Maintenance by the
personnel of the electronics
department
Br012 Budget shortcut A1. Acquisition of a new
equipment, Gdu620
Br013 Time of repairing A2. Repairing the Gdu620
The technicians decided to take further actions than the procedures detailed in the
maintenance manual of the GDU 620, performing the following operations:
• Dismantlement of the equipment GDU-620 using the maintenance manual of the
Diamond DA20-C1 Eclipse aircraft. Chapter 31-61-00 Pages. 201–202;
• A technical analysis based on the norms and policies established for the mainte-
nance of electronic devices by the Garmin Company was taken into consideration
before locating the possible failure on the screen of the GDU 620;
• It performed the preventive and corrective maintenance on all the components of
the GDU 620 system;
• Check and reweld of cold solders;
372 M. Palma et al.
manufacturer
3 Maintenance BR01-BR02-BR03-BR04-BR05-BR06-BR07-BR08-BR09-BR10-BR11-BR12-BR13 Quality 5 Knowle dge 4 3 days 5 4.67
by the approval and
personnel of by the experience of
the logistic the personnel
electronics department
department
373
374 M. Palma et al.
• Maintenance of internal and external connectors which are used to transmit infor-
mation in the form of vibrations which can cause wrong signals when processing
data;
• Maintenance of electronic cards which are part of the equipment GDU 620 using
a soft brush to eliminate dust particles, and;
• Reconnection of data buses which were unlocked causing interference in the signal
emission and distorting images.
6 Conclusions
For the testing, five samples were gathered. Each sample had measurements of lev-
els of To perform preventive and corrective maintenance operations on the Garmin
GDU 620 P/N 011-01264-50 S/N 165202117 and S/N 165201968, the personnel
of the Electronic Department performed third level procedures, it means that there
were technicians of the Ecuadorian Air Force who read the manuals and researched
procedures which allowed them to be capable of solving the problem.
The actions for preventive and corrective maintenance required on the GDU 620
P/N 011-01264-50 S/N 165202117 and S/N 165201968 enable the aircrafts DA20-C1
FAE 1066 and FAE 1062 to be available.
The maintenance procedures performed on GDU 620 P/N 011-01264-50 S/N
165202117 and S/N 165201968, represented an enormous contribution to save money
and time for the institution.
References
Abstract This article aims to critically analyze the main dimensions of the model
of the military service in contract regime in the Portuguese Armed Forces. The
methodology is based on the selection of three criteria—relationship between model
and environment, model structuring and operation strategy. To make the analysis
more realistic, we cross the criteria with three perspectives—“Macro” (related to
environmental variables), “Meso” (related to internal variables) and “Micro” (related
to individual perspectives). The critical analysis reveals a “relationship with the
environment,” very permeable to external influence, in political, demographic and
sociocultural terms. There are high levels of complexity, formalization, hierarchy and
detail in the “model structuring,” which has consequences on the “operationalization
strategy,” i.e., making the management too centralized, inflexible, not permeable to
individual initiative and unable to adapt quickly to changes, particularly those in the
labor market.
1 Introduction
This article presents a critical analysis about the current model of the military service
in contract regime in the Portuguese Armed Forces (PAF) [1–3], which has been in
force since 2004, November. We intend to assess it in a global and integrated way,
considering the normative structuring of the model and its evolution over time, and
L. A. B. Santos (B)
Military University Institute, Lisbon, Portugal
e-mail: [email protected]
Lusíada University, Lisbon, Portugal
M. M. M. S. Sarmento Coelho
Lusíada University, and Military University Institute, Lisbon, Portugal
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 377
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_33
378 L. A. B. Santos and M. M. M. S. Sarmento Coelho
the way it has been applied. The model assessment constitutes an innovative form
of analysis, since in last decade the current model of the military service in contract
regime has been affecting the PAF and there are several challenges to be overcome.
Actually, the highest gap in the literature, especially in Portuguese language,
concerns the lack of an integrated perception of the problems and challenges that
PAF has to deal relatively to the military service in contract regime. For a long time,
the main studies were focused on recruitment, and later on retention, leaving to a
marginal plan the issue of professional reintegration after leaving the AF.
On the other hand, the studies elaborated by the Ministry of Defense are mainly
focused on the responsibility of the military organization that introduces dysfunctions
in the professionalization of military service in Portugal. Additionally, the branches
of the AF tend to point out external constraints (e.g., assigned budgets and legal
changes) as the cause of the difficulties that are felt.
The analysis of the individual perspective (expectations and career orientations),
sometimes “forgotten” by the military hierarchy, needs to be much more present in
future studies and in models implementation. However, the real added value results
from the complete integration of the various perspectives, an exercise that is done in
this study.
To carry out the critical analysis, we select three criteria, adapted from the studies
developed by Souza [4]—(i) relation between model and environment; (ii) model
structuring; and (iii) operation strategy—which have been compared using three
perspectives of analysis: “Macro” (represented by environmental exogenous or con-
textual variables), “Meso” (represented by internal or endogenous variables, which
are organizational variables in military context and are also model variables specific
of the military service under contract) and “Micro” (which represents the individual
perspective).
The object of the study has a double perspective, one is normative (in relation
to the model structuring) and the other is managerial (in relation to the respective
operationalization based on concrete management practices). The several parameters,
resulting from crossing the three criteria and the three perspectives, have been later
consolidated and evaluated individually.
In order to obtain a clear and integrated perception of the value of the current
model of the military service in contract regime, the results of the previous analysis
in relation to the main external variables (environmental) and internal (organizational
or related to the model) have been in a later phase gathered in three clusters—recruit,
retain and reinsert in the external labor market (LM).
This article constitutes a deepening of the critical analysis to the model and to
the incentives program that legally supports it. It allows to observe the existence of a
dynamic influence of environmental variables on organizational variables and on the
model, with the respective constraints at the level of military contract regime, from
the point of view of its structure and normative evolution and from the point of view
of its operationalization based on concrete management procedures.
Critical Revision of the Contract Regime in the Military … 379
Although other references can be used for this critical analysis, we have selected
three criteria adapted from Souza [4] and qualified by the authors as “organizational
dimensions considered important by literature,” due to a research conducted by the
authors with the objective of creating a tool for public management assessment.
From that research [4], four axes or analytical dimensions constitute the focus of the
theoretical references: (i) model structuring (e.g., level of formalization and detail;
hierarchy and complexity); (ii) operationalization strategy (e.g., management type;
level of centralization, flexibility and capacity to change); (iii) relation established
between the model and the environment (e.g., influences of external environment,
dynamism and complexity of changes); and (iv) organization as political system
(that represents the internal safeguard of personal benefits and interests of groups,
as a reaction to systems and organizational functioning which, in a certain way, do
not permit to fully accomplish the objectives).
Given its low relevance to the current research, this last dimension has not been
included in the critical analysis of the model in study. The first three dimensions
are also suggested by Loiola, Bastos, Queiroz and Silva [5] to characterize the
organizational dynamics.
The change of order between the two first criteria selected by Sousa [4] is related
with the option of beginning an external evaluation of the military organization and of
the model, deriving from the great influence that the exogenous variables have on the
organizational system. To make the critical analysis more complete and consequent,
the criteria above mentioned have been crossed with three perspectives of analysis,
with the same sets of variables: (1) “Macro perspective” of analysis, represented by
environmental or exogenous variables; (2) “Meso perspective,” expressed by organi-
zational variables in general and model variables; and (3) “Micro perspective,” which
materializes the individual dimension of the analysis and the associated variables.
Table 1 shows the factors selected for evaluation, resulting from crossing the three
criteria and the three perspectives of analysis.
The 45 analysis factors listed in Table 1, subsequently reduced to 30 (Fig. 1),
result from a previous work, which allows to select the different topics of analysis:
(i) normative review of the main legal diplomas that establish the military service
contracted in Portugal; (ii) theoretical and conceptual review of general topics with
application to the military context and service under contract; (iii) empirical review
on the main studies and reports prepared by the Ministry of National Defense and
the branches of the AF; and (iv) exploratory interviews with specialists, military and
civil servants, responsible for the management of human resources in the Ministry of
National Defense and in the branches of the AF. The integration of criteria in Table 1
results from the knowledge and previous experience of the authors on this subject.
380
Table 1 Selected criteria and perspectives for critical analysis of the model
Perspectives of analysis Criteria of analysis
Relation between model and environment Model structuration Operationalization strategy
Macro (external context—exogenous • Geopolitical and strategic mutations • System of careers and remunerations • New missions of the AF (by the
variables) (e.g., peace threats) • Service under contract political determination)
• Changes (military forces scenario) • Incentives Regime • Staff authorized each year by the
• Technological questions • Military charges and functions Supervisor
• Economic and financial conditions • Categories and specialties • Market studies by the MoD
• Restructuration of the State • Recruitment structure of the Minister • Dissemination policies—National
• Strategic Concept of National Defense of Defense (MoD) Defense Day (NDD)
(SCoND) • Structures of support to reintegration in • Recruitment policies
• “Defense 2020” Reform the LM and interdependency with QNS • Policies for training certification and
• Demographic conditions alignment with QNS and Qualifications
• Interdependency with LM National Catalogue (QNC)
• Qualifications National System (QNS) • Policies and means to support
reintegration
Meso • Military Strategic Concept (MSC) • Board of organic needs in terms of • Market studies by the AF
(internal context—organizational and • Missions of the PAF (MIFA) contracted staff • Communication mechanisms
model variables) • National Forces System (dimension • Structure and process of recruitment • Competences, selection and training
and structure of the force) and selection of the AF Branches profiles
• Process of configuration of the military • Career pattern profiles and other • Management policies of AF branches
force for each mission progression conditions • Regulation for functional and
• Restructuration process of the AF, by • Salary grids geographic mobility
self-initiative • Protocols and partnerships to support
reintegration
Micro (individual perspective) • Sociocultural profile • Career orientations (“Career Anchors”)
• Generational profile of young people • Willing to join the AF
• Unemployment rate among young • Early departure from the AF
people
L. A. B. Santos and M. M. M. S. Sarmento Coelho
Critical Revision of the Contract Regime in the Military … 381
Fig. 1 Main environmental variables related to the military contract regime in the PAF. Source
Authors
The first criterion refers to the relation established between the model and the external
environment.
higher complexity and ambiguity, which imposes in the military new competences
and new selection profiles [7].
Economic and financial conditions of the country. It is pointed out the recent world
economic and financial crisis, the resource of Portugal to international financial aid
and budgetary restrictions in the Budget Law since 2011, which has been conditioning
the military budget.
State Restructuration Procedures. They have conducted, since 2011, to more
rationalization of the military structures and to the progressive reduction of military
costs and number of staff authorized by the Government for military contract regime
[8, 9].
Strategic Concept of National Defense (SCoND). Regulation issued by the Gov-
ernment in the domain of National Defense Policy that defines forms to preserve the
main values, objectives and national interests, according to the strategic situation,
international environment and alliances [6].
“Defense 2020” Reform. Diploma that defines the need for optimization of
resources, from the 1.1% gap (±0.1) of the GDP to the defense budget and a max-
imum staff of soldiers from the AF between 30,000 and 32,000, as well as other
rationalization objectives [10].
Demographic conditions. This variable determines the universe of Portuguese
young citizens, possible candidates to the AF. Reality points at a progressive reduction
of this universe, clearly conditioning the basis of military recruitment and therefore
the respective capacity to obtain staff.
Labor market (LM) (interdependency and competition). The relevance of this
variable derives from the need for the AF to compete in the external market with
other organizations to obtain the necessary number of staff to function and accomplish
the missions, in opposition to the model that ended the compulsory military service.
This question surpasses the action capacity of the AF.
Qualifications National System (QNS). This variable is associated to National
Catalogue of Qualifications (QNC) and constitutes an important reference and one of
the objectives of the AF branches, in favor of the recognition and external certification
of the training provided and experience obtained in military context [11, 12].
Military Strategic Concept (MSC), Missions of the AF (MIFA) and National Forces
System (dimension and structure of the military forces). According to the national
interests and the level of ambition established, the orientations of action of the AF are
defined, as well as the strategic and military level and necessary military capacities
to accomplish the missions and to globally respond to the internal and international
demands [13–16].
Configuration process of the military force for each type of missions. For a certain
military mission, several configurations of the force may be conceived. In general, the
one selected accomplishes the mission at the lowest costs. It is considered, among
other factors, the technology available, experience and personal skills, as well as
Critical Revision of the Contract Regime in the Military … 383
subsidiarity among the several categories of personnel. The contracted soldiers are
generally integrated.
Restructuration procedures of the Armed Forces, by self-initiative. These pro-
cedures derive indirectly from political impositions and constitute the answer to
emerging operational demands and to a higher functionality and efficiency of the
subsystems of the AF branches.
The second criterion of analysis refers to model structuring, with connection, among
other aspects, to the level of formalization, detail, hierarchy and complexity.
Military charges and functions. These are fixed within the organic structure of the
AF or in State organisms, defined by categories, ranks and specialties, to which it is
inherent a certain level of responsibility [17].
Categories and specialties. Specialties of the soldiers contracted may change
according to the AF branch and professional category (officers, sergeants and pri-
vates), and they are connected to charges and functions as well as to very concrete
areas of training and activity, in relation to the form, they are managed in the AF
[17].
Recruitment structure of the Ministry of National Defense (MoD). In the structure
of the MoD, there is a “central organ” of recruitment and dissemination, with compe-
tences focused on planning, direction and coordination of the structuring procedures
of professionalization of the military service [20]. In spite of its formal creation,
except in what concerns some cyclic activities, it has not been effectively established
yet.
Structures of support to reintegration in the Labor Market (LM) and interdepen-
dency with Qualifications National System (QNS). In 2008, it was created the Infor-
mation and Vocational Orientation Centre for Professional Training and Employment
(CIOFE), structure that has the mission of supporting the soldiers contracted in their
passage to civilian life, with a set of services that help to construct a relevant formative
path and give professional orientation [21].
Board of organic needs in terms of contracted staff. They result from the missions in
the AF branches. Although the real organic needs in terms of contracted personnel
have not been reduced in the last few years, the existent numbers have suffered
losses given the reduction of authorized staff, each year, by the Government. The
comparison established between authorized staff and existence has transferred the
debate on the “satisfaction of real needs” to the “capacity to recruit and retain.” These
needs are much higher than they seem to be and surpasses the capacity of the AF.
Structures and process of recruitment and selection of the AF Branches. The
evolution of the conscription for professional AF in Portugal led to changes in the
structures, process and procedures of recruitment and selection, as a way to respond
to new. Standardization and articulation between the AF branches is essential to
improve efficiency and effectiveness.
Career pattern profiles and other progression conditions. They are established
based on the juridical concept of “special career” applied in the military. Although
there is some state standardization in relation to the entrance and progression in the
military career for the contracted soldiers [17], the respective profiles, conditions
for vertical and/or horizontal mobility and other possibilities of professional military
offer are not sufficiently recognized by the external public.
Salary grids. Salaries applied to the contracted soldiers are, for ranks and cat-
egories, the same applied to the soldiers of the permanent board. There are no
performance awards [17–19].
Critical Revision of the Contract Regime in the Military … 385
This third criterion manages the “operationalization strategy,” particularly the type
of management, level of centralization, flexibility and capacity to change.
New missions of the AF (by political determination). The “new” missions join the
traditional missions, as a response to commitments in the domain of alliances and
emerging requests in benefit of international security and defense.
Staff authorized each year by the Supervisor. To accomplish the missions attributed
to the AF branches, the Government approves annually a certain volume of personnel
to be contracted, distributed by categories and specialties, and generally designated
as “authorized staff,” often below the real needs.
Market studies carried out the Ministry of National Defense (MoD). These studies
are carried out by the MoD. They characterize the labor market and the social-cultural
profile of Portuguese young people.
Dissemination and recruitment policies (National Defense Day/NDD and other
forms). They clarify and inform Society on National Defense issues, to project the
institutional image and inform on the job availability (e.g., National Defense Day;
clarification conferences at schools; sites, social networks). These policies are not
very clear and need to be articulated and regulated.
Policies for training certification and alignment with the Qualifications National
System (QNS) and Qualifications National Catalogue (QNC). In spite of the effort
to the consolidation of military service professionalization, each branch has been
following its own path in relation to the certification of training and experience
achieved in military context and only a small part of this training is already certified
and aligned with the QNS and QNC [9, 10].
Policies and means to support reintegration in the Labor market (LM). Social-
professional reintegration of former soldiers in the external labor market has been
object of political and military debate in several fora.
Market studies carried out the branches of the Armed Forces (AF). The AF branches
have been carrying out market studies that join independent research studies, stressing
out the need to increase the maintenance of staff, by improving welcome, working
and facilities conditions.
Relation/communication mechanisms with the Labor Market (LM). The way to
communicate and diffuse the organizational image and work offer, that has been
somehow failing, seems to be determinant to recruit.
386 L. A. B. Santos and M. M. M. S. Sarmento Coelho
Career orientations (“career anchors”), willing to join the AF and early depar-
tures. Professional orientations of young people influence the decision of joining
and remaining in the AF, influencing the number of early departures. Any organiza-
tion in the labor market must have a clear message in relation to the job offer and
professional progression and must possess the capacity to respond to the needs of
individuals’ “internal career” [22–24, 25].
The model of the military contract regime in the Portuguese AF includes a set of
variables, as previously referred. In order to provide an integrated perception, focused
on the objective of the study, the main topics of the previous analysis are gathered
in three clusters—recruit, retain and reintegrate—followed by the explanation
about the interaction between internal variables (organizational and of the model)
and external variables (Fig. 1).
The environmental or contextual variables selected are also causal variables
since they are at the origin of the model and its evolution. This type of variables
is related, among other factors, to: (1) mutations of strategic and geopolitical inter-
national environment and the consequent change of the spectrum of military; (2)
Critical Revision of the Contract Regime in the Military … 387
The complexity and the level of formalization, hierarchy and detail inherent to the
construction of variables and to the co-responsibility relations that are established
between the organs that concern them, aspects related to “model structuring” crite-
rion, do not facilitate management, and therefore, “the operationalization strategy
of the model” is very centralized, low flexible and incapable of quickly adapt to
changes, notably those occurring in the labor market.
5 Conclusions
This research aims to carry out a critical analysis of the current model of military
contract regime in the PAF and the incentive program that supports. It is part of a more
comprehensive research, integrated in a research project enrolled in the Military Uni-
versity Institute in Portugal, based on the main dimensions of the professionalization
of military service: recruit, retain and reintegrate.
The object of the analysis is a set of parameters related to the military context, to
the normative model and to the environment, selected in an exploratory phase, later
stressed out and individually confirmed. These parameters are constructed and ana-
lyzed with reference to three criteria previously selected—relation between model
and environment; model structuring; strategy of model operationalization—and to
the insertion of these criteria with three different perspectives of analysis: “Macro”
(related to exogenous variables to the organization and to the model), “Meso” (orga-
nizational variables and model variables) and “Micro” (perspective of contracted
soldiers). Exogenous and endogenous variables have been later reevaluated, from
an integrated discussion, in three clusters—recruit, retain and reintegrate—which
constitute equal number of processes and materialize the focus of this research.
As main results of the study, besides the value linked to the individualized anal-
ysis of the three types of variables selected and of the most complete perception that
results from crossing criteria and analysis perspectives, it is pointed out the deter-
minant influence of exogenous variables on the AF over the endogenous variables
and the value of the incentives program to the military contract regime, which con-
nects the types of variables and provides higher balance in the operationalization of
the model. This program, although punctually difficult to be applied, constitutes an
unavoidable tool for a more efficient management of the contracted staff, in the area
of the three clusters, connecting the external and internal contexts and the subjects’
perspectives. However, the satisfaction of organic and functional needs related to the
military enlistment contract continues to depend mostly, directly or indirectly, on
the “authorized staff” as well as the budgetary conditions provided each year by the
Government.
In terms of political influence, besides the budgetary restrictions, the normative
question has a determinant influence on structure and operationalization of the model,
making it more formalized and institutionalized. On the other hand, the AF controls
most internal variables, influencing the accomplishment of the model, in spite of the
moderate influence of the environmental variables action.
Critical Revision of the Contract Regime in the Military … 389
Revisiting the conception of the three criteria selected, the critical analysis of the
military enlistment contract reveals a model, in its “relation with the environment,”
very permeable to external influence, in political, demographic and social-cultural
terms, with the corresponding constraints. On the other hand, there is a high complex-
ity and high level of formalization, hierarchy and detail in the “model structuring,”
evident in the set of variables and in the relations established between them, with
direct consequences on “operationalization strategy,” which makes management too
centralized, with low flexibility in terms of information flows and decision making,
low permeable to individual intervention and incapable of quickly adapt to changes,
notably those deriving from the external labor market.
This study materializes an innovative research perspective and contributes with an
important added value, not only in terms of knowledge systematization on the main
problems and dysfunctions related to the design (structure) and operationalization
of the model, but also on the main constraints and challenges that the Ministry
of Defense and the branches of the PAF will face in the short and medium term.
Another goal of this integrated critical analysis is to increase the awareness on the
model definition and its operationalization by the branches of the AF through the
implementation of best management practices using learned lessons.
In future research, the result of this critical analysis can be improved, doing
more interviews with the experts from the AF branches, namely on the effective
relevance of each factor and on the corresponding insertion in the three analysis
perspectives—macro, meso and micro.
References
1. Law No. 174/99 of 21 September: Approves the Military Service Law. Assembly of the Repub-
lic. Diary of the Republic, Lisbon (1999), https://dre.pt/application/dir/pdf1sdip//09/221A00/
65416550.pdf. Last accessed 12 Nov 2019
2. Decree-Law No. 320-A/2000 of 15 December: Approves the Regulation of Incentives to Service
in RV/RC (amended by Decree-Law No. 118/2004 of 21 May and by Decree-Law No. 320/2007
of 27 September). Portuguese Government. Diary of the Republic, Lisbon (2000), https://dre.
pt/application/dir/pdf1sdip/2000/12/288A01/00020011.pdf, last accessed 2019/11/10
3. Decree-Law No. 76/2018 of 11 October: Establishes the incentive scheme for former or
active duty AAFF personnel under contract (CS), special contract (SCS) or volunteers (VS).
Portuguese Government. Diary of the Republic, Lisbon (2018)
4. Souza, A.R.: Configurando Dimensões Organizacionais e Modelos de Gestão Pública: em
Busca de um Instrumento de Análise de Gestão para as Agências Reguladoras. In: Anais
EnAPG—ENCONTRO DE ADMINISTRAÇÃO PÚBLICA E GOVERNANÇA. ANPAD 30
ANOS, São Paulo, 22–24 Nov (2006). http://www.anpad.org.br/admin/pdf/. Last accessed 15
Oct 2019
5. Loiola, E., Bastos, A.V.B., Queiroz, N.S., Silva, T.D.: Dimensões básicas de análise das organi-
zações. In: Zanelli, J.C., Borges-Andrade, J.E., Bastos, A.V.B.: Psicologia, organizações e tra-
balho no Brasil. Artmed Publisher, Porto Alegre (2007). https://www.academia.edu/34222538/
Psicologia_organizacoes_e_trabalho_no_Brasil. Last accessed 9 June 2019
6. Resolution of the Ministers Council No 19/2013. Approves the Strategic Concept of National
Defense [SCoND]. Presidency of the Ministers Council. Portuguese Government. Diary of
the Republic, Lisbon (2013). https://dre.pt/pesquisa/-/search/259967/details/maximized. Last
accessed 7 July 2019
390 L. A. B. Santos and M. M. M. S. Sarmento Coelho
7. Hogan, P., Simon, C., Warner, J.: Sustaining the force in an era of transformation. In: Bicksler,
B., Gilroy, C., Warner, J. (eds.) The All-Volunteer Force: Thirty Years of Service. Brassey’s
Inc, Dulles (2004)
8. Resolution of the Ministers Council No. 39/2006, of 21 April. Approves the Program for the
Restructuring of the Central Administration of the State (PRACE) [online]. PCM, Portuguese
Government. Diary of the Republic, Lisbon (2006), http://dre.pt/pdf1sdip/2006/04/079B00/
66.pdf. Last accessed 10 Nov 2019
9. Resolution of the Ministers Council of 20 July. Central Administration Reduction and Improve-
ment Plan (PREMAC). Finance Ministry, Portuguese Government, Diary of the Republic,
Lisbon (2011)
10. Resolution of the Ministers Council No. 26/2013, 11 April. Approves guidelines for the imple-
mentation of structural reform of National Defense and Armed Forces—«Defesa 2020» Reform
[online]. PCM, Portuguese Government. Diary of the Republic, Lisbon (2013). https://dre.pt/
application/file/a/260308. Last accessed 15 Oct 2019
11. Decree-Law No. 396/2007, 31 of December. It establishes the legal regime of the Qualifica-
tions National System and defines the structures that ensure its operation. Labor and Social
Solidarity Ministry. Portuguese Government. Diary of the Republic, Lisbon (2007), https://dre.
pt/application/conteudo/628017. Last accessed 15 Oct 2019
12. Decree-Law No. 14/2017, 26 of January. It amends the legal regime of the Qualifications
National System [QNS] and defines the structures that ensure its operation. Labor, Solidarity
and Social Security Ministry. Portuguese Government. Diary of the Republic, Lisbon (2017),
https://dre.pt/application/conteudo/628017. Last accessed 10 Nov 2019
13. Strategic Military Concept [SMC]: Proposal of the Chiefs of Staff Council of the AF branches,
approved by the MoD on July 22, 2014 and confirmed by the Superior Council of National
Defense of 30 July 2014 (2014)
14. Armed Forces Missions [MIFA]: Document approved by the Superior Council of National
Defense on 30 July 2014 (2014)
15. Organic Law No. 1-A/2009, 7 of July. Approves the Bases Organic Law of the Armed Forces
Organization (LOBOFA). Assembly of the Republic. Diary of the Republic, Lisbon (2009)
16. Organic Law No. 6/2014, 1 of September. The first amendment to the Bases Organic Law of
the Armed Forces Organization, approved by Organic Law No. 1-A/2009, of July 7. Assembly
of the Republic. Diary of the Republic, Lisbon (2014)
17. Decree-Law No. 90/2015 of 29 May: Approves the Statute of the Armed Forces Military
Personnel. Portuguese Government. Diary of the Republic, Lisbon (2015), http://www.emgfa.
pt/documents/cqw3zjnhvg4s.pdf. Last accessed 20 Nov 2019
18. Law No. 12-A/2008, 27 of February. Establishes the scheme of bonds, careers and salaries
of workers who perform public functions. Assembly of the Republic. Diary of the Republic,
Lisbon (2008). (Partially repealed by Law No 35/2014 of 20 June)
19. Law No. 35/2014 of 20 June. Approves the Work General Law on Public Functions. Assembly of
the Republic. Diary of the Republic, Lisbon (2014). https://dre.pt/pesquisa/-/search/25676932/
details/maximized. Last accessed 12 Nov 2019
20. Regulatory Decree No. 8/2015, 31 July. Approves the Organic Directorate-General of
Resources of National Defense. Ministry of National Defense. Portuguese Government. Diary
of the Republic, Lisbon (2015), https://dre.pt/application/conteudo/69920320. Last accessed
20 Oct 2019
21. Information and Vocational Orientation Centre for Professional Training and Employment
[CIOFE] (2018), https://ciofe.dgrdn.pt/ciofe/missao.html. Last accessed 12 Feb 2019
22. Schein, E.: Career Anchors: Discovering Your Real Values. Pfeiffer & Company, University
Associates, San Diego (1990)
23. Baruch, Y.: Transforming careers: from linear to multidirectional career paths. Organizational
and individual perspectives. Career Dev. Int. 9(1), 58–73 (2004)
24. Hall, D.T.: Careers In and Out of Organization. Sage, London (2002)
25. Martins, H.T.: Gestão de Carreiras na Era do Conhecimento. Qualitymark, Rio de Janeiro
(2010)
Defense Organizations Budgeting
and Management Control Systems
in Restrictive Budgets
Context—Literature Gaps
L. M. Godinho (B)
Air Force Academy Research Center, 2715-021 Pêro Pinheiro, Portugal
e-mail: [email protected]
ISEG-Lisbon School of Economics and Management, 1200-781 Lisbon, Portugal
T. Gonçalves
Advance/CSG, ISEG-Lisbon School of Economics and Management, 1200-781 Lisbon, Portugal
© The Editor(s) (if applicable) and The Author(s), under exclusive license 391
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_34
392 L. M. Godinho and T. Gonçalves
1 Introduction
The Defense Organizations (DO), as public institutions, have to comply with the
respective legal, administrative and financial requirements, such as having to prepare
and execute a budget approved by the political executive. Particularly, since the
crisis of 2007, restrictive budgets are more common in the public sector, as in the
defense [1]. This has put a stress on DO to better justify to politicians, citizens
and its workforce the added value delivered [1, 2]. Foremost, in the potential value
embedded in the budgeting process, and ultimately by the execution and control of
the appropriated budget [3–5].
Restrictive budgets for DO may compromise the performance of missions,
research and development initiatives and current or future capabilities [1]. On the
other hand, other authors state that restrictive budgets in DO impacts expenditure
efficiency and management control [2].
Additionally, cumulative pressures to these organizations, identified in the liter-
ature about New Public Management (NPM), emerge from normative adoption of
management tools by public organizations, including DO. Findings suggest that it
is the contingencies that promote their use to achieve more efficiency and a client
focus [6].
The purpose of this paper is to identify gaps in the literature relative to orga-
nizational unit of Defense Organizations (DO) studies, such as the Armed Forces,
regarding the interaction between management control systems (MCS) and the bud-
geting process, in restrictive budgets context [2, 7–9]. The objective is to provide
directions for future research to answer the challenge of building bridges between
the academic and the practitioners within the scope of the present study [9–11].
A search for peer-reviewed papers in the EBSCO database was conducted for the
period between 2000 and 2019. The results were filtered to fit within the scope of this
study, and 2772 papers identified as valid. The preliminary findings corroborate the
gap in research related to DO, the branches of the Armed Forces, as organizational
units and the interaction between budget, budgeting and MCS.
The paper is organized as follows: It starts with the sections regarding the method-
ological choices for constructs and the literature search; the literature analysis chapter
presents a table to resume the preliminary findings and a brief discussion on the
main issues; finally, the conclusion of the paper enhances the academic knowledge
produced and gaps for future research agenda.
2 Methodology
Although the preliminary findings have evidence to be presented, the data analysis
is ongoing to create the knowledge map with the above mentioned techniques.
Initially, we argue that DO in each country, as well as the branches of the Armed
Forces, do not significantly depart from any other organization [12]. Their manage-
ment complies with most of the same principles as in the private sector. Although
the investment in major equipment and recruitment decisions are mostly political,
the current management is flexible, even if subjected to constraints and restrictions
imposed by public law and budgeting.
Consequently, the construct of interest adopted is the one that identifies the MCS
as a package of control systems with associated adopted instruments, as well as
subsidiary and related, of all organizational activity providing information to support
decision making [8, 12, 13].
From the previous literature, we identified the main keywords that reflect our
research goal (management control; budget; budgeting; expenditure; spending) and
cross them to find research specifically related to DO and military forces (Keywords:
military; Defense; Armed Forces).
Our final query ran the following criteria:
• Keywords on subject terms with Boolean search phrase: (Management Control
OR Budget OR Budgeting OR expenditure OR spending) AND (Military OR
Defense OR Armed Forces);
• Online EBSCO host databases;
• Related to military sciences, business and academic;
• English language only;
• Published between the years of 2000 and 2019;
• Peer reviewed only.
We also extended the search to equivalent subjects.
The first round of search with the criteria above returned 2802 papers.
In order to analyze their validity to the present study, a search within the first part
of the Boolean search phrase was made, restricting the results to those who contained
“management” or “control,” eliminating seven out of ten results.
Consecutive searches, within the initial framing, was made for “budget,” “bud-
geting,” “expenditure” and “spending.” The results returned the following num-
ber of papers, where we cross-identified research relating to our organizations
under analysis (military, defense and Armed Forces) with the aforementioned
keywords: management control—2 papers; budget—1055 papers; budgeting—30
papers; expenditure—594 papers and spending—1528 papers.
Finally, we conducted a brief content analysis of the papers obtained with our
search criteria.
394 L. M. Godinho and T. Gonçalves
The first round of search resulted in 2802 papers found. Overall, the papers that
met all constructs identified, (“OR” operator), within the scope of this study sum up
to 2768 papers, as shown in Table 1.
Based on the final database, we analyzed the scope of the papers. Most of the
papers found addresses a macro-organizational unit, such as the Ministry of Defense
or equivalent, the military spending of the country or the country’s military investment
expenditures, as shown in Table 1. None of the research studies the budget execution
of the Armed Forces as an organizational unit per se.
We followed our analysis by examining the scope of information and management
control under analysis on the papers on our search. Two out of ten papers, with
reference to management or control, are related with management control and DO,
but none of them with budget or budgeting subjects. All 30 papers with reference to
budgeting keywording relate either to the strategic planning or to planning or control
instruments but do not commit to establish an empirical relation between budgeting
and the MCS.
Specifically, and as an example, Letens et al. [1] refer to the importance of budgets,
but do not identify how the MCS interact with any of the categories within the
framework “means > ways > end.” This is common to all other studies, because they
focus on military spending determinants, expenditure factors or economic variables.
When we analyze the cross-importance of MCS and the intention of its use in
budgeting-related keywords, none of the papers identifies MCS with any other of
the keywords. The focus is mostly on spending with 55% of hits related to that, as
presented in Table 1.
When drilling the results for geography and geopolitical clusters by refining the
search, it is possible to find large focus on specific countries/geopolitical unions. The
250
200
150
100
50
0
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Fig. 1 Number of papers published per year (2000–2019)
recurrent subjects are the United States of America (USA) with 1133 papers, North
Atlantic Treaty Organization (NATO) alliance present in 150 research papers, China
with 153 and the European Union (EU) with 113 papers.
When we specifically addressed availability of the systematic literature surveys,
such as we propose to conduct in this paper, 17 hits returned after a refined search
within the first round for the Boolean phrase “review of literature OR literature review
OR meta-analysis OR systematic review.” After an analysis of their abstract, four
papers were validated as belonging to the scope of this study. A brief analysis of their
research setting, found evidence that the authors developed their research after 2012
[14–17], which may be related with the strong increment of research papers related
with these constructs from 2012 onwards, as shown in Fig. 1.
Methodologically, these literature survey papers are based on meta-analysis of the
relationship between economic growth of the country and the military expenditures
and spending [14–17]. This finding may indicate an association of the keywords
expenditure, spending more toward economical than management perspectives.
Finally and foremost, the results show evidence of a gap in studies with its focus
and scope on management themes, meta-data analysis or systematic literature review
related to MCS and budgets, when compared with the (macro) economic focused
area.
4 Conclusion
The NPM, the managerialism stress on the public sector and the request to increase
public funds management transparency has impacted the DO, not only at the political
national and international wide level but also at the individual Armed Forces. The
daily empirical observation reveals signs of an increase in complexity in the DO, prob-
ably as result of higher levels of education and technology. On the other hand, we must
provide the military and civil citizens information regarding the issues of efficiency
and sustainability, while providing evidence for more and better communication in
behalf of the DO, either internal or external.
396 L. M. Godinho and T. Gonçalves
The military organizations, namely their higher education institutions and research
centers libraries, were not screened to identify unpublished research papers or other
research work formats, leading to a limitation of the results presented in the literature
survey, for which we focused on published papers indexed on EBSCO.
The findings presented are part of ongoing research; therefore, the authors con-
sidered this as preliminary results. A detailed data analysis recurring to content
analysis of the papers is in process to present a systematic literature review, as part
of a methodology, to map the knowledge gap of budget planning and management
control research, at the organizational level of the DO.
Regarding potential conflict of interests, one author is a Portuguese Air Force
commissioned Officer and receives funding for its present doctoral program from
the same institution.
Defense Organizations Budgeting and Management … 397
References
1. Letens, G., Soares, J., Aken, E.V, Keathley-Herring, H., Vallet, N., Bockhaven, W.V.: Strategic
performance measurement for defense organizations: a preliminary framework. In: 2017 Inter-
national Annual Conference of the American Society for Engineering Management, ASEM
2017 (2017)
2. Navarro-Galera, A., Muñoz-Leyva, F., Maturana, R.I.O., Rubio, J.L.: Factors influencing the
modernization of military-investment economic appraisal systems. Defence Peace Econ. 25(6),
577–604 (2014)
3. Cain, C., Choudhury, E., Clingermayer, J.C.: Turnover, trust, and transfers: an examination of
local government budget execution. Int. J. Public Adm. 27(8–9), 557–576 (2004)
4. Dougherty, M.J., Klase, K.A., Song, S.G.: Managerial necessity and the art of creating sur-
pluses: the budget-execution process in West Virginia Cities. Public Adm. Rev. 63(4), 484–497
(2003)
5. Beeres, R., Bogers, M.: Ranking the Performance of European Armed Forces. Defence Peace
Econ. 23(1), 1–16 (2012)
6. George, B., Van de Walle, S., Hammerschmid, G.: Institutions or contingencies? A cross-
country analysis of management tool use by public sector executives. Public Adm. Rev. 79(3),
330–342 (2019)
7. Van der Stede, W.A.: Measuring ‘tight budgetary control’. Manage. Acc. Res. 12(1), 119–137
(2001)
8. Grabner, I., Moers, F.: Management control as a system or a package? Conceptual and empirical
issues. Acc. Organ. Soc. 38(6–7), 407–419 (2013)
9. Otley, D.: The contingency theory of management accounting and control: 1980–2014. Manage.
Acc. Res. 31(1), 45–62 (2016)
10. Chenhall, R.H., Moers, F.: The role of innovation in the evolution of management accounting
and its integration into management control. Acc. Organ. Soc. 47, 1–13 (2015)
11. Banks, G.C., Pollack, J.M., Bochantin, J.E., Kirkman, B.L., Whelpley, C.E., O’Boyle, E.H.:
Management’s science-practice gap: a grand challenge for all stakeholders. Acad. Manag. J.
59(6), 2205–2231 (2016)
12. Norheim-Martinsen, P.M.: New sources of military change—armed forces as normal organi-
zations. Defence Stud. 16(3), 312–326 (2016)
13. Chenhall, R.H.: Management control systems design within its organizational context: findings
from contingency-based research and directions for the future. Acc. Organ. Soc. 28, 127–168
(2003)
14. Alptekin, A., Levine, P.: Military expenditure and economic growth: a meta-analysis. Eur. J.
Polit. Econ. 28(4), 636–650 (2012)
15. Yesilyurt, F., Yesilyurt, M.E.: Meta-analysis, military expenditures and growth. J. Peace Res.
56(3), 352–363 (2019)
16. Emmanouilidis, K., Karpetis, C.: The defense-growth nexus: a review of time series methods
and empirical results. Defence Peace Econ. 31(1), 1–18 (2018)
17. Awaworyi Churchill, S., Yew, S.L.: The effect of military expenditure on growth: an empirical
synthesis. Empirical Economics 55(3), 1357–1387 (2018)
Coupling Architecture Between INS/GPS
for Precise Navigation on Set Paths
Abstract GPS offers the advantage of providing high long-term position accuracy
with residual errors that affect the final positioning solution to a few meters with a
sampling frequency of 1 Hz (Marston et al. in Decis Support Syst 51:176–189, 2011
[1]). The signals are also subject to obstruction and interference, so GPS receivers
cannot be relied upon for a continuous navigation solution. On the contrary, the
inertial navigation system has a sampling frequency of at least 50 Hz and exhibits
low noise in the short term. In this research, a prototype based on development cards is
implemented for the coupling of the inertial navigation system with GPS to improve
the precision of navigation on a trajectory.
J. Silva (B)
Universidad Peruana de Ciencias Aplicadas, Lima, Perú
e-mail: [email protected]
N. Varela
Departamento de Ingeniería Industrial, Agroindustrial y Operaciones, Universidad de la Costa,
Barranquilla, Colombia
e-mail: [email protected]; [email protected]
O. B. P. Lezama
Universidad Tecnológica Centroamericana (UNITEC), San Pedro Sula, Honduras
e-mail: [email protected]
H. H. Palma
Corporación Universitaria Latinoamericana, Barranquilla, Colombia
e-mail: [email protected]
E. N. Cueto
Corporación Universitaria Minuto de Dios—Uniminuto, Bogotá, Colombia
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 399
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_35
400 J. Silva et al.
1 Introduction
2 Methodology
The main objective of the implementation of this technology is to couple both systems
to reduce the error that is present in the GPS devices with respect to the positioning
accuracy in the parameters of longitude and latitude. For this purpose, it is necessary
to include inertial sensors through a coupling architecture called tight coupling,
which is detailed in Fig. 2, consisting of the measures of both independent systems
to later couple them through the Kalman filter and obtain the navigation solution,
using low-cost technology.
The extraction of raw data from the GPS NEO 6MV2 receiver [7] is done with free
hardware development cards, as shown in Fig. 3, using the device’s own programming
tools for the execution of the command lines in the console that allows the activation
of the antenna and extraction of the data of interest, in this case, the latitude, longitude,
and altitude as shown in Fig. 1.
The inertial measurement unit (IMU) used is the MPU 9250, which integrates sensors
such as accelerometer, magnetometer, and gyroscope, which must be calibrated (see
Fig. 2) before use, in order to extract data accurately and allow the manipulation of
reliable data [8].
Coupling Architecture Between INS/GPS for Precise … 401
For the calibration, the movements to be followed are those shown in Fig. 3, in
order to avoid errors in the obtained measurements.
For the selection of the sensory fusion algorithm, the AHRS filter is chosen, which is
open source. The results obtained by this filter, in this case, have less drift and their
data are more stable as shown in Fig. 4. Below are the results obtained by each filter
where it is clear that the best option is the AHRS filter [9].
402 J. Silva et al.
The Kalman filter makes use of a time dimension that consists of the analysis of
the dynamics of state variables and also uses a transversal dimension from where it
obtains the measurements in time intervals of the observable variables. The Kalman
filter is a recursive algorithm in which the initial state is considered to be a Gaussian
random assignable [10].
A linear stochastic model is modeled by means of the transition and measurement
equations [11]:
Coupling Architecture Between INS/GPS for Precise … 403
It is important to know that the position angles can be obtained by integrating the
angular speed which is no more than that derived from the angle in time [12].
θt = ω(t)dt + C (2)
where C is the integration constant and is responsible for the presence of errors in
measurement that are cumulative in nature. For this reason, the implementation of
Sebastian Madgwic’s AHRS filter has been carried out.
The yaw, pitch, and roll attitude values, apart from being represented graphically
by means of the application in Processing, are also shown numerically. However, it
is in the graphical representation where an infinite number of applications can be
found since they allow the monitoring of the position of the bodies [13].
3 Results
The experimental design is a very powerful scientific statistical tool that manages
to analyze the results of different methodologies, according to factors of variability
in order to determine the influence of these factors on the response variables. Two
methods are defined for subsequent statistical analysis. The initial method refers to
the GPS NEO 6M device and the second one to the integrated inertial system with
GPS. The statistical analysis focuses on the evaluation of the accuracy parameter
achieved by the two navigation systems independently (GPS) and merged (GPS +
IMU). The analysis of variance (ANOVA) [14] allows to obtain the existing error
by the measurements provided by the two methods, thus determining the difference
between the results of the systems.
404 J. Silva et al.
The experimental work is planned and organized in the following four steps [15]:
• Problem identification: determine the significant existence of accuracy between
systems
• Choice of response variable: the distance between the actual and measured
coordinates.
• Influence with the response variable: the block factor to be evaluated is the speed
of the device at the time the measurement is taken,
• Scenario: Two different speeds will be experimented for each method, 40 and 208
m/min.
In [16], the data of the experimental exercise are shown, which are used as a
starting point for the analysis with the ANOVA table. The error is calculated in
centimeters from the distance between the coordinates provided by the two methods
and the real coordinates of each of the 35 selected points. To determine the variations
in distance between the two methods to be used, the formula for distance between
two geographical points should be used to determine the absolute error.
After obtaining the absolute error of each of the 35 observations, for the two
methods and for the three block factors, the researchers proceeded to calculate the
average of each one summarized in Table 1.
To make the comparison between the two systems, it is necessary to make the
hypothesis that allows the performance of the system to be evaluated with respect
to the precision parameter, so the null hypothesis states that there is no significant
difference between the two systems, while the alternative hypothesis states that there
is a significant difference. This is established by comparing the mean and variance.
The structure of the ANOVA in a Completely Random Block Design (CRBD) [17].
The deducted results are used for the calculation of ANOVA (Table 2).
Finally, the results shown in Table 2 allow to reject the null hypothesis and accept
the alternative hypothesis that there is a significant difference between the GPS and
GPS + IMU, since the test statistic F, calculated by dividing the mean square of
both the method and the block for the mean square of the error, is greater than the
Table 2 ANOVA
Source of Sum of square Grades of Mean square Test statistic F Critical F
variability freedom
Methods 205,241 1 201,451,456 7078 182
Speeds 10,253 3 395,678,965 1.58 203
Error 6743 3 38,512,459
Total 211,237 6
critical F obtained from Fisher’s Table F [18]. As for the block factor evaluated,
which is speed, Table 2 suggests that this factor does not significantly influence the
response variable. This means that the method used to obtain the positioning strongly
influences the response variable, which, in the case of this experiment, is the distance
between the real point and the point measured by the device, that was specified as
an absolute error.
The comparison between the values of the average of GPS is 93.5 cm while
INS/GPS in 40 m/min records the average of 5.6 cm; the difference in the average
of the positioning error is 88 cm, which is significantly critical for applications in
navigation, thus proving the reduction of the inaccuracy in positioning when coupling
the satellite navigation system (GPS) with inertial sensors. Figures 5, 6, 7 and 8 show
the results of latitude and longitude scatter data comparison of the tests performed.
The first 10 points of the total 35, in reference paths, are analyzed from GPS and
GPS + IMU at speeds of 40 and 208 m/min. The developed algorithm allows the
integration and graphic visualization of the raw data of each system, as well as those
coupled between the GPS and inertial systems in real-time, with options to visualize
the positioning data of the evaluated trajectory.
4 Conclusions
The global positioning system was analyzed by determining the main errors that
occur in the GPS receiver equipment. In addition, the ultra-narrow coupling archi-
tecture was selected in order to implement GPS technology to the inertial navigation
system through the Kalman filter. The components selected for the implementation
of the prototype consist of the GPS NEO 6M module, the IMU MPU 9250 sensor,
and the Arduino MEGA board [19] since their technological and economic char-
acteristics are in line with the objective of implementing a low-cost prototype with
high performance in terms of positioning accuracy. The ultra-narrow coupling archi-
tecture allows merging the raw data and eliminates correlated errors by increasing
Coupling Architecture Between INS/GPS for Precise … 407
the accuracy of the navigation solution. The analysis of the achieved accuracy is
evaluated through the mean and variance of the measured coordinates along the
established trajectory, by calculating the absolute error between the real and the
measured coordinates.
References
1. Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., Ghalsasi, A.: Cloud computing—The
business perspective. Decis. Support Syst. 51(1), 176–189 (2011)
2. Bifet, A., De Francisci Morales, G.: Big Data Stream Learning with Samoa
(2014). Recuperado de https://www.researchgate.net/publication/282303881_Big_
data_stream_learning_with_SAMOA
3. Lomax, T., Schrank, D., Turner, S., Margiotta, R.: Report for Selecting Travel Reliability
Measures. Federal Highway Administration, Washington, D. C. (2003)
4. Pardillo, J., Sánchez, V.: Apuntes de Ingeniería de Tránsito. ETS Ingenieros de Caminos,
Canales y Puertos, Madrid, España (2015)
5. Skabardonis, A., Varaiya, P., Petty, K.: Measuring recurrent and non-recurrent traffic conges-
tion. Transp. Res. Rec. J. Transp. Res. Board 1856, 60–68 (2003)
6. U.S. Department of Transportation: Archived Data Management Systems—A Cross-Cutting
Study. Publication FHWA- JPO-05-044. FHWA, U.S. Department of Transportation (2004)
7. Yong-chuan, Z., Xiao-qing, Z., Zhen-ting, C: Traffic congestion detection based on GPS
floating-car data. Procedia Eng. 15, 5541–5546
8. Viloria, A., Lis-Gutiérrez, J.P., Gaitán-Angulo, M., Godoy, A.R.M., Moreno, G.C., Kamatkar,
S.J.: Methodology for the design of a student pattern recognition tool to facilitate the teaching—
learning process through knowledge data discovery (Big Data). In: Tan, Y., Shi, Y., Tang, Q.
(eds.) Data Mining and Big Data. DMBD 2018. Lecture Notes in Computer Science, vol 10943.
Springer, Cham (2018)
9. Thames, L., Schaefer, D.: Software-defined cloud manufacturing for industry 4.0. Procedia
CIRP 52, 12–17 (2016)
408 J. Silva et al.
10. Viloria, A., Neira-Rodado, D., Pineda Lezama, O.B.: Recovery of Scientific Data Using
Intelligent Distributed Data Warehouse. ANT/EDI40 2019, pp 1249–1254
11. Viloria, A., Pineda Lezama, O.B.: Improvements for Determining the Number of Clusters in
k-Means for Innovation Databases in SMEs. ANT/EDI40 2019, pp. 1201–1206
12. Alpaydin, E.: Introduction to Machine Learning. The MIT Press, Massachusetts (2004)
13. Álvarez, P., Hadi, M., Zhan, C.: Using Intelligent transportation systems data archives for traffic
simulation applications. Transp. Res. Rec. J. Transp. Res. Board 2161, 29–39 (2010)
14. Bizama, J.: Modelación y simulación mediante un microsimulador de la zona de influencia del
Puente Llacolén. Universidad del Bio Bio, Memoria de Título (2012)
15. Cortés, C.E., Gibson, J., Gschwender, A., Munizaga, M., Zúñiga, M.: Commercial bus speed
diagnosis based on GPS- monitored data. Transp. Res. Part C 19(4), 695–707 (2011)
16. Courage, K.G., Lee, S.: Development of a Central Data Warehouse for Statewide ITS and
Transportation Data in Florida: Phase II Proof of Concept. Florida Department of Transportation
(2008)
17. Diker, A.C.: Estimation of traffic congestion level via FN-DBSCAN algorithm by using GPA
data. In: Problems of Cybernetics and Informatics (PCI), 2012 IV International Conference,
Baku, Azerbaijan (2012)
18. Amelec, V.: Increased efficiency in a company of development of technological solutions in
the areas commercial and of consultancy. Adv. Sci. Lett. 21(5), 1406–1408 (2015)
19. Viloria, A., Robayo, P.V.: Inventory reduction in the supply chain of finished products for
multinational companies. Indian J. Sci. Technol. 8(1) (2016)
Vehicle Flow Prediction Through
Probabilistic Modeling
Jesús Silva, Noel Varela, Omar Bonerge Pineda Lezama, Vladimir Álvarez,
and Boris de la Hoz
Abstract Within the area of wireless and mobile communications, ad hoc vehicular
networks have generated the interest of different organizations, which has generated
a topic of study and analysis for the increase of applications, devices, technology
integration, security, standards, and quality of service in different areas (Zhu et al. in
IEEE Trans Veh Technol 64(4):1607–1619, [1]) and (Tian et al. in A self-adaptive
V2V communication system with DSRC, pp 1528–1532, [2]). This study on vehicle
networks shows a great deal of opportunity and motivation to deepen the aspects that
involve it, which have emerged due to the advance of wireless technologies, as well
as research in the automotive industry. This allows the development of networks with
spontaneous topologies with vehicles in constant movement in several simulations
(Mir and Filali in LTE and IEEE 802.11p for vehicular networking: a performance
evaluation, pp 1–15, [3]), with reliable vehicle flows, through the share of traffic
information, considering that continuous mobility is an essential characteristic of a
VANET vehicle network, which can have short changes in terms of groups of vehicles
in the same direction (Lokhande and Khamitkar, 9(12):30–33, [4]). The following
J. Silva (B)
Universidad Peruana de Ciencias Aplicadas, Lima, Peru
e-mail: [email protected]
N. Varela
Universidad de la Costa, Barranquilla, Colombia
e-mail: [email protected]
O. B. P. Lezama
Universidad Tecnológica Centroamericana (UNITEC), San Pedro Sula, Honduras
e-mail: [email protected]
V. Álvarez
Corporación Universitaria Minuto de Dios—Uniminuto, Barranquilla, Colombia
e-mail: [email protected]
B. de la Hoz
Corporación Universitaria Latinoamericana, Barranquilla, Colombia
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 409
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_36
410 J. Silva et al.
1 Introduction
Ad hoc vehicular networks are composed of a set of vehicles equipped with wireless
network devices capable of interconnecting each other without having a previous
infrastructure [5], thus obtaining a certain route, since it can provide location service
and weather information and also use them in different applications within telecom-
munications [6]. Through these networks, traffic congestion can be determined since
there are different approaches if one wishes to coordinate the state of traffic in terms
of mobility that goes from free flow to seriously congested which is where the greatest
number of cars circulate [7]. This is where the movement and prediction of vehi-
cles that have a certain degree of complexity are taken into account in a simulation
with several roads that are analyzed in detail, so the characteristics and prediction of
mobility within a VANET are based on several map models with predefined routes
where the number of vehicles has an important role for the network performance
to be effective [8]. Similarly, in order to develop this type of study and simulations
that offer greater performance in predicting vehicle flow, mobility must be analyzed
based on modeling represented by interaction between vehicles, taking into account
the transition of the cars during the journey [9].
However, the VANET network allows to enhance several applications in terms
of mobility and traffic efficiency, so the issue of congestion of the ad hoc networks
is analyzed [10], generating a vehicular flow to examine them through the Markov
chains that are discrete stochastic processes where the probability of an event depends
on the immediately preceding event. Therefore, the movement of each car is consid-
ered through the analysis of a mobility pattern, length change, or time between two
consecutive points. On the other hand, particle smoothing hydrodynamics (PSH) is
used to detect vehicle flow by plotting instantaneous waves according to the number
of cars found in the simulation [11]. By comparing experimentally modeled data,
the type of mobility in a proposed range can be distinguished since traces of data are
generated for pre-established vehicle movements so that changes in mobility flows
are generated for efficient road evaluation in a given time [12].
In mobility, it is known that experiments evolve over time, that is, they are no longer
independent; therefore their future state will have a probabilistic dependence on the
past. This means that the next value of an experiment depends on the past values, only
Vehicle Flow Prediction Through Probabilistic Modeling 411
through the current value of the process performed, considering a scenario where
there is vehicular traffic for its analysis, where it should be taken into account that the
future state will depend on the probabilities of transitions at each instant of time [13].
With this background, the Markov chains that estimate only the current location of
a group of vehicles to predict the next are considered and examined, since mobility
is modeled as a discrete stochastic process with successive values over time, where
the probability of moving a vehicle depends on the previous visited state [14].
2 Methodology
After obtaining the largest number of vehicles on the road network, a stochastic
process should be carried out represented by k(1), k(2), … where k(t) is the number
of vehicle sets analyzed in different positions with different radii during a time t as
shown in Fig. 1.
The probability model algorithm describes the process of obtaining the state
diagram using the position and radius of the vehicles in a transition.
states that for each fixed i, the series of values {pij } is a probability distribution,
since, at any step, some event can occur E 1 , E 2 , …, E m . The values pji are called
transition probabilities and must be greater than zero. Equation 5 indicates that for
each i = 1, 2, …, m. All these values are combined to form a transition matrix T of
size m × m where the sum of its rows has the value of 1; in addition, the elements are
greater than zero and not negative since the probabilities in the process of predicting
the vehicular flow are shown there. Equation 6 limits the transition of each vehicle in
several steps because the probability matrix pij chooses each element in the ith row
as well as in the jth column to display them together once the process is completed.
Table 1 presents the nomenclature used in the paper, which is divided into two parts,
namely parameters and variables, each with its respective domain and interpretation
[14].
pi j = (X n = j; X n−1 = i) (3)
m
pi j > 0, pi j = 1 (4)
j=1
⎛ ⎞
p11 · · · p1m
⎜ ⎟
m
T = pi j = ⎝ ... . . . ... ⎠; pi j = 1 (5)
pm1 · · · pmm j=1
m
pi(n)
j = P(X n = j, X n−1 = k|X 0 = i) (6)
k=1
3 Analysis of Results
The following map (Fig. 2) shows the roads to be analyzed, which are segmented
because the analysis is done on large avenues where there is a greater flow of vehicles
and approximately 2000 vehicles have been driven.
Figure 3 shows the variation of the radii during the simulation and also the different
positions that change according to the greater amount of vehicle flow in the entire
mobility network. Therefore, it is necessary to analyze the VANET mobility network
in different segments where there is a greater number of cars, in order to obtain
average values that can be interpreted.
As indicated in Fig. 4, in segment 9 the number of cars tends to increase, which
indicates that there is a greater vehicle flow at that moment since approximately a
value of radius 20 is obtained within the simulation. However, in segment 4 there are
10 cars so the radius has a value of 9 and, finally in segment 1 there are 5 vehicles
which indicates a radius of 7, so in these segments there is a greater vehicle flow.
Finally, in Fig. 5 the state diagram is presented to describe the behavior of the
system that is being constructed according to the Markovian matrix that contains the
probabilities of changes of states. Then, the values that are presented in the following
Fig. 5 Percentages of
vehicle flow in a VANET
416 J. Silva et al.
4 Conclusions
This paper defines three steps for the characterization of vehicular traffic in a VANET
network. It starts with an initial road map that allows to visualize the streets divided
into segments, positions, or sections to be analyzed and, in the same way, to visualize
the vehicles in each segment in a dynamic way. Then, a probabilistic model is used
to determine the probability by means of the position, the radius, and time of the cars
where there is a higher density of vehicles. Later, the data traces obtained during
the simulation of the mobility network are analyzed to characterize, in a predictive
way, the vehicle flow by performing a performance analysis of a VANET. Finally,
the mobility in urban areas where the vehicle flow is higher is examined.
References
1. Zhu, W., Li, D., Saad, W.: Multiple vehicles collaborative data download protocol via network
coding. IEEE Trans. Veh. Technol. 64(4), 1607–1619 (2015)
2. Tian, D., Luo, H., Zhou, J., Wang, Y., Yu, G.: A self-adaptive V2V communication system with
DSRC. In: 2013 IEEE International Conference on Green Computing and Communications
and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pp. 1528–1532
(2013)
3. Mir, Z.H., Filali, F.: LTE and IEEE 802.11p for Vehicular Networking: A Performance
Evaluation, pp. 1–15 (2014)
4. Lokhande, S.N., Khamitkar S.D.: Design and simulation of wireless ad hoc network using NS2
simulator. 9(12), 30–33 (2014)
5. Sadek, N.M., Halawa, H.H., Daoud, R.M., Amer, H.H.: A Robust Multi-RAT VANET/LTE for
Mixed Control and Entertainment Traffic, pp. 113–121 (2015)
6. Ndashimye, E., Ray, S.K., Sarkar, N.I., Gutiérrez, J.A.: Vehicle-to-infrastructure communica-
tion over multi-tier heterogeneous networks: a survey. Comput. Netw. (2016)
7. Garg, N., Rani, P.: An improved AODV routing protocol for VANET (Vehicular Ad-hoc
Network). 4(6), 1885–1890 (2015)
8. Abada, D., Massaq, A., Boulouz, A., Salah, M.B.: An adaptive vehicular relay and gateway
selection scheme for connecting VANETs to internet via 4G LTE cellular network. In: Emerg-
ing Technologies for Connected Internet of Vehicles and Intelligent Transportation System
Networks, pp. 149–163. Springer, Cham (2020)
Vehicle Flow Prediction Through Probabilistic Modeling 417
9. Zheng, Y., Luo, J., Zhong, T.: Service recommendation middleware based on location privacy
protection in VANET. IEEE Access 8, 12768–12783 (2020)
10. Obaidat, M., Khodjaeva, M., Holst, J., Zid, M.B.: Security and privacy challenges in vehicular
ad hoc networks. In: Connected Vehicles in the Internet of Things, pp. 223–251. Springer,
Cham (2020)
11. Tang, Y., Cheng, N., Wu, W., Wang, M., Dai, Y., Shen, X.: Delay-minimization routing for
heterogeneous VANETs with machine learning based mobility prediction. IEEE Trans. Veh.
Technol. 68(4), 3967–3979 (2019)
12. Srivastava, A., Prakash, A., Tripathi, R.: Location based routing protocols in VANET: issues
and existing solutions. Veh. Commun. 100231 (2020)
13. Ahmad, I., Noor, R.M., Zaba, M.R., Qureshi, M.A., Imran, M., Shoaib, M.: A cooperative
heterogeneous vehicular clustering mechanism for road traffic management. Int. J. Parallel
Program. 1–20 (2019)
14. Nkenyereye, L., Nkenyereye, L., Islam, S.M., Choi, Y.H., Bilal, M., Jang, J.W.: Software-
defined network-based vehicular networks: a position paper on their modeling and implemen-
tation. Sensors 19(17), 3788 (2019)
15. Viloria, A., Bonerge Pineda Lezama, O.: Improvements for Determining the Number of Clusters
in k-Means for Innovation Databases in SMEs. ANT/EDI40, pp. 1201–1206 (2019)
16. Amelec, V.: Increased efficiency in a company of development of technological solutions in
the areas commercial and of consultancy. Adv. Sci. Lett. 21(5), 1406–1408 (2015)
17. Zhang, Y., Wang, R., Hossain, M.S., Alhamid, M.F., Guizani, M.: Heterogeneous information
network-based content caching in the internet of vehicles. IEEE Trans. Veh. Technol. 68(10),
10216–10226 (2019)
18. Sharma, T.P., Sharma, A.K.: Heterogeneous-internet of vehicles (Het-IoV) in twenty-first
century: a comprehensive Study. In: Handbook of Computer Networks and Cyber Security,
pp. 555–584. Springer, Cham (2020)
Strategies and Organizational Changes
for the Logistics Sustainability
of Military Aircraft: Towards the Digital
Transformation of In-Service Support
Abstract The new requirements of the support system of the air forces to respond to
the new international defence and security paradigm, as well as the implementation
of the new 4.0 logistics, imply a complete organizational, cultural and strategic
reinvention. This translates into the need to assume the permanent transformation
of the models and processes of integrated logistic support and in-service support
that guarantees the viability and sustainability of aerospace operations. The work
aims to generically explore the possible strategies and organizational changes that
are considered necessary to be introduced into the logistics sustainability systems of
military aircraft, in order to carry out the digital transformation of in-service support
within the exponential digital technological evolution.
1 Introduction
The current international defence and security scenario [1] determines changes in the
strategy that will guide the development of new operational concepts and the acqui-
sition of new military and police capabilities, and are based on three key premises.
Firstly, that the present and future strategic environment is uncertain, complex and
conflictive. Secondly, that no crisis can be resolved satisfactorily with the isolated
use of military or police means, which must be combined and integrated with other
initiatives of a civil, political, economic, humanitarian or informative nature. Finally,
the military and police forces need to have a balanced and adequate catalogue of capa-
bilities, both for conventional conflicts as well as for irregular and hybrid combat
against new risks and threats. As a result, the response of the nations, in addition
© The Editor(s) (if applicable) and The Author(s), under exclusive license 419
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_37
420 M. A. Fernández-Villacañas Marín
to the traditional defence and security capabilities, has integrated and needs to con-
tinue integrating new ones, in an approach in which the “source of military-police
advantage” is that of technology and economic-logistic capacity [2].
The general design of the support system that the air forces would need to respond
to the new international defence and security paradigm should generally meet a series
of requirements [3]. Among them which we can highlight: ensuring the sustainability
of their weapons systems and improve its availability in accordance with its national
and international mission assigned in the short, medium and long term; generating
sustainability in a highly uncertain geostrategic environment, with the ability to
project peace and security immediately in remote and different operating scenarios;
as well as increasing efficiency by optimizing the resources available in a scenario of
scarcity, avoiding internal duplicity, as well as between the air forces and industry.
Operations involving in-service support (ISS) of military aircraft, which are those
that guarantee the viability and sustainability of military and police force opera-
tions, are becoming increasingly critical due to the vast amount of human, financial
and material resources used, as well as their impact on operational availability. The
presence of weapons systems based on increasingly complex technologies and the
necessarily expeditionary nature of these forces (they must be projectable, flexible,
interoperable and fully suitable for joint and combined action) makes it essential to
develop a strategy for optimizing their sustainability. The development of a systemic
technological concept is necessary through the integration of the functions of pro-
curement, transport, maintenance, life cycle engineering and deployment of weapons
systems at all levels of performance and sophistication. This integration must also
be consistent with digital transformation initiatives and the incorporation of their
disruptive technologies, both those that are currently available and those, which will
in the future, correspond to a foreseeable exponential technological development.
The current situation of the production factors of the logistics sustaining services
of aerospace weapons systems is generically characterized by three main factors [4]:
• In the first place, decrease of its organic productive capacity through the progres-
sive deterioration of the productive fabric, especially due to the loss of qualification
of human resources.
• Secondly, increased need for support due to the arrival in-service of new weapons
systems characterized by greater technological complexity, as well as achieving
the end of their life cycle of some very old systems that are still in service and
difficult to replace.
• Finally, increases in maintenance costs and reduced budgetary resources generated
by continuous budgetary adjustments caused by public deficit reductions.
The combined effect of the foregoing factors, together with the need to avoid a
reduction in the quality that could jeopardize the safety of air operations, is reflected in
the delay regarding the execution of the work, resulting in a progressive deterioration
in operational availability.
Strategies and Organizational Changes for the Logistics … 421
The work aims to generically explore the possible strategic and organizational
changes that are considered necessary to be introduced into the aeronautical logistics
to carry out the transformation of in-service support of aerospace weapons systems,
within the foreseeable exponential digital technological evolution.
In relation to the methodology, the research has been developed under a systemic
conception through a systematized deductive process (top-down) that is comple-
mented by empirical evidences based on the author’s logistical and research experi-
ence and the evolution of his professional maturity, such as it is included in his cited
bibliography (bottom-up). The rest of the bibliographic review has served to synthe-
size the essential concepts and approaches on the investigated problem, reviewing all
this with a level of detail that is considered sufficient, looking for its original aspects
to guarantee objectivity and avoid interpretive biases.
To achieve the objectives, the work is structured in three parts in addition to the
introduction, after which the conclusions are synthesized. First, the concepts of in-
service support transformation within the integrated logistic support are analysed.
Second, as results, the digital transformation of the in-service support is studied taking
into account the main disruptive enabling technologies. Finally, as discussions, eight
strategies and organization changes for the logistics sustainability of military aircraft
that should guide such digital transformation are reviewed.
2.2.1 The New Logistics 4.0: Transforming Logistics to the Digital Field
The new logistics 4.0 involves the optimization and connection of all the elements and
processes of the supply and distribution networks. This should lead to improvements
in the effectiveness and efficiency of the management of orders and shipments, an
individual customer-oriented manufacturing that demands more personalized offers,
geolocation of customers, simultaneous multimodal omnicanality and optimization
of global routes, full adaptability, full international traceability of goods, reduction
of stock and necessary storage space, automation of payments and so forth [5].
The main objective is to link both the physical and virtual worlds in order to make
the industry, logistics and markets more intelligent, in order to achieve a model,
whereby innovation is collaborative, the productive means are connected, supply
chains are integrated and distribution and customer service channels are digital. In
other words, integration, holistic vision, coherence, collaboration, innovation and
flexibility are key concepts, which support the development of the new logistics
422 M. A. Fernández-Villacañas Marín
4.0. This requires the development of a new logistics strategy, the design of a new
organization and the management of the change towards a new digital culture, as well
as the implementation of new methodologies and processes within the framework of
the progressive incorporation of both current and future digital tools and technologies
[6].
The future development of the new logistics has shaped the theory of physical
Internet [7], which has been adopted in both the USA and the EU as a concep-
tual objective of logistics for 2050. It involves achieving an open global logistics
system, based on physical, digital and operational interconnectivity, through encap-
sulation, interfaces and protocol design, in order to move, store, perform, provide
and use physical objects throughout the world in an economically, environmentally
and socially efficient and sustainable manner. To do this, it is necessary to reach a
maximum level of global collaboration, redefining the competitive space, taking the
logistics processes out of it, and taking it only to the points of sale where customers
define the market shares of each product [8].
Finally, it is necessary to emphasize that this new digital culture and logistics
will have to, on the one hand, assume the development of a new holistic style of
humanitarian leadership. On the other hand, it would need to have a permanent
capacity for digital leadership that can ensure the most critical element for the success
of the evolution analysed that it collaborates and is fully involved, in other words,
the human factor [9].
Integrated logistics support (ILS) in the aerospace field is an integrated and iterative
process for developing materiel and a support strategy that optimizes functional sup-
port, leverages existing resources and guides the system engineering process to lower
life cycle cost and decreases the demand for logistics, making the system easier to
support. In general, ILS plans and directs the definition and development of logistics
support and system requirements for military systems, with the goal of creating sys-
tems that last longer and require less support, thereby reducing costs and increasing
return on investments. ILS, therefore, addresses these aspects of supportability not
only during acquisition, but also throughout the operational life cycle of the system
[10]. The impact of ILS is often measured in terms of metrics, such as reliability,
availability, maintainability and testability, and sometimes system safety [11].
ILS includes the development of the different activities within the life cycle [12]
and although all of these activities are important in the aerospace field, it is necessary
to highlight some that are especially critical. These include, life cycle cost analysis
(LCCA) and logistic support analysis (LSA) with an analytical approach to determin-
ing integrated support needs; manpower and personnel planning and management;
obsolescence management and the plan for supporting technologies embedded in the
fleet with a long-term approach given the very rapid changes in those technologies
and products; facilities planning; repair and overhaul planning; development of a
Strategies and Organizational Changes for the Logistics … 423
supply chain for essential spares, services, special tools and test equipment; reliabil-
ity engineering; maintainability engineering and maintenance planning preventive,
predictive and corrective; disposal planning; and above all the needs for informa-
tion and communication technologies and data science systems. The complexity and
scope of ILS programs varies from fleet to fleet and between nations. ILS should
start at the early stages of design and development, continue throughout the life of
the different weapon systems and requires access to both large amounts of data and
staff with specialized skills.
On the other hand, in-service support (ISS) refers to the post-acquisition support
of an established fleet. Where ILS is the analysis, planning and support set-up, ISS
is the provision of support over the entire life of the fleet. An ISS plan is then
developed and the program processes are defined, as well as how they conform to
the procurement contract in order to form a fully integrated management system for
the overall program [10] (Fig. 1). The ISS program intends to provide long-term
support of the fleet. This presents costing, pricing and contract challenges given the
number of unknowns involved 20–25 years of ISS often costs more than the initial
fleet acquisition. The logistical support system for the fleet needs to be designed to
sustain a high level of operational availability and reliability in harmony with the
planned fleet mission profiles and expected usage. However, the support system has
to be capable of dealing with change and a wide range of levels of utilization and op-
tempo ranging from pre-deployment training thru to high intensity and unpredictable
combat deployments.
A hump can be seen at the very beginning of a program that is associated with
initial ILS activities and the deployment of the fleet. In between initial operational
capability (IOC) and final operational capability (FOC), there is generally an interim
support program that causes the fleet to be operational and supports initial training
and deployments. ISS costs are the lowest at the start of the program, given that the
fleet is relatively young, the maintenance of the heavy depot level has not begun and
failures have to be kept to a minimum. There is certainly a need to support problems
as they emerge, and there is a need to collect and analyse the data to provide clues as
to the future reliability of the fleet. The cost rises as the fleet becomes older, which
culminates in high levels even with intensive support and frequently some sort of
life extension or modification program. There are instances for half-life restoration
programs that update platforms, update technologies, address known fleet problems
and return the fleet to a “like-new” condition. This activity can often provide a positive
net return on investment through reduced support costs in the year [10].
The digital transformation of ISS of the air weapons systems needs to act in three
active lines [13]:
• Enabling technologies (Fig. 2): Select and progressively implement the most
appropriate technological solutions according to requirements, pre-existing
infrastructures, available IT systems, the capabilities of other resources, etc.
One of the preferred concepts of recent years in the defence sector has been transfor-
mation. We can define it as the process by which military advantages are achieved
and maintained through changes in operational concepts, structures and technolo-
gies, in such a way that it significantly improves operational capabilities within a
rapidly evolving environment [15]. Transformation therefore refers to the fundamen-
tal change in the form adopted by an organization to achieve its objectives; changes
in the way you work, interact, participate and even think about how to do things.
It means new methods, technology and processes [16]. Not only does it consist in
increasing budgetary allocations, but also mainly falls on the two most important
elements: qualified personnel and the time necessary for the development and exe-
cution of improvement plans [17]. The research effort that we have carried out, and
that we continue to carry out, has allowed us to determine a series of strategic con-
cepts on which to guide the improvement of the ISS within the strategy of its digital
transformation [13]:
(a) The strategic role that sustainability must play: Assuming that operational
needs should occupy the preferred place over other possible considerations,
the dilemma is to determine if logistics should sustain operations at any cost
or if the only possible operational effort is one that is logistically sustainable.
426 M. A. Fernández-Villacañas Marín
the first supplier to the last user) the integrated value generation process. The
differential analysis between the value generated by each process and the cost
produced will allow us to know to what extent this process is more or less
efficient. Therefore, the management approach to the production of logistics air
support services for the different workshops must be integrated within the afore-
mentioned supply chain. The integrated management of each of these chains
will depend on the preparation of the corresponding strategic plan that, in view
of all sources of supply and all sources of demand, efficiently integrate those
processes, relationships and flows that guarantee a dynamic adjustment between
offer and demand [19].
(f) Performance-based Logistics: In the area of procurement, the contracting
modalities to be applied should be oriented preferentially towards the results.
The concept of performance-based logistics (PBL) is the acquisition of sup-
port as an integrated and affordable package of results, designed to optimize
the availability and achieve the performance objectives of a weapons system,
through long-term support agreements, with clearly defined lines of authority
and responsibility. Therefore, PBL strategies focus on results and not on the
acquisition of the initial or intermediate goods and services that merely make
them possible.
(g) Public-private cooperation, both national and international: The application
of public-private cooperation in the ISS entails a change of philosophy and
mentality in the public organizations involved that will go on to manage cer-
tain essential services through a strategic partnership with private companies,
including financial entities, assuming these risks and shared responsibilities
with air forces. The advantages for both parties in applying these public-private
partnership models are straightforward. On the one hand, it can mean higher
levels of rationalization and efficiency for the air forces, as well as important
savings through the reduction of military and technical assistance of the individ-
uals involved, the reduction of investment costs of the facilities and equipment
(avoiding duplicate expenses, large investments in spare parts that need to be
maintained during the long life cycles of the systems, reducing the costs of con-
tinuous training, technical documentation and its corresponding updating, etc.).
On the other hand, the industry of defence can obtain a new field of business
development induced by the greater investment capacity derived from public
savings, addressing the development of new defence and security systems that
will make feasible the strengthening of the industrial base and technology of
that sector. Moreover, and perhaps most significantly, the function of the public-
private co-management models imply a permanent and bidirectional transfer of
knowledge between the public and private sectors. This involves the adaptation
and dynamic adjustment to the major changes that the exponential digital evo-
lution will generate to that “unique entity” formed by the structures of the air
forces and the participating companies, in a synchronic manner [6].
(h) The new role of information and logistics intelligence: It is necessary to empha-
size that the essential element consists in the provision and elaboration of the
information and logistic intelligence beyond the mere information systems for
428 M. A. Fernández-Villacañas Marín
the management, in order to turn them into authentic holistic systems of support
for the decision. The transition has to be carried out through the development of
complex analytical models (qualitative and quantitative) of interaction between
the various factors (internal and external) involved in each process; finally,
through the combination of systems, reach the “system of systems”.
5 Conclusions
The new requirements of the air forces support system to respond to the new interna-
tional defence and security paradigm and the new logistics 4.0 implicate a complete
organizational, cultural and strategic reinvention. This translates into the need to
assume the permanent transformation of the models and processes of integrated
logistic support (ILS) and in-service support (ISS) which guarantees the viability
and sustainability of aerospace operations. In-service support (ISS) typically refers
to the post-acquisition support of an established fleet where ILS is the analysis, plan-
ning and set-up for support, ISS is the provision of support over the entire life of the
fleet.
In relation to the implementation of the enabling technologies a great diversity
of applicable technologies are available but it is important to emphasize the critical
role that data science has to develop in ILS and ISS, the key development to reach
the effectiveness implementation of the digital transformation.
Finally, the research effort that we have carried out has allowed to determine
some strategies concepts and organization changes for the logistics sustainability
of military aircraft towards the ISS digital transformation: the strategic role that
sustainability must play; the empowerment of human resources and the evaluation
of their performance; the dynamic balance between efficiency and effectiveness;
the optimization of the productive systems used; the integration of value and supply
chains; the implementation of PBL systems; national and international public-private
cooperation; and the new role of information and logistics intelligence.
References
A. Jara-Olmedo (B)
CIDFAE Research and Development Center, Ambato, Ecuador
e-mail: [email protected]; [email protected]
M. Quisimalin
Dirección de Investigación Y Desarrollo (DIDE),
Universidad Técnica de Ambato, Ambato, Ecuador
e-mail: [email protected]
D. Chavez
Departamento de Automatización Y Control Industrial,
Escuela Politécnica Nacional, Quito, Ecuador
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 431
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_38
432 A. Jara-Olmedo et al.
1 Introduction
Over the years, special attention has been devoted to the collaboration between uni-
versity and industry as an important field of study related to knowledge exchange,
collaborative research, research contracts, or consultancy, which lead to technology
transfer and the increase of competitive industries [1]. The factors and processes
that contribute to the industry–university relationship need to be understood in depth
to establish agreements that will be efficient over time. This understanding influ-
ences the creation of initiatives and activities that contribute to the fulfillment of
the objectives of the collaboration [2]. Industries and universities may have differ-
ent perspectives on several aspects, including technology transfer, dissemination of
results, or motivations. However, access to research funding and knowledge benefits
are strong drivers of this relationship [3].
The defense sector requires flexibility and adaptability when establishing indus-
try–university collaboration agreements. This adaptability will need to be supported
by the culture and resources of all participating institutions [4, 5]. The absence of
these requirements in the establishment of agreements may result in industry–uni-
versity relations that fail even before they have started. Therefore, it is a logical
extension to assume that the creation of the conditions to support industry–univer-
sity collaboration may be associated with the need for an alignment in several areas
between universities and industries [6]. This lack of alignment can cause obstacles,
such as differences in institutional and organizational culture, problems with project
management, or different visions of research [7].
Industry–university collaboration barriers have been studied from different points
of view including frameworks, hindering forces, external support, and among oth-
ers [8–10]. These studies identify characteristics to facilitate the success of this
relationship. However, a case study can present the results from the experience of
practitioners and managers involved in the overcoming of those barriers. The nov-
elty of this article is its analysis of how a Research and Development Center can
build an effective defense sector–academia relationship and enhance the innovation
performance of their partners from the perspective of project management.
Based on a preliminary literature review, the framework of the data collection
is defined to find the barriers for this particular case. The paper aims to present
and discuss the solutions proposed by the Research and Development Center of the
Ecuadorian Air Force for the barriers identified in the defense industry–university
collaboration. First, a brief explanation of the center mission and goals is presented.
Second, considering obstacles presented the barriers are identified and grouped to
define them. Then, the solutions adopted by the R&D Center to overcome these bar-
riers are detailed. Finally, there is a discussion about the application of the solutions
in other cases.
University–Industry Collaboration Barriers: Project … 433
2 Methodology
First, a review of the existing literature on collaboration between industry and uni-
versities was carried out. The motivations, advantages, benefits as well as the barriers
to that collaboration were determined. At the same time, it was identified the pecu-
liarity of this collaboration when the defense industry is analyzed. The information
collected allowed to design a questionnaire used as a guideline for the interviews to
verify whether all the aspects are include in the research.
The gathering of information and data was based on in-depth interviews with
industry and universities personnel who participated in the project. The interviews
have been done with three former directors and four departmental heads of the R&D
Center, two project coordinators from universities and four former advisers to the
Ministry of Defense. All these people were involved in the project at least one year.
The Research and Development Center of the Air Force has the mission to pro-
viding solutions to the technical–operational problems of the military aircraft fleet
as well as to the equipment and systems of the armed forces by the development
of technological innovation. It has an administrative structure to manage resources,
infrastructure, and funding destined to defense projects. The R&D Center is part
of the Ecuadorian Air Force; for that reason, it has a military hierarchical nature,
since its organizational structure is based on the macrostructure of the armed forces.
However, a new management model was introduced to administrate R&D in coop-
eration with universities. The defense industry and the universities were linked by
collaboration agreements for the development of specific R&D projects.
For this case, the “UAV project” is considered as example for analysis of industry–
university collaboration management. This project had a duration of five years, and
the main goal was the design, construction, and validation of an unmanned air system.
The technologies developed include aircraft structures, automated flight control, and
data and sensors integration. The project was funded by the Ecuadorian Ministry of
Defense.
Collaboration between industry, university, and research organizations has been car-
ried out view describing motivations, benefits and obstacles from the point of view
of the university and from the point of view of the industry [4, 11, 12]. University–
industry collaboration may have identified generic barriers, but R&D schemes for
434 A. Jara-Olmedo et al.
defense sector may differ depending on each country. Consequently, specific barri-
ers for defense industry–university collaboration must be established. The analysis
considers generic barriers to select those more important for the case study. These
barriers have been grouped considering the classification of cultural, institutional,
and operational barriers.
Universities develop rigorous R&D regarding the scientific method whose expected
result is new knowledge. On the other hand, the defense industry develops R&D often
prioritizing innovation in the applied technology to military systems. The above is
also translated into development time. For universities, development time must go
hand in hand with the appropriate application of the research methodology. However,
for the defense industry, the time must be as short as possible, based on adequate
administration and optimization of resources, which allows to obtain technologi-
cal advantages in the short term. For this reason, the university–defense industry
collaboration may be subject to barriers related to the long-term research vision of
universities. Fundamental research carried out by Ph.D. students must be academ-
ically rigorous and demanding enough to guarantee its inclusion in the student’s
doctoral thesis. On the other hand, defense industry may have a shorter-term vision;
it could focus on information and knowledge of collaboration to improve a product
or service offered for military forces [2].
The impact of R&D can be measured by the innovation achieved in the development
of technologies [13]. This knowledge is materialized in the patents obtained or papers
published in specialized journals. The dissemination of the results allows positioning
and improving the prestige of the organizations that carried out the R&D [14]. How-
ever, in most cases, the results for the defense industry must be confidential in order
to exploit the technological advantage that can be obtained from R&D. On the other
hand, universities want their results to be disclosed as soon as possible in order to
demonstrate their research progress. This divergence of priorities must be managed
in R&D agreements because universities consider the delay of the dissemination of
research outcomes as one of the main conflicts in university–industry collaboration
[7].
University–Industry Collaboration Barriers: Project … 435
Defense industry seeks the innovation of technology to help the mission of its military
forces; for that reason, they prefer applied research in the short term. On the other
hand, universities seek to establish new knowledge through the rigorous application
of the scientific method; consequently, they develop basic research in the long term,
and the results sometimes are not immediately applicable. This research focus can
be related to the Technology Readiness Level (TRL) that establishes a scale for the
evaluation of technological maturity, which allows the project manager to adopt a
technology for a critical function within an element of the system [15]. It has been
observed that universities will tend to focus on fundamental research related to a low
Technology Readiness Level, while industries will tend to be driven by the availability
of technology with a higher TRL [16]. As noted above, it is necessary to establish
a proximity between academic research interests and industrial requirements for
research in order to improve the perspectives of R&D collaboration.
Innovation systems of defense sector have focused on aspects such as the appli-
cation of dual technologies, conversion, and diversification of military technology,
consequences of innovation in armament or the search for a relationship between
organizations involved in the defense R&D [17]. With the exception of the USA,
most countries do not have a well-established system of cooperation between gov-
ernment–industry–universities, and defense R&D systems are not integrated with
the civil innovation mechanisms [6, 18, 19]. In other words, there is lack of cooper-
ation defense industry–other industries–universities, and it is required an adequate
administration and leadership system.
R&D projects in the defense field are prioritized according to operational needs but
also depend on the funding they can obtain [20]. Traditional military requirements
include recovery, maintenance, or modernization of weapons systems, development
of virtual training tools, or equipment repowering. However, there are new threats
for national security such as drug and arms trafficking, criminal incidence in aquatic
spaces, illegal mining, and natural or anthropic disasters [21]. As might be expected,
436 A. Jara-Olmedo et al.
Plewa et al. [23] present four relational success factors (communication, trust, under-
standing, and individuals) to establish an adequate vision for managers on how to
administer successful and lasting collaboration agreements between the university
and industry. The collaboration between the university and the industry offers several
benefits for the parties involved; however, adequate management practices must be
established from the beginning of the project to even beyond its completion. Specif-
ically, a low level of administrative support for project management can become
an inhibitor of university–industry collaboration [24]. To conclude, it is necessary a
project management framework with an administrative structure and procedures for
the R&D activities.
An R&D project is a long-term process, therefore in the short term the administration
of the project manages the priority and visible results that defense industry may
require. At the same time, fundamental research progresses, the R&D Center works
with products derived from the main research topic, which may be useful in the
military field. As a result, benefits are transferred to third parties in the form of positive
externalities, known as spillover. The spillover market effect can be evidenced when
the research works conclude in the generation or improvement of products or services
that can benefit users who did not have direct participation in the R&D project. For
example, the development of automated flight control requires the design of interfaces
integrating height, position, and speed data from UAV aircraft. From the flight control
research, end user software was designed for aerial reconnaissance systems. Sensor
video images were referenced and integrated with the trajectory of the aircraft to
show them on a 2D display. This derivative product can be considered as a mid-term
visible product for the stakeholders.
University–Industry Collaboration Barriers: Project … 437
Before the research project starts, the R&D Center clearly defines the criteria for what
research results can be disclosed and which ones should be kept confidential. Within
the cooperation agreement, authorizations for the dissemination of results and the
committees designated for their evaluation are established. With these parameters,
defense sector and universities can present the results of the research project without
any conflict of interest. For the case study, the partial and final results of the R&D
project were presented in 19 technological meetings in different cities of the coun-
try as well as in two national seminars. Most important, 16 papers were published
in scientific journals and conference proceedings. Finally, 02 utility models were
presented for intellectual property protection.
Considering the nature of work of each institution, the R&D Center creates inte-
grated teams of military and civilian researchers. The research teams focused on the
development of the experimental concept and laboratory validation, i.e., low levels
of TRL, are leaded by universities. Research teams focused on the implementation
of prototypes in operating environments, where it was necessary to work with stan-
dards, regulations, and engineering orders for military systems, i.e., high levels of
TRL, are leaded by the R&D Center. Table 1 presents different TRL reached by the
technology developed in the project and who led the research teams. When a tech-
nological development reaches a TRL 6 level, R&D Center begins to contact final
user who can benefit from the applications and establish the environment for testing
and certification of the technology.
Table 1 Research teams leaded by university or R&D Center according to TRL level
TRL/technology Aircraft Automated Data integration Sensors
structures flight control integration
TRL 1 Basic University University
principles
observed and
reported
TRL 2 Concept University University
and/or
application
formulated
TRL 3 University University
Analytical and
experimental
proof-of concept
TRL 4 University University R&D Center R&D Center
Functional
verification in
laboratory
TRL 5 Function R&D Center R&D Center R&D Center R&D Center
verification in a
relevant
environment
TRL 6 Critical R&D Center R&D Center R&D Center R&D Center
functions in a
relevant
environment
TRL 7 R&D Center R&D Center R&D Center R&D Center
Performance for
the operational
environment
TRL 8 R&D Center R&D Center R&D Center
Completed and
accepted for
flight
TRL 9 Flight R&D Center R&D Center
proven through
successful
mission
operations
The funding of R&D projects can have several sources depending on the ability to
provide solutions to different stakeholders or sponsors. Therefore, the R&D Center
prioritizes the development of dual-use technologies, which satisfy both civil and
military requirements. The unmanned system project is already the development of
dual-use technology; however, its derivative products can be used for both military
and civil applications. Thus, the electro-optical sensors developed can improve the
capabilities of aircrafts used for surveillance and military reconnaissance, but at the
same time, they can be used for the monitoring of pipelines and strategic resources,
control of marine and natural reserves, support in natural disasters and search for vic-
tims, among others. Dual-use technology allows to fund R&D projects not just from
military sponsors but civil organizations related to the end users of the technology.
The R&D Center adopted for project management the best practices presented by
the PMI Project Management Institute, under which the research was adminis-
tered. Additionally, administrative support was provided by the R&D Center, which
includes administrative, financial, and logistic personnel and infrastructure. This
project management team plans, executes, controls, monitors, and evaluates the
R&D project. Under this scheme, the participating organizations provide the teams
of researchers by requirement and temporality of the project manager. Considering
the PMI approach, the R&D Center works as a matrix organization, where human
resources must be obtained from functional departments. This functional depart-
ments are the universities with their research groups that provide people for the
multidisciplinary teams. With this coordination, one of the main advantages is that
researchers from universities concentrate their efforts on the R&D goals with a low
administrative workload (Table 2).
6 Conclusion
The barriers identified for the defense industry–university collaboration are over-
come for the Research and Development Center of the Air Force with a management
model considering the interests of all parties involved in these activities. Initially,
the defense industry and the university have very divergent expectations such as
the levels of research and the dissemination of results. However, at the same time,
the parties recognize the benefits of an association such as access to state-of-the-art
440 A. Jara-Olmedo et al.
Acknowledgements The authors wish to express their sincere thanks to Universidad Técnica de
Ambato, Dirección de Investigación y Desarrollo (DIDE), for the institutional support to project
PFCA16 code.
University–Industry Collaboration Barriers: Project … 441
References
© The Editor(s) (if applicable) and The Author(s), under exclusive license 443
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_39
444 N. M. P. Caetano and N. A. R. S. Loureiro
1 Introduction
Recently, new technologies have supported the rapid development of health support
information systems (IS) [1]. Currently, health institutions use IS that simplify the
entire communication process, reducing the bureaucracy of processes, increasing the
amount and quality of data, improving response time and increasing quality of care to
patients. The volume and complexity of the information generated by IS, combined
with human limitations, condition the extraction of knowledge, making it difficult to
analyze and understand them.
The data mining process (DM) arises from the need for knowledge discovery,
through the development of methods and techniques for extracting knowledge from
information stored in databases (DB) [2]. DM is a process of identifying new patterns,
potentially useful and fundamentally intelligible [3]. DM requires knowledge of the
processes behind the data so that questions for analysis are defined, selecting the
relevant data for answering questions and interpreting the results of the analysis [4].
Thus, the use of techniques, processes and consequent development of DM models,
supported in the IS of a hospital institution, becomes feasible, in order to create
intelligent information about the business.
Studies based on homogeneous diagnostic groups (HDG) [5] show that hospitals
that can control internment times significantly decrease the costs per admission and
the patient’s daily. The duration of internment is a factor to be taken into account
since prolonged ones represent a direct increase in resource consumption [6]. In
line with the above, hospitals aim to reduce the length of hospital stay, increase the
number of beds available for new internment and provide better health care to their
users. These objectives are also reflected by Domingos [7], referring that the merger
of military hospitals led to a subsequent reduction of about 94% of inpatient beds per
1000 potential users. A length of stay (LOS) forecast model for hospitalized patients
allows them to avoid prolonged internment periods, improve health services, and
more efficiently manage hospital resources.
Other studies in this area, such as the one carried out in 1998, Merom et al. [8]
estimated the rate of days of inadequate internments (failure in the criteria established
for admission) and the subsequent identification of the variables associated with this
Inadequacy. This study obtained a value of 8.6 ± 12.2 days for inadequate internment
and 6.1 ± 7.3 days for adequate internment. In 2007, Abelha et al. [9] evaluated the
LOS of adult patients, hospitalized in an intensive care unit (ICU) and underwent
non-cardiac surgeries between October 2004 and July 2005. The model adopted in
this study was a simple linear regression, and a mean LOS result of 4.22 ± 8.76 days
was obtained. In 2010, Oliveira et al. [10] evaluated the factors associated with higher
mortality and prolonged length of stay in an ICU. From the analysis performed, the
mean value of 8.2 ± 10.8 days of ICU admission and the identification of attributes
associated with the intended objective was concluded: APACHE II, tracheostomy,
and reintubation. Also, in 2010, Kalra et al. [11] studied the temporal trends of the
workflow of the internal medicine service of a university hospital, analyzing the
data obtained in three different periods of time and covering 13 years. In this study,
Business Intelligence: Use of Data Mining techniques … 445
linear regression models were used that confirmed the monthly statistical increase
in the number of admissions of the internal medicine service from 117 (1991) to
455 (2004). Finally, it was confirmed that the LOS average decreased from 8.7 to
4.9 days. Pena et al. [12], also in 2010, evaluated the possibility of marking and
anticipating the LOS in an ICU. The collected data allowed to obtain the result of
4.2 days of stay on average in the ICU. More recently, in 2012, Freitas et al. [13]
investigated the discrepant LOS, studying the episodes of internment of Portuguese
public hospitals belonging to the national health system (NHS), between 2000 and
2009. In the analysis, logistic regression models were used to examine the association
of each variable with discrepant LOS, and the following results were obtained: nine
million episodes of internment analyzed (excluding ambulatory episodes), 3.9% of
discrepant LOS were identified for 19.2% of the total number of internments. Thirty-
five days were identified on average LOS for the case of discrepant values and 6 days
for non-discrepant values. They concluded that the variables age, type of internment
and type of hospital are significantly associated with high discrepant LOS. Rufino
et al. [14] studied, from August 2010 to March 2011, the factors that interfere in
LOS in a medical clinic ward. They also reported that in 2009 the national average
of LOS was 6.6 days, while in public hospitals of medium and high complexity
it was 9.3 days. Finally, they obtained for LOS an average of 20.9 days. In the
study conducted by Caetano [15] at the Portuguese Air Force Hospital (PAFH), it
was concluded that an episode of internment under internment regime had a LOS of
3.81 days. The medical service presented a LOS of 3.44 days, followed by orthopedics
service (3.14 days) and finally the services of surgery, specialties, and pulmonology
(2.98 days). The medical specialty internal medicine represented 4.42 days of LA,
followed by orthopedics (3.39 days), the specialty general surgery (3.14 days) and
Urology with 3.10 days. In the 2015 study, Caetano et al. [16] obtained 3.9 days of
LA for an episode of internment under internment regime.
As part of the merger process of the main military hospitals in Portugal, the Armed
Forces Hospital (AFH) was created as a single military hospital, organized in two
hospital centers, one in Lisbon and the other in Oporto.
Due to the close relationship between hospital LOS and hospital costs [17], in
which episodes with prolonged LOS are responsible for an important percentage in
the total days of internments, becomes essential to continue the study developed from
2000 to 2012 and compare with data from 2013 to 2017, facing all the organizational
changes identified earlier.
With this research, it is intended to adequately support the decision-making of
AFH, and that its conclusions potentiate a more efficient internment process, opti-
mizing the management of available beds, providing a higher average occupancy and
lower waste of hospital resources [18]. Therefore, it is the general objective (GO),
to obtain an optimized predictive model of LOS of patients in AFH, through the
discovery of behaviors and patterns existing in the internment process, based on DM
techniques. To reach the general objective, it is necessary to achieve the following
specific objectives (SO): SO1—Build a model for predicting LOS; SO2—Evaluate
the results obtained with previous identical studies.
446 N. M. P. Caetano and N. A. R. S. Loureiro
2 Conceptual Framework
During the exploratory phase and with the end of the initial bibliographic research,
a set of important concepts for the present investigation was identified.
The hospital length of stay, previously identified as LOS, was another concept iden-
tified, a term defined as the duration of an inpatient episode, calculated from the day
of admission until the day of discharge, based on the number of nights spent in the
hospital. Patients admitted on the same day of discharge have a length of hospital
stay shorter than one day.
The last of the concepts identified was the cross-industry standard process for data
mining (CRISP-DM). The CRISP-DM methodology describes some approximations
used by experts to solve problems and build predictive analysis models. The method-
ology in question arose from the need to define a standard, non-proprietary and free
procedural model to systematize knowledge discovery. CRISP-DM methodology is
represented by a hierarchical process model and consists of a set of tasks with four
levels of abstraction: phases, generic tasks, specialized tasks, and process instances.
CRISP-DM is divided into the following phases: business understanding, data under-
standing, data preparation, modeling, evaluation, deployment. Lifecycle phases are
Business Intelligence: Use of Data Mining techniques … 447
flexible, because at any point in the project it may be necessary to retreat to previous
phases, and the result of each phase determines the next phase to perform.
3 Method
At this stage, we aimed to understand the objectives and requirements of the business
perspective, converting this knowledge to the definition of a DM problem, defining
a plan and success criteria to achieve the objectives [21].
At the level of business objectives, it was presented as the main objective to
obtain a predictive model of LOS of patients in the AFH, through the discovery of
behaviors and patterns existing in the internment process, based on DM techniques.
To adequately support the decision-making of the AFH and enhance a more efficient
internment process, at the level of the business success criteria, the choice will fall
into the regression model that produces the values closest to the source data.
In the next step, it was intended to define business goals and trans-convert business
objectives to data analysis. Thus, in coordination with the direction of the AFH, it
was identified that the model should provide for LOS with a margin of error of less
than 30%.
To achieve the previously established goal, one wants to choose the regression
model that produces the values closest to the data, where the optimal regression
model has a value close to 0%. Finally, for the data modeling phase, the following five
regression techniques were identified: decision tree (DT), naive, multiple regression
(MR), random forest (RF) and support vector machines (SVM).
448 N. M. P. Caetano and N. A. R. S. Loureiro
This phase began with the acquisition of initial data, description, exploration, and
verification of their quality. The entire inpatient process had been identified in the
previous investigation, and all extracted attributes were already limited to a record
per user and by the number of internment process.
Data extraction was performed via SQL Navigator tool, running the script for
initial data acquisition, which allowed transposition to the manipulation file of DM
techniques (internamento.xls). Forty-four attributes were initially selected and the
data relating to the period from January 1, 2013 to May 31, 2017, recording 20,291
inpatient episodes. The 28 attributes (see Table 1) that will support the continua-
tion of the investigation were previously referenced by a panel of experts [15]. In
the following tasks of exploration, statistical analysis and distribution of attributes,
verification of data quality, Microsoft excel tools were used to eliminate Portuguese
characters (incompatible with the open-source rminer library) and open-source R.
Data analysis identified that qualitative attributes represent most of the selected
attributes (68%) and quantitative represent the minority (32%). It was verified the
existence of omitted values for some of the attributes (e.g. marital status with 8434
missing values), and that some of the qualitative attributes have a high number of
possible values (e.g. the 12,703 possible hours of inpatient), representing a high
dispersion, and may hinder the use of these same attributes by DM techniques.
The graphical visualization of the distributions of the attributes was then per-
formed, using the frequency diagram and the diagram of extremes and quartiles
(boxplot), which allowed the identification of the discrepant values (outliers) and to
analyze the degree of asymmetry of the distributions.
Summarized the analysis of the 28 attributes selected, within the scope of the
internment process, it was concluded that the user of the AFH is mostly male, predom-
inantly married, having basic education. It was during January that there were more
episodes of internment, mainly in the Surgical Department—Ward B and Surgical
Department—Ward A.
Table 1 (continued)
Attribute Description N° Nº Original Type of
validations selections classification treatment
(panel) (studies)
Mês_Intern Internment 2 – Nominal Nominal
month
Ano_Intern Internment 1 2 Ordinal Numeric
year
Hora_Intern Internment 4 – Date Nominal
hour
Dt_Alta_Intern Discharge 4 2 Date Nominal
date
Hora_Alta_Intern Discharge 2 – Date Nominal
hour
N_Intern_Anterior Number of 9 2 Numeric Numeric
previous
internments
Attribute to predict
N_Dias_Intern No of days 9 5 Numeric Numeric
of
internment
descriptive “Unknown”. Also, during this task, ten attributes were excluded due
to the existence of redundant attributes, high number of omitted values and low
theoretical relevance. After performing a first cleaning of the data, 18 significant
attributes and 20,287 episodes were totaled.
To solve the issue of omitted values in several attributes, because their existence
contributes to the decrease in the quality of the models, one can, for example, ignore
the records or replace them by applying various techniques: case substitution (value
assigned by an expert), cold deck (value taken from a database) and hot deck. In this
investigation, the hot deck technique was applied, which consists of looking for the
closest or similar example and consequent replacement of omitted values with the
value found [22].
The variables N_Dias_Intern and N_Intern_Anterior are biased to the left debut
of their values domain, and a transformation technique (log1p(x) function available
in tool R) was applied, which allowed to calculate the ln(x + 1) accurately and
facilitate the learning process in the next phase, having obtained new transformed
attributes (LG_N_Dias_Intern and LG_N_Intern_Anterior).
Once the task of cleaning the data was completed, the following task was
advanced: data construction with the inclusion of new attributes (derivatives) that
presented good relevance to the remaining investigation.
These attributes, Hora_Intern and Hora_Alta_Intern, were transformed (for-
mat changed to “HH”) because they had 12,703 and 8336 levels, respec-
tively. The attributes Escolaridade, Proc_Principal, Diag_Principal, Diag_Inicial,
Business Intelligence: Use of Data Mining techniques … 451
Idade_Intern still had many possible values, having been simplified through the
delevels function, reducing their number of levels for analysis. Finally, and for better
data modeling, the attribute Mes_Intern has also been transformed.
After performing the necessary procedures to obtain good modeling of the data,
we advanced to the next phase with a total of 20 attributes and 20,287 records.
3.4 Modeling
According to Chapman et al. [21], at this stage, several modulation techniques are
selected and applied, and their parameters were adjusted to optimize the results.
It is important to mention that, as the attribute to be predicted is quantitative, the
approach chosen and explored was a regression, having tested different techniques
and metrics, such as the selection of the five regression techniques mentioned above
in the business comprehension phase (DT, naive, MR, RF, SVM).
The naive technique represents the forecast of the average values of the output
variable. DT works well with large datasets, many variables, with different types
of data, and its structure is relatively easy to follow and understand [23]. MR is
a model that requires little processing and easy interpretation by humans, while
RF is composed by a set of DT, built on the basis of an original data set. Finally,
SVM is based on the definition and use of support vectors that contain only the
most representative examples of the training universe, later applying a nonlinear
transformation to input attributes through a kernel function, that allows you to define
the optimal plan of separation between possible output classes [24].
Aiming to choose the model that best results obtain, it became necessary to apply
validation procedures to evaluate the predictive capacity of the obtained models.
In the holdout validation method, the sample data is divided into two sets: the
training dataset (2/3) is used to build, identify, and estimate the parameters of the
model, while the test dataset (1/3) is used to evaluate the accuracy and performance
of the model. The election model should be the one that best generalizes trained data
and what best identifies in learning new cases.
Another validation method used is k-fold, requiring a more elaborate procedure.
The data is divided into k partitions of the same size and in each run, a certain subset
is tested, and the rest are used for model training. In the case of k = 5, in each rotation,
a model is trained and the overall estimate of the model is given by the average error
of the test of the k rotations.
It is highlighted once again, that the chosen programming environment was the
R environment and the open-source rminer library. The regression problem began
with the exploration of simpler prediction models (naive, MR and TD), later moving
to more complex models (SVM and RF).
The open-source rminer library stands out the mining and save mining functions.
Mining is a function that trains and tests a model adjusted to the various executions
and validation methods: the runs parameter indicates the number of process runs, the
model parameter indicates the technique chosen, and the method parameter indicates
452 N. M. P. Caetano and N. A. R. S. Loureiro
the form of validation. The holdout validation method was selected, with 2/3 for
training and 1/3 for testing, and with the completion of this process, the save mining
function archives the information and results obtained from the model for further
analysis and treatment.
After completing this initial experience and in order to obtain greater robustness of
the results achieved, 20 executions of each technique of the cross-validation methods
holdout and fivefold were carried out, emphasizing that 20 executions were applied
to each procedure fivefold, making up the total of 100 experiments for each test.
After all the tasks for obtaining the different models were completed, we
proceeded to the phase of evaluation of the results.
3.5 Evaluation
The objective of this phase was to evaluate the models conceived, verifying their
behavior in a test environment and ensuring that they meet the business objectives
[21], and the models were evaluated according to the business objectives previously
defined.
In regression models, it is intended to choose the one that produces values closest to
the data, having used regression metrics to evaluate the various models (for example
the R2 metric allows measuring the degree of correlation between predictions and
values observed). Based on the open-source R tool, namely the mmetric function
belonging to the rminer library, it became possible to calculate the regression metrics
and evaluate the quality of the obtained models.
Another method used to evaluate and compare regression models was regression
error characteristics (REC). The REC curve allows you to compare multiple regres-
sion models in a single chart, exposing the overall hit rate (axis of the ordered) to
various tolerance (T ) values of absolute error (axis of the abscesses). It is concluded
that the rate of correct answers is defined as the percentage of points that fit within
tolerance, and if the tolerance were zero, only the perfect prediction points would be
considered [19].
The last method used to evaluate the quality of the results obtained by the best
model was the regression scatter characteristics (RSC) dispersion graph, in which
the observed values are represented in the axes of the forecast values.
Finally, and in order to obtain more accurate and expressive information of the best
model obtained, the relative input importance (IMP) barplot and variable effect curve
(VEC) were used, proposed in [25]. The mgraph function of the rminer library allows
you to obtain the VEC curve for the most important attributes in model construction.
Business Intelligence: Use of Data Mining techniques … 453
3.6 Implementation
The models obtained have good quality, and one of the possible scenarios to be fol-
lowed by the direction of the AFH involves the incorporation of the models obtained
in its current system, that is, in the electronic patient record system (EPR) that is part
of the hospital information system (HIS).
With the application of regression metrics, after selection in the previous phases
of regression techniques and application of the holdout validation method (2/3 for
training and 1/3 for tests), it was possible to first evaluate the quality of the obtained
models. Subsequently, 20 executions of each technique were performed, obtaining
the results of the mean error values of each model through the meanint function
(average calculation and confidence interval).
Being these the first models, it is to highlight the good performance of the RF
model obtained in the R2 metric the result of 0.726 (run = 1) and 0.73 (run = 20).
The good result in the other metrics compared to the SVM model is also highlighted.
In order to obtain greater robustness in the results, 20 executions were performed
with each fivefold validation method.
We confirmed that the evaluations made by the R2 metric, namely the value of
the RF model (0.735), result of the fivefold validation method, is higher than the RF
model value (0.73), the result of the holdout validation method (run = 20) and that
it fits the objectives listed by the direction of the AFH, identifying a model with the
capacity of predicting the LOS with an error margin of less than 30%. It was also
confirmed that the best results were obtained by the RF model, which surpasses other
DM models for all three-error metrics.
To verify that the results of the average error values of the two best models (RF
and SVM) of the fivefold validation method are effectively different from each other,
the student test was made. The t-test is a hypothesis test that allows to reject or not
a null hypothesis, and the probability of error is called p-value and the confidence
level by 1-p-value (probability that the confidence interval contains the parameter
value). The open-source R has the t-test function to perform the parametric test, and
the following hypotheses have been defined:
H0: The difference in the result of RF and SVM models is equal to 0.
Ha: The difference in the result of RF and SVM models is different from 0.
With a confidence level of 95%, H0 (null hypothesis) was rejected because there
is statistical evidence to state that the difference in the outcome of RF and SVM
models’ averages are significant, i.e., the p-value of 0.05. With the rejection of H0,
it was concluded that the result of RF model means is significantly higher than the
mean of the SVM model.
454 N. M. P. Caetano and N. A. R. S. Loureiro
To evaluate the results of the models, the mgraph function of the rminer library
was used, which allowed the REC analysis to be obtained.
The analysis of the REC chart confirmed the RF model as the best predictive
model, always presenting greater accuracy (y-axis) for any tolerance value (x-axis).
For example, for a tolerance of 0.5 (on the logarithmic transformation scale), the RF
model correctly predicts 78.5% of the test set examples. After a first analysis of the
REC chart, in the next step, it was possible through the normalized REC area and
tolerance metrics belonging to the mmetric function of the open-source R, to obtain
the precise values of the two best models (RF and SVM) for 11 variance values
absolute in the interval [0.1].
If the variance value is 0.5 the hit rate for the RF model is 0.785 and 0.77 for the
SVM model (0.015 lower than the RF model). It was also found that for all absolute
deviation values, the RF model presented a better precision compared to the SVM
model, with a difference ranging from 1.1 (to a tolerance of 1.0) to 8.3% (for a
tolerance of 0.1).
In conclusion, ensuring the requirement to obtain a model that would allow pre-
dictions to make forecasts with a margin of error of less than 30%, the RF model
with an absolute deviation of 0.4 (in the logarithmic transformation scale) was able
to predict correctly 73.6% of the cases and with an absolute deviation of 0.5 (in the
logarithmic transformation scale) a correct rate of 78.5% was obtained.
Finally, the mgraph function was reapplied with the graph = “RSC” parameter,
which allowed the RSC scatter plot to be obtained from the best available models and
their calculations for predicting the maximum error at the lower and upper extremes.
If for absolute deviation of 0.5 the RF model obtained a correct rate of 78.5%
of LOS, this means that it gives a maximum error of 0.65 days to the lower end of
the scale (0) and a maximum error of approximately 32 days at the upper end of the
scale (4.4).
Through the sensitivity analysis of Cortez and Embrechts [25, 26], it was possible
to graphically obtain the relative importance of the various attributes. The application
of the fit and importance function with the method = “DSA” parameter of the rminer
library allowed to extract knowledge of the generated model, in terms of importance
and average of the results of the analyzed attributes.
According to the analysis of the chart of Fig. 1, it was confirmed that the attribute
type of internment episode (T_Episod_Intern) presents an importance of 31.9% in
the definition of the generated model, followed by the most significant attributes:
internment service (Serv_Intern) with 8%, medical specialty (Espec_Medica) with
7.5% and finally the Destination of Discharge (Dest_Alta) with 7.2%. On the other
hand, it was also found that these four more significant attributes related to the
clinical situation of patients contribute more than 50% to the explanatory capacity
of the generated model.
In the last phase of analysis and in order to detail the influence of the most
significant attributes on the construction of the RF model, the VEC graph was applied
together with the importance function.
Business Intelligence: Use of Data Mining techniques … 455
Fig. 1 Importance values 0.00 0.05 0.10 0.15 0.20 0.25 0.30
for model definition
T_Episod_Intern
Serv_Intern
Espec_Medica
Dest_Alta
T_Episod_Origem
Proc_Principal
Hora_Intern
Idade_Intern
Diag_Inicial
GCD
LG_N_Intern_Anterior
Diag_Principal
Hora_Alta_Intern
DiaSemana_Intern
Mes_Intern
Trimestre_Intern
Escolaridade
Est_Civil
Sexo
The VEC line segments clearly confirmed that an episode of ambulatory stay
is related to a lower middle LOS (0.24 on the logarithmic transformation scale,
0.27 days on the normal scale) when compared to the regimen in internment (1.59
on the logarithmic transformation scale, 3.9 days on the normal scale).
Regarding the media of influence of the Internment Service attribute, a higher LOS
was observed in the Medical Department—Ward B with a value of 2.86 days (1.35 on
the logarithmic transformation scale), followed by the Surgical Department—Ward B
with a value of 2.82 days (1.34 on the logarithmic transformation scale), the Medical
Department—Wing A service with a value of 2.74 days (1.32 on the logarithmic
transformation scale), and finally the Surgical Department—Wing A service with a
value of 2.6 days (1.28 on the t scale logarithmic transformation).
From the analysis of the third most relevant attribute, the Medical Specialty, it was
found that internal medicine is associated with the highest LOS (1.61 corresponding
to 4 days), followed by Orthopedics (1.38 corresponding to 2.97 days), Plastic and
Reconstructive Surgery (1.37 corresponding to 2.94 days) and finally Urology (1.27
corresponding to 2.56 days).
In order to comply with SO2, confirming H2 and responding to RQ2, the results of
the best models obtained in previous studies were compared [15, 16]. It is important
to note that in the 2013 study, 18 attributes, 14 attributes were used in 2015 and 19
attributes in this research for los prediction (2018).
From Table 2, it was concluded that the attribute type of outpatient episode under
the ambulatory clinic was lower in the 2015 study (0.1 days). In the internment
regime presented the lowest value in the 2013 study (3.81 days), not representing a
very significant difference for the other studies.
456 N. M. P. Caetano and N. A. R. S. Loureiro
Regarding the attribute internment service presented in Table 3, there was a general
reduction in LOS in the 2018 study, compared to the other studies, totally confirming
the H2 presented.
From the analysis of the third most relevant attribute represented in Table 4, it was
found that the medical specialties of the last study present values significantly lower
than their counterparts in previous studies, concluding that the mean values of LOS
associated with the attributes Internment and Medical Specialty service decreased
compared to studies in 2013 and 2015.
Finally, in order to compare the average value of 3.9 days of internment obtained in
this investigation, in the international context, data obtained in the Eurostat statistical
report [27] were used, confirming that in Portugal (2015) the average LOS was
7.9 days, a significantly higher value than that extracted in this study (+4 days of
internment). In the studies for 2016, the Netherlands (4.5 days) and Turkey (4.2 days)
presented the lowest values, but slightly higher than that observed in this investigation
for the AFH.
5 Conclusion
With the increasing increase in data in clinical information systems, it became neces-
sary to explore various technologies and methodologies for analyzing this valuable
knowledge. DM techniques have been successfully used in various business areas,
however, their use in the health sector for predicting LOS in hospitals could become
one of the biggest challenges for hospital managers.
The present investigation aims to obtain an optimized predictive model of LOS
patients in the AFH, through the discovery of behaviors and patterns existing in the
internment process, based on DM techniques.
The results of the evaluations performed by the R2 metric identified the RF model
(0.735), the result of the fivefold validation method, as being superior to the RF
model (0.73), the result of the holdout validation method (run = 20). Both models
previously identified presented an R2 metric higher than the established objectives
(0.7), it can be affirmed that good models were generated. At this stage, the SVM
model (0.695), the result of the fivefold validation method, presented a result at the
limit of the initially established.
The analysis of the REC chart confirmed the RF model as the best predictive
model, compared to the SVM model, always presenting greater accuracy for any
tolerance value. The RF model with an absolute deviation of 0.4 (in the logarithmic
458 N. M. P. Caetano and N. A. R. S. Loureiro
transformation scale) correctly predicted 73.6% of the examples of the test set and
with an absolute deviation of 0.5 was obtained a rate of correct answers of 78.5%.
The RF model with an absolute deviation of 0.5 obtained a correct forecast of
78.5% of the test set examples, meaning that it gives a maximum error of 0.65 days
to the lower end of the scale (A = 0) and an approximate maximum error of 32 days
at the upper end of the scale (B = 4.4).
The attribute Type of Internment Episode presented importance of 31.9% in the
definition of the generated model, followed by the following attributes: Internment
Service with 8%, Medical Specialty with 7.5% and finally the Destination of Dis-
charge with 7.2%. On the other hand, it was also found that these four more significant
attributes related to the clinical situation of patients contribute more than 50% to the
explanatory capacity of the generated model.
An episode of ambulatory stay is related to a lower middle LOS (0.27 days)
when compared to the internment regime (3.9 days). At the level of the inpatient
service, a higher LA was observed in the Medical Department service—Ward B
with a value of 2.86 days, followed by the Surgical Department—Ward B with a
value of 2.82 days, the Medical Department—Ward A with a value of 2.74 days, and
finally the Department of Part Surgical—Ward A with the value of 2.6 days. Finally,
based on the analysis of the medical specialty, it was found that internal medicine has
the largest LOS with 4 days, followed by the specialty Orthopedics with 2.97 days,
of Plastic and Reconstructive Surgery with 2.94 and finally Urology with 2.56 days.
With regard to SO1, building a model for predicting the LOS, H1 has been con-
firmed, since a model was obtained that allows forecasts with a margin of error of less
than 30%. In response to RQ1, it was concluded that the best LOS prediction model
of patients in the AFH, based on DM techniques, in order to optimize hospital LOS,
is the RF model with a coefficient of determination of 0.735 and with the ability to
correctly predict 78.5% of cases.
Regarding SO2, evaluating the results obtained with previous identical studies, H2
was confirmed, and after the merger of military hospitals, AFH optimized hospital
LOS, implementing better management and planning of hospital discharges, which
allowed to increase the number of beds available for new admissions. In response to
RQ2, it was concluded that the processes implemented after the merger of military
hospitals allowed the decrease in the value of hospital LOS, according to the results
presented in this investigation when compared to previous studies.
One of the limitations that conditioned the progress of the investigation was the
implementation phase of CRISP-DM, proposing the incorporation of the models
obtained in the current clinical system of AFH.
The forecasting model obtained has contributed to knowledge, being an incentive
for this hospital institution to invest in improving the efficiency of their internal
processes and extracting useful information to support their decision-making, allied
with a series of compliance tests. With an accurate estimate of internment time, the
hospital can plan better management of available beds, efficient use of resources,
providing a higher average occupancy and lower waste of hospital resources [18].
This investigation provides several prospects for future work, and a similar study
can be applied in the forecast of time of occupation of the hospital operating room.
Business Intelligence: Use of Data Mining techniques … 459
In aeronautics, the study of models for predicting aircraft maintenance times may
be very relevant, allowing to optimize existing operational, human and material
resources.
References
1. Lee, T.-T., Liu, C.-Y., Kuo, Y.-H., Mills, M.E., Fong, J.-G., Hung, C.: Application of data mining
to the identification of critical factors in patient falls using a web-based reporting system. Int.
J. Med. Inf. 80(2), 141–150 (2011)
2. Cruz, A.J.: Data Mining via Redes Neuronais Artificiais e Máquinas de Vectores de Suporte.
(Dissertação de Mestrado). Universidade do Minho – Escola de Engenharia, Guimarães,
Portugal (2007)
3. Han, J., Kamber, M.: Data Mining—Concepts and Techniques, 2nd edn. Elsevier, Amsterdam
(2006)
4. Feelders, A., Daniels, H., Holsheimer, M.: Methodological and practical aspects of data mining.
Inf. Manag. 37(5), 271–281 (2000)
5. Suthummanon, S., Omachonu, V.K.: DRG-based cost minimization models: applications in a
hospital environment. Health Care Manag. Sci. 3, 197–205 (2004)
6. Marques, J.C.: Causas do Prolongamento do Internamento: O caso de um serviço de Medicina
Interna. (Dissertação de Mestrado). Universidade da Beira Interior, Covilhã, Portugal (2010)
7. Domingos, M.S.: Como transformar o Hospital das Forças Armadas num Hospital de excelên-
cia. (Trabalho de Investigação Individual do CPOG). IESM - Instituto de Estudos Superiores
Militares, Lisboa, Portugal (2015)
8. Merom, D., Shohat, T., Harari, O., Meir, G., Green, M.S.: Factors associated with inappropriate
internment days in internal medicine wards in Israel: a cross-national survey. Int J Qual. Health
Care 10(2), 155–162 (1998)
9. Abelha, F., Maia, P., Landeiro, N., Neves, A., Barros, H.: Determinants of outcome in patients
admitted to a surgical intensive care unit. Arq. Med. 21(5/6), 135–143 (2007)
10. Oliveira, A.B., Dias, O.M., Mello, M.M., Araújo, S., Dragosavac, D., Nucci, A., et al.: Fatores
associados à maior mortalidade e tempo de internação prolongado em uma unidade de terapia
intensiva de adultos. Rev. Bras. Terapia Intensiva 22(3), 250–256 (2010)
11. Kalra, A.D., Fisher, R.S., Axelrod, P.: Decreased length of stay and cumulative hospitalized
days despite increased patient admissions and readmissions in an area of Urban Poverty. J.
Gen. Int. Med. 25(9), 930–935 (2010)
12. Pena, F.M., Soares, J.D., Peixoto, R.S., Júnior, H.R., Paiva, B.T., Moraes, F.V., et al.: Análise
de um modelo de risco pré-operatório específico para cirurgia valvar e a relação com o tempo
de internação em unidade de terapia intensiva. Rev. bras. ter. intensiva 22(4), 339–345 (2010)
13. Freitas, A., Silva-Costa, T., Lopes, F., Garcia-Lema, I., Teixeira-Pinto, A., Bradzil, P., et al.:
Factors influencing hospital high length of stay outliers. BMC Health Ser. Res. 265(12), 1–10
(2012)
14. Rufino, G.P., Gurgel, M.G., Pontes, T.D., Freire, E.: Avaliação de fatores determinantes do
tempo de internação em clínica médica. Rev. Bras. Clin. Med. 10(4), 291–297 (2012)
15. Caetano, N.M.P.: Previsão de tempos de internamento de pacientes via técnicas de Data Mining.
(Dissertação de Mestrado). ISCTE – Instituto Universitário de Lisboa, Lisboa, Portugal (2013)
16. Caetano, N., Cortez, P., Laureano, R.M.S.: Using data mining for prediction of hospital length
of stay: an application of the CRISP-DM methodology. In: Cordeiro, J., Hammoudi, S., Maci-
aszek, L., Camp, O., Filipe, J. (ed.) Enterprise Information Systems. ICEIS 2014. Lecture Notes
in Business Information Processing, vol. 227. Springer, Berlin (2015)
17. Freitas, J.A.: Uso de Técnicas de Data Mining para Análise de Bases de Dados Hospita-
lares com Finalidades de Gestão. (Dissertação de doutoramento). Faculdade de Economia da
Universidade do Porto, Porto, Portugal (2006)
460 N. M. P. Caetano and N. A. R. S. Loureiro
18. Azari, A., Janeja, V.P., Mohseni, A.: Predicting hospital length of stay (PHLOS): a multi-
tiered data mining approach. In: 2012 IEEE 12th International Conference on Data Mining
Workshops, pp. 17–24 (2012)
19. Silva, F.J.: Aplicação de técnicas de Data Mining na avaliação da qualidade da carne de cordeiro.
(Tese de Mestrado). Universidade do Minho – Escola de Engenharia, Guimarães, Portugal
(2010)
20. Piatetsky, G.: CRISP-DM, still the top methodology for analytics, data mining, or data science
projects. (2014)
21. Chapman, P., Clinton, J., Kerber, R., Khabaza, T., Reinartz, T., Shearer, C., et al.: CRISP-DM
1.0—step-by-step data mining guide (2000)
22. Brown, M.L., Kros, J.F.: Data mining and the impact of missing data. Ind. Manag. Data Syst.
103(8), 611–621 (2003)
23. Michalewicz, Z., Schmidt, M., Michalewicz, M., Chiriac, C.: Adaptive Business Intelligence,
1st edn. Springer, New York (2006)
24. Moro, S.M.: Optimização da Gestão de Contactos via Técnicas de Business Intelligence: apli-
cação na banca. (Dissertação de Mestrado). ISCTE – Instituto Universitário de Lisboa, Lisboa,
Portugal (2011)
25. Cortez, P., Embrechts, M.: Using sensitivity analysis and visualization techniques to open black
box data mining models. Inf. Sci. 225, 1–17 (2013)
26. Cortez, P.: Data mining with neural networks and support vector machines using the R/rminer
tool. In: Perner, P. (ed.) Advances in Data Mining—Applications and Theoretical Aspects,
Proceedings of the 10th Industrial Conference on Data Mining (ICDM 2010), LNAI 6171.
Springer, Berlin, pp. 572–583 (2010)
27. Eurostat Hospital discharges and length of stay statistics. Consultado em 10 de jan.
2019. Disponível em https://ec.europa.eu/eurostat/statistics-explained/index.php/Hospital_
discharges_and_length_of_stay_statistics (2018)
Mobile Military Reactors
1 Introduction
In a sustainable world, efficiency plays an important role. However, the recent explo-
sion of a nuclear-powered cruise missile [1] is a reminder that a performance advan-
tage is more important to nations seeking readiness against threats to their national
security. Nuclear submarines and surface ships have been fielded for decades because
nuclear power enables continuous high-power operation without the need for contin-
uous refueling. Early development of these systems contributed greatly to the design
and development of commercial nuclear power reactors that, because of economies of
scale, evolved to become the highly efficient gigawatt-scale plants that are common
today.
From the oil embargo that triggered Japan’s surprise attack on Pearl Harbor to
Iraq’s invasion of Kuwait for its oil, there is an abundance of anecdotal evidence that
energy is often a reason that nations go to war. Similarly, nations having better access
to energy resources and energy technology are better able to defend against attack.
Think of England using oil while it fought a Germany that continued to rely on coal
during WWI. The Defense Science Board observed recently that the “USA military
could become the beneficiaries of reliable, abundant, and continuous energy through
the deployment of nuclear energy power systems” [2]. Energy has been called the
dominant element of the national instruments of power [3]. However, there is a dearth
of quantitative analysis on what this means.
The aim of the present study is to apply analytics to historic war and energy
data to help quantify the benefits mobile reactors might afford the military in terms
of fewer combat and safety-related deaths, increased access to military spending,
and improved likelihood of victory. Favorable results could be used to advocate for
the military acquiring and operating small reactors, which could in-turn help with
public and industry acceptance of small reactors being used for civil commercial
power production. The approach of converting military technology to civilian use has
been used repeatedly with much success, as exemplified by first-generation civilian
reactors and in recent years by technologies such as GPS and the Internet.
2 War-energy Data
The Correlates of War (COW) Project published its first data set in 1963, improving
and adding to these datasets over the decades since. Two datasets were used in this
study: COW War Data, 1816–2007 (v4.0) [4] and National Material Capabilities
(v5.0) [5], 1816–2012.
The present study focuses on strategic war, which requires a level of resources
achievable only by states. Therefore, only COW’s interstate war dataset was used
for war statistics. From 1816 to 2007, there are 91 named interstate wars. Each of
the 91 wars is comprised of at least two states and in some cases (e.g., WWII) many
states. There is a total of 337 rows comprising the data indicating each state’s start
and end dates, number of combat deaths, attack/defend status (i.e., initiator), and
outcome (i.e., win, lose, or others such as draw or stalemate). Applying a principle
of zero-sum game theory, we treat wars as unilateral decisions [6] where each of the
337 rows of the interstate dataset represents an individual war statistic.
The National Military Capabilities (NMC) dataset provides estimates of popula-
tion, military spending, military personnel, energy consumption, and other variables
Mobile Military Reactors 463
for each year of a country in existence at one time or another from 1816 through 2012.
Our focus is on energy consumption, which COW reports for all energy resources in
units of tonnes equivalent coal (1 t equivalent coal = 3.41 × 1011 J). Combat deaths
and war start and end dates from the COW War Data are combined manually with
the data from the NMC in order to identify correlations.
COW data reveals that the relationship between war and energy is intensifying, as
measured by military spending, combat deaths, and military victory.
Figure 1 shows the logarithm of annual per capita military expenditures as a
function of the logarithm of per capita energy consumption (tonnes coal equivalent)
for each year for each nation. Data is colored by its apparent trend. Gray data represent
nations having low per capita military spending for a particular year. Gray points are
all those where the log of military spending is below zero. Red data represent higher
per capita military spending but low per capita energy consumption for that year.
Points are red if the log of per capita energy is less than −1 and the log of military
spending is greater than or equal to zero. Blue data represents per capita military
Fig. 1 Annual per capita military expenditures as a function of per capita energy consumption
(tonnes coal equivalent) for each year for each nation
464 V. H. Standley et al.
Table 1 Military and energy statistics for interstate wars between 1816 and 2007
Strategy
Initiate Non-Initiate
Win/Lose Parameter
109 wars (32%) 228 wars (68%)
Number of Wars 61 (18%) 94 (28%)
Win
155 War Dead-Energy Correlation - 0.46 -0.21
(46%)
Average Log Per capita Energy -0.56 -0.33
Number of Wars 27 (8%) 92 (27%)
Lose
119 War Dead-Energy Correlation -0.22 -0.26
(35%)
Average Log Per capita Energy -0.68 -0.86
Number of Wars 21 (6%) 42 (12%)
Other
63 War Dead-Energy Correlation Negligible Negligible
(19%)
Average Log Per capita Energy -0.02 -0.41
The risk of war, which is the product of the likelihood and severity of war, is highly
statistical in nature. These statistics indicate that the risk of war is high. Rising
per capita energy consumption in large nations, also evident in COW data, warns
of fourfold increase in fossil fuel consumption by the most populous nations in just
30 years. Fierce contention over the availability of these resources and their associated
pollution will add to the already high statistical likelihood of war. Increasing per
capita energy consumption without relying on fossil fuels can reduce the likelihood
and severity of war.
The probability of war occurring, and the severity of the war are distinct, the
latter being conditional on the former. Analysis of COW data indicates that the
time between consecutive named wars is distributed according to a memoryless
exponential distribution with parameter λ = 0.5/year and the overall severity of war,
measured in combat deaths, follows a log-gamma distribution with parameters α = 9
and β = 3.9 [7]. The annual probability of war follows the Poisson distribution, also
with parameter λ = 0.5/year, because of the mathematical relationship between the
exponential and Poisson distributions. Statistics comprising log-gamma distributions
are the sum of α samples from a memoryless log-exponential distribution having
parameter β. Although the power law has been used for decades in this context, it
is invalid as a probability distribution for war because its mean and associated risk
are divergent. The annual risk of a given number of combat deaths s is the annual
probability of war multiplied by s and the severity probability evaluated at s. The
upshot is that the risk of war is high, including for extremely high numbers of combat
deaths.
Each year y of logarithmic (base 10) per capita energy consumption, log(E(y)),
through 2050, is estimated using the following form by adjusting parameters until
the curve matches COW data with high R2 :
log(E(y)) = log(a) 1 − 10−(y−y0 )/λ + log(E 0 ) (1)
Historic data and fit lines for a given nation each start at the point (y0 , log(E 0 )),
where λ is the rate parameter measured in years, and a is an energy scaling factor.
Eventually, log(E(y)) converges to log(E ∞ ) = a+log(E 0 ). Figure 2 reports data and
fits of the logarithm of annual per capita consumption through 2050 for the three most
populous nations: China, India, and the USA, France is included to highlight how
military conflicts are evident in per capita energy data. The USA consumption seems
to be leveling off just above log(E ∞ ) = 1.15, or E ∞ = 14 tonnes coal equivalent
per person. China’s historic data indicates it will achieve this consumption by 2050
and not long after level off at about 100 t equivalent per capita, or seven times that
of USA citizens. People of India will consume the equivalent of about a third of a
tonne of coal per person by 2050, but its energy demands and population are still
rapidly increasing and the fit suggests that it will eventually converge on a per capita
consumption of about 56, or four times that of the USA.
466 V. H. Standley et al.
1.5
0.5 WWII
0 WWI
The population growth of each nation was estimated based on COW population
data and the result multiplied by the predicted per capita energy consumption. Energy
consumption by China and India approximately quadruple by 2050 compared to 2020
figures. However, because China’s per capita energy needs will be three times that of
India in 2050, it is China that creates the greatest challenge in terms of its demand on
fossil fuel resources and pollution output. China is unlikely to reduce its use of fossil
fuel resources significantly in the foreseeable future. The USA and other countries
can, however, reduce their reliance on fossil fuels by choosing different sources of
energy that help avoid contention with China, reducing the probability of violent
conflict.
An important measure of the severity of war is the number of combat dead.
Statistically, increasing per capita energy consumption should lead to fewer combat
deaths per correlations identified in Table 1 for both offensive and defensive nations.
The slope of the fit to the Initiator-Win data is −0.6, which means combat deaths are
reduced by about a factor of four for each ten-fold increase in energy consumption.
For example, the USA could statistically expect one-fourth the number of casualties
in a military conflict if its citizens were consuming an average of approximately 140 t
of coal per year, slightly higher than what we can expect China to be consuming after
2050.
National and international calamities are evident in the fluctuations of energy
consumption in Fig. 2. The peaks and valleys seen in the USA curve are largely due
to shifts in energy technology and market forces. The effects of war are difficult to
discern. However, the effects of war on France’s curve are much more pronounced.
Disruption to its per capita energy consumption by WWI and WWII are clear. The
Korean War and India–Pakistan War are even more prominent on curves for China
Mobile Military Reactors 467
and India. With decreasing per capita energy consumption, the effects of war are con-
sistently more marked. Higher per capita energy consumption before a war mitigates
the consequences of war.
Greater per capita energy consumption increases the likelihood of military victory
is correlated with fewer combat deaths, and higher military spending. Increasing
demand for fossil fuels by China and India will create contention for resources
that are likely to increase the possibility of war over the already large statistical
likelihood, which may be avoided by decreasing reliance on fossil fuels. Therefore,
the overall approach should be to increase the use of alternative sources of energy.
Nuclear energy is the only practical choice. Renewables such as solar or wind cannot
replace fossil fuels while at the same time enabling an increase in per capita energy
consumption.
The expeditionary nature of the military places heavy emphasis on mobility, even
with nuclear power systems. This is reflected by the fact that the USA Army oper-
ated five mobile/portable nuclear reactors from 1962 to 1977 ranging from one to
ten megawatts electric output. Except for one, all these earlier designs used highly
enriched uranium to reduce weight for mobility. To reduce proliferation concerns
and enable timely licensing, all new small reactor designs in this power range rely
on low-enriched uranium. The most recent designs are HolosGen’s Quad [8], Los
Alamos’ MegaPower [9], and Westinghouse’s eVinci [10]. MegaPower and eVinci
rely on heat pipe cooling where the Holos-Quad uses a Helium-cooled Brayton
cycle. The designs are mature and could be fielded within just a few years. The USA
Department of Defense (DOD) recently broadcasted a Request for Information (RFI)
seeking “innovative technologies and approaches” [11] for prototyping reactors. The
RFI requires that the reactors can be installed in less than 72 h, have an inherently safe
design, and create no net increase in risk to public safety by either direct radiation
from operation or contamination with breach of the primary core.
Energy systems with reserve capacity existing near and under control of the end-
user are the most robust and resilient. Mobile reactors can provide sustained higher
output power nearer to end-users for years without refueling. Mobile reactors need not
rely continuously on vulnerable fossil fuel supply infrastructure. Nuclear energy is
also not subject to fluctuating costs from changing demand or lost fossil fuel reserves
that are especially likely during a conflict. A drone attack on a Saudi Arabian oil field
in September 2019, “not only knocked out over half of the country’s production, it
also removed almost all the spare capacity available to compensate for any major
disruption in oil supplies worldwide” [12].
Whether liquid, gas, or solid, fossil fuels must be continuously processed and
pumped through pipelines or transported by rail, roadway, or sea, or are holdup in
large refineries. Pipelines transporting fossil fuels in an energy network are extremely
fragile [13]. Relative to the energy being consumed, only small amounts of fuel are
468 V. H. Standley et al.
kept in reserve near customers. Reserves largely exist upstream where the resources
are extracted. If a pipeline is damaged, the small reserves near customers are quickly
depleted and the supply chain stops until the supply infrastructure is rehabilitated.
This is not the case for nuclear power. Energy infrastructure is also increasingly
vulnerable to cyber-attack due to its growing reliance on Internet-based Industrial
Control Systems (ICS), to include Internet-of-Things (IOT) controllers used in homes
and businesses to increase energy efficiency. So serious are these threats that in
2017 the USA Congress created a new organization in the Department of Energy to
confront them [14].
The USA Army and Defense Science Board agreed that small reactors operated
by military personnel in or near a combat zone would not increase these risks [3,
15]. Nuclear power also may offer a unique advantage in repelling state and non-
state threats. “The availability of large (megawatt) amounts of power at a site could
alter this situation to the DOD’s advantage. With the development of directed energy
weapons, USA forces have the ability to use high-power lasers for defensive purposes
against long-range missile and rocket fires” [16]. Directed energy weapons have been
studied and successfully tested for decades [17]. They are not science fiction. Had
they been in place, they might have thwarted or mitigated the attack on the Saudi
refinery.
The World Health Organization estimates that 4.2 million people die each year
from exposure to air pollution [18], thousands of times greater than deaths caused by
the one-time Chernobyl accident [19]. Nuclear reactors have the smallest greenhouse
gas footprint of nearly all energy technologies, including wind and solar [20]. The
environmental impact of both the Chernobyl and Fukushima nuclear accidents is
small compared to the billions of tonnes of greenhouse gasses that would have been
released had the equivalent energy been produced by plants burning fossil fuels.
Mobile nuclear reactors have an extraordinary record of safety and low-waste
output. “The Navy has deployed more than 500 nuclear reactors since 1948 and never
experienced a reactor accident” [15]. Modern mobile reactors are being designed so
they require no active control during shutdown, making them even safer. The fact
that mobile reactors are much smaller than typical commercial reactors means the
potential risks are also much smaller. Conversely, 1 in 24 fuel resupply convoys in
Afghanistan resulted in a casualty [21].
Higher per capita energy increases life expectancy, lowers infant mortality, and
extends reproductive delay [22]. These proven societal benefits, however, matter
most where per capita energy is below 0.5 (−0.3 on the log scale) where the dashed
red line meets the dashed blue line in Fig. 1. As of 2012, 36 nations fall into this
category according to COW project data, several of which have and continue to be of
strategic importance to the USA Power from mobile reactors operating inside states
with low per capita energy, on a the USA base, operated by USA military, could be
shared with the nearby populations, improving the health and safety of its citizens,
while not requiring as much electrical infrastructure as large-scale power plants.
Efficiencies realized by larger designs have succumbed to the inefficiencies asso-
ciated with custom construction, site licensing, and capital financing. Smaller but
standardized reactor designs enable the application of statistical quality control and
Mobile Military Reactors 469
10
0.1
0.01 USA
China
0.001
1800 1850 1900 1950 2000
Year
Fig. 3 Energy intensity for the USA and China from 1816 to 2007
more systematic operator training. Energy intensity, in units of energy per dollar
Gross Domestic Product (GDP), is an inverse measure of the energy efficiency of
an economy. The COW NMC dataset does not provide GDP data so instead energy
in tonnes coal equivalent per dollar of military expenditure is plotted in Fig. 3. This
intensity curve mimics that of a standard energy intensity curve for the USA except
that the peak is shifted a few decades and its rise and fall are more dramatic. China’s
intensity begins to rise again in 1967, helping to explain why its per capita energy is
now quickly rising. The data also suggests that most USA energy technology ineffi-
ciencies were eliminated during the first half of the twentieth century and continue
to improve today. Though efficient, optimized energy networks are susceptible to
cascading failure and lack resilience [13]. Resilience and efficiency are both gained
by transitioning mobile military technology to civil use whereafter it can flourish
in a competitive market environment as happened with GPS and the Internet. An
approach to begin this cycle of development for mobile nuclear reactors is via the
National Defense Authorization Act Section 804, Middle Tier Acquisition for Rapid
Prototyping and Rapid Fielding [15].
6 Conclusion
sources of energy. Renewables such as solar or wind cannot replace fossil fuels while
at the same time enabling an increase in per capita energy consumption. Nuclear
energy can. Fielding mobile reactors could provide enhanced defense capability
and help pave the way for small commercial reactors to improve energy security
and lessen pollution worldwide. Nuclear reactors have the smallest greenhouse gas
footprint of nearly all energy technologies, including wind and solar, and new reactor
designs are safer, resistant to proliferation, and easier to finance. Oil and natural
gas must be continuously transported in large quantities, making them vulnerable
to attack and disruption. Conversely, reactors can operate for many years without
refueling. Mobile military reactors can play a vital role in national security.
References
1. Cole, B.: Chemical elements are ‘proof’ nuclear reactor was involved in Russian explosion,
says Norwegian government expert. Newsweek, 27 Aug (2019)
2. Defense Science Board.: Task Force on Energy for Forward/Remote Operating Bases Final
Report. USA Department of Defense, Washington DC (2016)
3. Benitez, M., Keely, P., Nexon, M.: Energy: the dominant element of the national instruments of
power. Over The Horizon, 18 May 2017. https://othjournal.com/2017/05/18/energy-national-
power/ (2017)
4. Sarkees, M.R., Wayman, F.: Resort to War: 1816–2007. CQ Press, Washington, DC (2010)
5. Singer, D.J., Bremer, S., Stuckey, J.: Capability distribution, uncertainty, and major power war,
1820–1965. In: Russett, B. (ed.) Peace, War, and Numbers, Beverly Hills, Sage, pp. 19–48
(1972)
6. Schelling, T.C.: The Strategy of Conflict, 1st edn. Harvard College, Cambridge (1960)
7. Standley, V.H., Nuño, F.G., Sharpe, J.M.: Minimization of attack risk using a Bayesian detection
criteria. In: Proceedings of the 4th International Conference on Complexity, Future Information
Systems and Risk, Heraklion, Greece (2019)
8. Stauff, N., Lee, C., Shriwise, P., Miao, Y., Vegendla, P., Fei, T.: Neutronic Design and Analysis
of the Holos-Quad Concept. Argonne National Laboratory, Argonne, IL (2019)
9. Los Alamos.: MegaPower. 1663, 3 (2019)
10. Arafat, Y., Van Wyk, Y.: eVinci Micro Reactor. Nucl. Plant J. 34–37 (2019)
11. Department of Defense.: RFI Small Mobile Nuclear Reactor. 18 Jan 2019. https://www.fbo.gov/
index?s=opportunity&mode=form&tab=core&id=5f70e466e904a1b12748d6e04fcbaad4&_
cview=0. (2019)
12. Zhdannikov, D., Bousso, R., Lawler, A.: Explainer: attack on saudi leaves world without
spare oil capacity. Reuters. https://www.reuters.com/article/us-oil-opec-capacity-explainer/
explainer-attack-on-saudi-leaves-world-without-spare-oil-capacity-idUSKBN1W00V9.
(2019)
13. Lewis, T.G.: Critical Infrastructure Protection in Homeland Security—Defending a Networked
Nation, Hobeken. Wiley, Hoboken, NJ (2015)
14. House of Representatives, 115th Congress, 2nd Session. Report 115–793: Energy Emergency
Leadership Act. USA Congress, Washington, DC (2018)
15. Andres, R.B., Breetz, H.L.: Small nuclear reactors for military instilations: capabilities, costs,
and technological implications. Strateg. Forum 262, 1–12 (2011)
16. Vitali, J.A., Lamothe, J.G., Toomey, C.J., Peoples, V.O., Mccabe, K.A.: Study on the Use of
Mobile Nuclear Power Plants for Ground Operations. Department of Defense, Washington,
DC (2018)
Mobile Military Reactors 471
17. Standley, V.H.: Earth’s atmosphere and orbit both need nuclear power. Space News, June 9th,
pp. 28–29 (2019)
18. World Health Organization.: 9 out of 10 people worldwide breathe polluted air, but more coun-
tries are taking action. 2 May 2018. https://www.who.int/news-room/detail/02-05-2018-9-out-
of-10-people-worldwide-breathe-polluted-air-but-more-countries-are-taking-action. (2018)
19. Sox, H.C., Higgins, M.C., Owens, D.K.: Medical Decision Making, 2nd edn. Wiley-Blackwell,
Chichester, WS, UK (2013)
20. Weisser, D.: A guide to life-cycle greenhouse gas (GHG) emissions from electric supply
technologies. Energy 32(9), 1543–1790 (2007)
21. Institute, Army Environmental Policy: Sustain the Mission Project: Casualty Factors for Fuel
and Water Resupply Convoys. Army Environmental Policy Institute, Arlington, Virginia (2009)
22. Burger, O., DeLong, J.P., Hamilton, M.J.: Industrial Energy Use and the Human life History.
National Library of Medicine, Bethesda, MD, USA (2011)
The Competitive Advantage of Additive
Manufacturing in the Naval Sector
T. Guarda (B)
Universidad de las Fuerzas Armadas, Salinas, Ecuador
e-mail: [email protected]
T. Guarda · M. F. Augusto
CIST—Centro de Investigacion en Sistemas y Telecomunicaciones, Universidad Estatal Peninsula
de Santa Elena, La Libertad, Ecuador
e-mail: [email protected]
Universidad Estatal Peninsula de Santa Elena, La Libertad, Ecuador
T. Guarda
Algoritmi Centre, Minho University, Guimarães, Portugal
T. Guarda · M. F. Augusto
BiTrum Research Group, León, Spain
© The Editor(s) (if applicable) and The Author(s), under exclusive license 473
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_41
474 T. Guarda and M. F. Augusto
1 Introduction
The restrictions imposed on the Navy due to the financial crisis, which led to a
decrease in available resources (material, financial, and human), created some obsta-
cles that reduced the efficiency and effectiveness of armed forces organizations, as
is the case with the Navy, which is not unaware of this situation.
The Navy, for the fulfillment of the missions that are legally its responsibility,
must have all the necessary means ready that due to its high value and specificity, it
is often faced with the difficulty in maintaining its operationality.
Thus, it is in this context that the additive manufacture (AM) emerges, which,
although not recent, is a revolutionary technology in the way that products can be
produced, building the pieces in an additive way, layer by layer, through the use of
a 3D printer [2, 14].
The use of AM is a productive process that allows the reduction of manufacturing
times, the reduction of costs in the production of parts that already exist, or that do
not exist in the market, being a competitive advantage for the Navy.
In order to face some complications inherent to the process of maintenance of the
means, the possible introduction of AM in the supply chains may be an innovative
and sustainable aspect for the Navy.
This work is organized into five sections: The second section presents the back-
ground of additive manufacturing; third section describes AM process steps; the
fourth section analyzes the use of AM in the naval sector; finally, in the last section,
conclusions are presented.
2 Background
and the first low-cost desktop 3D printers were born from the RepRap project. What
previously cost $200,000 was suddenly available for less than $2000 [9, 10].
Between 2015 and 2017, adoption of 3D printing continues to grow: More than 1
million desktop 3D printers sold globally between 2015 and 2017, and sales of indus-
trial metal printers nearly doubled in 2017 compared to the previous year [2]. Deloitte
Global predicts that sales related to 3D printing by public and private companies will
top $2.7 billion in 2019 and surpass $3 billion in 2020 [14].
3 AM Processes
Additive production and traditional production are not only differentiated by their
production processes, but also in aspects of management of organizations such as
response times, and cost reduction.
Additive manufacturing or 3D printing allows create real objects from digital mod-
els, being a form of additive manufacturing technology, where a three-dimensional
model is created by successive layers of material.
The fundamental characteristics of additive manufacturing are the reduction in
the number of steps and processes in the manufacture of an object, the material
economy, and the unprecedented possibility of combining. By way of example, for the
production of a single piece of complex geometry by conventional means, it may be
necessary to employ a variety of machines, specific tools, and various manufacturing
and finishing processes to the finished product, whereas an additive manufacturing
machine can produce the piece in one step or significantly fewer steps. Since the
piece is produced by layering material layer by layer, there would be no waste of
materials.
Additive manufacturing requires three dimensions: the digital model, materials,
and the AM system (Fig. 1). The digital 3D model includes the .stl file and the
file cut into layers. This is the most used file format for 3D printing. The set of
letters STL initially appears as the result of using three of the letters of the word
stereolithography, having been given different meanings over the years.
In addition to 3D printing, the .stl format is also used by software for structural
analysis of finite elements, the so-called CAE software; this is because both for 3D
printing and in finite element analysis, what is done is to break up a 3D file into
infinitely smaller parts, the printing slices; the construction of the triangular mesh
that produces the .stl model is perfect. The process of creating the .stl file consists
of converting its outer shell into an infinite number of triangles in order to allow the
printing of the file.
Although there are more than 30 3D printing formats, the most used 3D printing
file formats are .slt, followed by .obj, which allows you to store color and texture
profiles. The great advantage of .stl is that it is a universal file format that can be read
by all 3D printers.
476 T. Guarda and M. F. Augusto
The .stl file encodes the object’s surface in geometric shapes, especially triangles,
due to the fact that it is the closest geometric figure to a vector. The triangle has
fundamental properties like intensity, direction, and sense for 3D printing (Fig. 2).
The materials can be powdered metals, plastics, plaster, cement, among others,
which are the raw material to be used by the printer.
The types of filaments for 3D printing are developing and advancing along with the
advancement of 3D printing technology. The different types of filaments have specific
characteristics. The choice of material (filament) and its specific configurations can
be the main factor for the success of the project. Each application requires a different
type of material or thermoplastic, since each has different strength and durability
characteristics for each type of use.
The Competitive Advantage of Additive Manufacturing … 477
Let us now specify some of these materials: [1] Filament ABS Premium +; [2]
PLA filament; [3] Flexible or Flex filament; [4] PETG XT filament; and [5] Filament
Tritan HT.
(1) The ABS filament is derived from petroleum and have high strength and dura-
bility. They are normally used for the production of parts that tend to suffer
high mechanical loads and for industrial prototyping because they can with-
stand temperatures up to 85 °C. It is also ideal when finishing after 3D printing
is required as the material has low surface hardness. It is capable of achieving
high speeds in printing, as it has high fluidity in its composition and can be
considered the most used polymer in 3D printers.
(2) PLA filament is a great material among the types of filaments available because
of one of its characteristics—it is biodegradable and of plant origin. It does not
require heating the table for printing, and it does not need high temperatures
for extrusion. Another important point that is aligned with the characteristic of
being biodegradable is the fact that it does not emit gases that are harmful to
health. It is indicated for printing large parts that do not need finishing after
printing.
(3) Flexible or Flex filament—unlike other types of filaments, this material aims to
bring malleability and flexibility to parts that require some movement in their
use. This type of filament is not recommended for use in all printers and requires
a certain amount of care in terms of materials and equipment. Because of this, it
is indicated for advanced users who already have certain knowledge in the area.
(4) The PETG XT Filament—it is considered a noble material for 3D printing
due to its characteristics of high mechanical, chemical, and high-temperature
resistance. In addition, it also offers high ease for 3D printing. PETG XT filament
can be used in open or closed printers, with a heated or unheated table and
does not present an odor during its processing. It is generally used for the
manufacture of covers or cases due to its resistance and durability and has an
excellent adhesion between the filament layers.
(5) Tritan HT Filament is the most resistant and hard filament that was designed for
use in 3D printers. It is a durable copolyester and is resistant to high temperatures
478 T. Guarda and M. F. Augusto
Lowest costs
Improved projects
Product customization
Sustainability
(100 °C), pressure and alkaline, acidic and water solutions. Another important
point is its use in advanced 3D printing projects, and it has excellent adhesion
between layers and resistance to traction. It is much more durable and flexible
than PLA and ABS and has a great adhesion to the table, which implies the use
of a table heated around 110 °C.
The correct choice among the different types of filaments available on the market
is extremely important to guarantee the quality of the printed object and the quality
of the final product. Strictly complying with the indications related to 3D printer, the
success of the application is guaranteed.
There are several benefits of adopting this technology, including the lowest costs;
improved projects; product customization; sustainability; and the creation of new
business models [17] (Fig. 3).
Since the process is limited to adding material, there is no need to remove material
for concluding, there will be no need to store the manufactured parts, there is only
the need to deliver the material, and the parts are produced on or near the site, thereby
reducing costs [7].
The process operates independently of complexity, facilitating light structures,
combining several parts in one, allowing the improvement of projects. All types of
shapes can be made with one machine.
As the increase in complexity does not imply an increase in cost, aesthetic
improvement does not directly require extra work, as well as a change in design,
thus facilitating product customization.
The reduction of weight and use of material generates less waste and energy
consumption, reinforcing the sustainability of the projects [4].
The need arises for the creation of new business models, due to rapid prototyping,
the reduction of operating costs, the cost of production per unit, regardless of the
number of units produced and the decrease in delivery time [3].
The Competitive Advantage of Additive Manufacturing … 479
The US Navy uses 3D printing essentially in four aspects, all of which are intercon-
nected: in reducing supply chain costs; the ability to deal with systems obsolescence;
increasing the capacity of maintenance, repair, and operations; and creating new,
more efficient parts. These aspects intrinsically depend on each other, all of which
simultaneously contribute to the fulfillment of the mission, and their maximization
allows the American Navy to increase its performance in terms of the fulfillment of
the missions, assigning new capabilities to its means [5, 12].
5 Conclusions
References
1. Bergsma, J.M., van der Zalm, M., Pruyn, J.F.: D-printing and the maritime construction sector.
In: Proceedings of the 10th Symposium on High-Performance Marine Vehicles, pp. 428–442
(2016)
2. Campbell, I., Diegel, O., Kowen, J., Wohlers, T.: Wohlers report 2018: 3D printing and additive
manufacturing state of the industry: annual worldwide progress report. Wohlers Associates
(2018)
3. Chua, C.K., Leong, K.F.: 3D Printing and Additive Manufacturing: Principles and Applica-
tions (with Companion Media Pack) of Rapid Prototyping Fourth Edition. World Scientific
Publishing Company (2014)
The Competitive Advantage of Additive Manufacturing … 481
4. Despeisse, M., Ford, S.: The role of additive manufacturing in improving resource efficiency
and sustainability. In: IFIP International Conference on Advances in Production Management
Systems, pp. 129–136. Springer, Cham (2015)
5. Garcia Jr., G., Edenfield, B.L., Yoshida, K.: Establishing an Additive Manufacturing (Am)
Navy Enlisted Classification for the Machinery Repairman to enable efficient use of Am and
Mass Adoption of the Technology. Naval Postgraduate School Monterey United States (2019)
6. Georgiev, P.: 3D Printing and Naval Architecture: A Literature Review. Technical University
of Varna (2016)
7. Huang, S.H., Liu, P., Mokasdar, A., Hou, L.: Additive manufacturing and its societal impact:
a literature review. Int. J. Adv. Manuf. Technol. 67(5–8), 1191–1203 (2013)
8. Hull, C.W.: United States Patent No. 4,929,402 (1990)
9. Hull, C.W.: The birth of 3D printing. Res. Technol. Manag. 58(6), 25–30 (2015)
10. Jean-Claude, A.A.: Patent No. 2567668 (1984)
11. Sasson, A., Johnson, J.C.: The 3D printing order: variability, supercenters and supply chain
reconfigurations. Int. J. Phys. Distrib. Logistics Manag. 82–94
12. Scheck, C.E., Wolk, J.N., Frazier, W.E., Mahoney, B.T., Morris, K., Kestler, R., Bagchi, A.:
Naval additive manufacturing: improving rapid response to the warfighter. Naval Eng. J. 128(1),
71–75 (2016)
13. Singh, R., Chhabra, M.: Three dimensional printing. In Reference Module in Materials Science
and Materials Engineering. Elsevier (2017)
14. Stewart, D.: 3D printing growth accelerates again: TMT Predictions 2019. Delloite (2018)
15. UPS: 3D Printing The Next Revolution in Industrial Manufacturing. (UPS & Consumer
Technology Association) (2016)
16. UPS: 3D Print Efficiency through Innovation. (UPS & Consumer Technology Association).
Retrieved 2020 from https://www.ups.com/us/en/services/high-tech/3d-print.page (2019)
17. Wu, P., Wang, J., Wang, X.: A critical review of the use of 3-D printing in the construction
industry. Autom. Cons. 68, 21–31 (2016)
Strategy, Geopolitics and Oceanopolitics
Ocean Policy of the UNCLOS in Ecuador
Based on New Geodynamic
and Geochronological Evidences
Abstract All countries adjacent to the sea or ocean have the opportunity to extent
their national territory toward their own islands by obtaining scientific results within
a time period of ten years while applying the conditions of the United Nations Con-
vention on the Law of the Sea (UNCLOS/CONVEMAR), which indicates a 12-mile
territorial sea and is complemented by an exclusive economic zone that reaches
200 miles. Such purpose of this given ocean policy has been also applied by the
Ecuadorian government in 2012. However, since without a scientific strategy focused
on solving this problem, the results obtained would be the same to those already
known in the academic world for decades. Therefore, we claimed to resolve such
information impasse, by applying zircon geochronology in volcanic rocks and sam-
ples of the Galapagos Islands. With the discovery of zircons and the corresponding
old ages proving continental origin, we have been able to demonstrate the belonging
of the Galapagos Islands and its derivative then the Carnegie Crest to the continental
(mainland) Ecuador and the South American Continent. This will allow to be able
to claim the corresponding extension of Ecuador’s continental platform toward its
Galapagos Islands, triplicating the national territory extension.
© The Editor(s) (if applicable) and The Author(s), under exclusive license 485
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_42
486 T. Toulkeridis et al.
1 Introduction
Over the years, Ecuador’s ocean policy, especially on the delimitation of its territorial
sea and the use of its resources, has evolved. Ecuador has modified its international
maritime behavior many times, often influenced by the international doctrinal trend
of the time [1]. The Ecuadorian territorial sea has its legal basis in the Declaration
of Santiago of 1952, in which Chile, Peru and Ecuador proclaimed sovereignty up
to a distance of 200 miles. This occurred in addition to a joint international policy
conduct, which proclaimed to the world the defense of wealth of its coastal areas,
since many of its species were at risk of becoming extinct due to the indiscriminate
exploitation of the great powers followed by Japan and Russia [2]. Therefore, all
resources, including bio-aquatic, soil and subsoil resources, belong to the coastal
State up to a limit of 200 miles and must be protected and regulated in order to
obtain a greater advantage in the best use. With the Declaration of Santiago, the
three mile theory loses its validity and in turn generates a rejection of the great
maritime powers that oppose the position of the three countries.
Article 609 of the current Civil Code mentions: “The adjacent sea up to a dis-
tance of 200 nautical miles measured from the most salient points of the continental
coast, with Ecuadorian relationship and from the most extreme islands of the Colon
Archipelago, and from the points of the lowest tide, according to the baseline that will
be indicated by executive decree, is territorial sea and national domain.” This article
is in contradiction with Article 3 of United Nations Convention on the Law of the
Sea (UNCLOS), which indicates a 12-mile territorial sea and is complemented by an
exclusive economic zone that reaches 200 miles according to Article 57. Therefore,
it is necessary to review the current Ecuadorian legal regulations, to adapt it to what
is established by the UNCLOS [3].
The Ecuadorian territorial sea was constituted by two parts: a strip that extends
up to 200 miles, from the most protruding part along the continental coast and
a polygon that surrounds the Galapagos Islands, up to 200 miles off the coast of
the more extensive islands. The total area of the territorial sea was 1006.826 Km2 ,
of which 189.434 correspond to the continental territorial sea and 817.392 to the
insular territorial sea. The limits of the maritime territory included the seabed of
Ecuador, established through agreements with Colombia, Peru and Costa Rica [4].
According to Article 628 of the Civil Code, Ecuador maintained a 200-mile territorial
sea measured from the system of straight baselines published in the Official Registry
265 in June 13, 1971.
As one of the fundamental objectives of this research has been to demonstrate
the geodynamic continuation of the Ecuadorian continental shelf in the Galapagos
Archipelago. This intention is due to the fact that, as previously mentioned, Ecuador
needs evidence of the growth of its continental shelf in the Galapagos. This geological
continuation may be verified through the study of inherited zircons throughout the
trajectory of volcanism from the Galapagos to the mainland. Inherited, xenocristic
zircons are those that have an age of crystallization older than the age of the mother
rock. The problem of the inheritance of zircons is not yet solved and has not been
Ocean Policy of the UNCLOS in Ecuador Based on New … 487
seriously addressed despite its considerable implications for the evolution of the crust
and the geodynamics of the mantle. Therefore, trying to respond to this phenomenon
using rocks derived directly from the mantle as in the Galapagos archipelago and the
Carnegie Ridge is the objective of this current study.
The incorporation of the territorial sea into the heritage of the coastal States is of
unquestionable importance, since in addition to constituting a protection zone it
incorporates to the national goods an immense reserve of food products and mineral
resources necessary for future development. Therefore, it is necessary to develop a
long-term conservation strategy for maritime resources, by creating principles and
norms that benefit coastal countries. Furthermore, based on Article 76 of the law
of the sea, it involves considering geological arguments to extend the Galapagos
platform beyond 200 miles [5].
Ecuador became part of the Convention of the Sea since October 24, 2012, his-
torical adhesion that allows the Ecuadorian State to be part of the constitution of
the oceans, through which it obtains enormous benefits such as the international
recognition of the rights of sovereignty and jurisdiction over water, soil and subsoil
resources up to 200 miles [6]. The possibility of extending sovereignty rights over the
Ecuadorian submarine platform, beyond 200 miles, will be realized through techni-
cal and scientific studies in the Galapagos sector. For which, Senplades approved the
project “Delimitation of the Marine Spaces of Ecuador,” in accordance with the new
Convention of the Sea (UNCLOS) project led by the Inter-Institutional Committee
of the Sea and the Technical Secretariat of the Sea [6].
For Ecuador, accession to the Convention implies incorporating into a universal
legal regime, which guarantees the protection and effective exercise of their rights
of sovereignty and jurisdiction over said maritime spaces, as well as the natural
resources contained in the sea (Fig. 1). Once the UNCLOS will be approved, as
its under request, its maritime spaces may exceed 1,300,000 km2 , adding almost
300,000 km2 of additional continental shelf [7].
The UNCLOS recognizes the continental shelf adjacent to the continental territory
and the extended one of the Galapagos Islands. The approval allows full exercise of
control to regulate fishing in that area by foreign vessels that traditionally practice
high-risk work for several species of the rich Ecuadorian marine fauna [8]. It was
mentioned in the SENPLADES event of December 2013 that this project will be
executed from 2014 with scientific staff of several national and international research
institutions from friendly countries, as well as the support of the Division of Ocean
Affairs and Rights of the Sea of the United Nationals. It was stated that for the
study the Orion ship of the Navy of Ecuador and other foreign research platforms
will be used, studies of multi-beam bathymetry, geophysics and marine geology will
be used, which will allow to demonstrate that the platform extends, more than 200
miles will also determine the location of the foot of the continental slope and draw
488 T. Toulkeridis et al.
the outer limits, in accordance with Article 76 and the guidelines developed by the
United Nations Continental Platform Boundary Commission [6].
Two fifty million dollars have been allocated as a budget for ten years (2012–
2021) in order to try to verify the extension of the Galapagos Platform as well as
the continental shelf. Unfortunately, without a scientific strategy focused on solving
this problem, the results obtained will be the same as those already known in the
academic world for decades. Unfortunately, there will be no scientific news, nothing
new or relevant to Ecuador and its purpose to extent its boundaries. The intended
approaches will only improve aspects in a more detailed scale of that what is already
known:
• The Galapagos Platform will be defined as it is today and will remain as volcanic
origin of the Ocean due to its geotectonic origin as a hot spot.
• The continental shelf will not extend beyond what is known, that is to the limit of
the Ecuadorian Trench.
• The Carnegie Crest will continue to be part of the extension of the Galapagos hot
spot and therefore an extremely oceanic origin.
All this is already known in Ecuador as well as outside the country and therefore
nothing will change for Ecuador, and therefore, its territorial and oceanic limits will
not increase after the delivery of all data to the United Nations in the year 2021 or
2022. Therefore, a new insight is needed to be taken into consideration.
Ocean Policy of the UNCLOS in Ecuador Based on New … 489
The continental volcanoes as well as those of the volcanic islands (e.g., Galapagos)
result from the subduction and volcanism of a hot spot, respectively [9, 10]. In the
eastern Pacific Ocean, there are two different boundaries of divergent plates: the
East Pacific Rise and the Galapagos Spreading Center, in which new oceanic crust
is constantly being created [11]. In these areas, three characteristic oceanic crusts
originate, being the Pacific Plate, the Cocos Plate and the Nazca Plate, which drift
away from each other. At the same time that these plates move away from each other,
the Nazca plate converges to the east and collides, creating a subduction zone, with
the coast of the South American continent (Fig. 2). The South American continent
itself is composed of two different continental plates, being the Caribbean and the
South American, which do not move to or move away from each other. They touch
each other and move in opposite directions along the third type of plate boundaries.
This transcurrent fault or shear along the course, which extends from the Gulf of
Guayaquil to Venezuela, is known as the Guayaquil-Caracas mega-fault (Fig. 2) and
is responsible for several extremely destructive earthquakes along its extension [12,
13].
Fig. 2 Current geodynamic situation of Ecuador and its Galapagos Islands [14]
490 T. Toulkeridis et al.
Along the coast of Ecuador, there are several pieces of accreted microplates, or
terrains, that constitute remnants of the upper part of the old Galapagos Islands,
which formed an already extinct submarine volcanic chain called the Carnegie ridge
(Fig. 2). The current Galapagos Islands appear above the Nazca Plate that is 250 km
south of the west-east trending of the Galapagos Spreading Center and about 1000 km
west of the Continental (mainland) Ecuador. With an area of less than 45,000 km2 ,
the Galapagos Islands represent one of the most active volcanic regions in the world,
as a result, according to a variety of studies, of an apparent upper mantle plume
under the region, called hot spot, although there are other theories about it. The
mantle plume represents columns of molten rock that ascend about 2900 km from
the core–mantle boundary, in the depths of the Earth to the upper mantle, as a result
of an upward movement, which pushes up the lithosphere that covers it, thus creating
an abnormally superficial region around the islands called the Galapagos Platform,
which most likely represents a basalt flood. The same hot spot remains fixed in
relation to the lithospheric plate that moves above. When the hot spot crosses the
lithospheric plate, it provides magma to the newly formed volcanoes.
The magma delivery process in the Galapagos hot spot has existed for more
than 90 million years (Ma), and during this same period of time, the lithospheric
layer has moved thousands of kilometers, taking with it the volcanoes generated in
hot spots [15]. As these volcanoes are removed from their source of magma, they
become extinct. Two aseismic volcanic ridges, the one that moves to the northeast,
called Cocos Ridge, and the one that moves to the east called Carnegie Ridge, and the
submarine mountain ranges associated with the Cocos and Nazca plates, respectively,
agree with the theory of the hot spot of Galapagos.
These extinct volcanic underwater mountain ranges, the result of the magma
cooling/contracting reactions, sank slowly below the sea surface, due to the lack of
magma delivery, lithospheric movements and strong erosion processes. Therefore,
the age of the oldest volcanism of the islands increases toward the East, because
the Nazca plate moves in this direction, moving away from the hot spot that remains
fixed. Over time, these volcanic underwater mountain ranges and several microplates
are added to the South American continent [16].
However, based on a new theory of the origin of hot spots, it has been proposed
that a hot spot rises due to subducted oceanic crust may does not melt completely
at subduction zones. This so far at a first step nonmelted part turns into a loop and
sinks either at the Earth’s upper/lower mantle boundary or even to the lower mantle
outer core boundary at 2900 km depth and after a certain residence time becomes
in a way “recycled,” and because of this “recycling” process, it becomes lighter and
therefore less dense, which leads this material to rise up and form a hot spot (Fig. 3).
This theory called the “cemetery of the continents” has been the base of our
assumption that may extremely stable minerals like zircons, may have been involved
from the Ecuadorian continental area and may have survived the “recycling” process
toward the Galapagos Islands (Fig. 3). This recycling process may be explained in
eight steps: (1) An oceanic plate gets into subduction. (2) Not all oceanic plates are
used in formation of volcanoes or in re-melting in the upper mantle. The oceanic
plate sinks toward the outer core. (3) Once reached there, it remains at this heat
Ocean Policy of the UNCLOS in Ecuador Based on New … 491
Fig. 3 Theory of the origin of a hot spot named the “cemetery of the continents”
boundary for a long time. (4) A certain separation of heavy elements such as iron
starts to happen due to the fact that the sunken plate got cooked at the core–mantle
boundary. (5) The iron and other heavy elements got separated from the “dead” plate
and got accumulated at the core–mantle boundary. (6) The now lighter or less dense
upheated residual material of the previous dead plate starts uprising. (7) The uprise
forms a heat column, fixed to its roots. This hot spot is hotter than the environment it
crosses through. (8) Once reaching the surface while crossing in this case, an oceanic
plate is supplies new formed volcanoes with upcoming magma [17].
4 Methodology
The problem of zircon inheritances is easily solved in cases of magmatic rocks that
(a) were formed as a result of the partial melting of igneous and meta-sedimentary
rocks and/or (b) intruded an ancient basement (e.g., Mauritius, Indian Ocean; East
Java, Indonesia; Lachlan folded belt, SE of Australia) [18–20]. In these cases, radio-
genic and stable isotopes of the mother rock, along with inheritance data, indicate that
ancient continental crust or sediments were significantly involved in the evolution
and genesis of magma. On the contrary, numerous discoveries of zircons inherited
in igneous and volcanic rocks of intra-oceanic island arches, supra-subduction litho-
sphere (ophiolites) and mid-ocean ridges (Atlantic Ocean) challenge our vision of the
formation of rocks derived from the mantle. In these areas, the fundamental question
concerns the source of inherited zircons. They cannot come from an ancient conti-
nental crust because, in general, it does not exist in the magma formation region, nor
in the region through which magma ascends to a shallower level of location, while
chemistry in total rock indicates a formation directly from the mantle.
For this study, we are recovering exposed rock zircons like washing with sand
the beaches of sand that are derived from mafic and ultramafic rocks as well as
parent rocks themselves. In this way, we will be able to locate areas that contain
zircons to later be able to sample the rocks. Similar studies have already been done
on the island of Grenada in the Lesser Antilles [21]. Additionally, we want to trace
the trajectory of these zircons in the Carnegie Crest, as in some muted volcanoes
in the Interandean and Cordillera Real Volcanic Mountain Range, as in the El Oro
Metamorphic Complex where we have evidence of the existence of such zircons
[22].
In this way, we have visited the Galapagos Islands, and there we have taken
samples of rocks such as beach sands. We have also taken samples of volcanic rocks
in the Andean part of Ecuador for reference. With the Galapagos samples, we have
tried first to find out if they contain zircons at all.
Taking into consideration the aforementioned, our goal represents a new approach
that complements other research projects in the world, especially those that seek a
link between the evolution of the mantle and the crust. Understanding this process
will also have a significant influence on the models on the recycling of the continental
crust in the mantle. The results obtained will also have a great impact on geosciences
and will represent a contribution to research in the field of geochronology and isotopic
geology. The mineral zircon is very robust and resists the passage through a variety
of geological processes. Zircons are usually not found in hot spots, since the volcanic
rocks that are found are mafic (basalts) and, they should not contain this mineral or
in an extremely low proportion. However, we have found zircons in several samples
of beaches, where the eroded material of the different rocks of the islands is directed
and also in rock samples.
Ocean Policy of the UNCLOS in Ecuador Based on New … 493
Fig. 4 Young zircons of beach samples of Floreana Island, reflecting ages of Islands volcanoes
Fig. 5 Geochronological data of zircons of beaches of the Santa Cruz Island, with old ages
494 T. Toulkeridis et al.
6 Conclusions
With the discovery of zircons and the corresponding old ages proving continental
origin, we have been able to demonstrate the belonging of the Galapagos Islands and
its derivative then the Carnegie Crest to the continental (mainland) Ecuador and the
South American Continent.
Such scientific breakthrough will allow Ecuador to claim the territory between the
continental mainland and the thousand kilometer away situated Galapagos Islands,
triplicating its territorial extension.
References
1. Egüez Bedoya, J.X.: Ecuador frente a las tendencias globales y regionales para el uso y
aprovechamiento sostenible de los recursos marítimos. Bachelor’s thesis, Pontificia Univer-
sidad Católica del Ecuador, Quito, Ecuador, 114 pp. (2012)
2. Yalem, R.: The International Legal Status of the Territorial Sea, pp. 206–214 (1959)
3. Tobar Vega, H.: Las 200 millas y el límite marítimo del Ecuador, 55 pp. ESPOL, Guayaquil,
Ecuador (2017)
4. Arroyo, P.G.: Fondos Marinos de Soberanía y Jurisdicción del Ecuador de acuerdo a la
Convención del Mar. Rev. AFESE 53(53), 121–138 (2010)
5. Pazmiño, N., Santana, E.: Plataforma continental del Ecuador. Acta Oceanog. Pacifico 13(1),
257–269 (2005)
6. Manrique, P.P., Barragán, J.M., Sanabria, J.G.: Progress on coastal management in ecuador
(2007–2017). Environ. Sci. Policy 90, 135–147 (2018)
7. Ministerio de Relaciones Exteriores y Movilidad Humana, El Ecuador y la CONVEMAR
(2018). https://www.cancilleria.gob.ec/el-ecuador-y-la-convemar/. Last accessed 16 Dec 2019
8. EL COMERCIO (2012). https://www.elcomercio.com/actualidad/politica/ecuador-ratifica-
adhesion-a-convemar.html. Last accessed 16 Dec 2019
9. Toulkeridis, T., Chunga, K., Rentería, W., Rodriguez, F., Mato, F., Nikolaou, S., Cruz D’Howitt,
M., Besenzon, D., Ruiz, H., Parra, H., Vera-Grunauer, X.: The 7.8 Mw Earthquake and Tsunami
of the 16th April 2016 in Ecuador—seismic evaluation, geological field survey and economic
implications. Sci. Tsunami Hazards 36, 197–242 (2017)
Ocean Policy of the UNCLOS in Ecuador Based on New … 495
10. Toulkeridis, T., Porras, L., Tierra, A., Toulkeridis-Estrella, K., Cisneros, D., Luna, M., Carrión,
J.L., Herrera, M., Murillo, A., Perez-Salinas, J.C., Tapia, S., Fuertes, W., Salazar, R.: Two
independent real-time precursors of the 7.8 Mw earthquake in Ecuador based on radioactive
and geodetic processes—powerful tools for an early warning system. J. Geodyn. 126, 12–22
(2019)
11. Clague, D.A., Bunch, T.E.: Formation of ferrobasalt at East Pacific midocean spreading centers.
J. Geophys. Res. 81(23), 4247–4256 (1976)
12. Dumont, J.F., Santana, E., Vilema, W.: Morphologic evidence of active motion of the Zambapala
Fault, Gulf of Guayaquil (Ecuador). Geomorphology 65(3–4), 223–239 (2005)
13. Navas, L., Caiza, P., Toulkeridis, T.: An evaluated comparison between the molecule and
steel framing construction systems—implications for the seismic vulnerable Ecuador. Malays.
Construct. Res. J. 26(3), 87–109 (2018)
14. Chunga, K., Mulas, M., Alvarez, A., Galarza, J., Toulkeridis, T.: Characterization of seis-
mogenetic crustal faults in the Gulf of Guayaquil, Ecuador. Andean Geol. 46(1), 66–81
(2019)
15. Christie, D.M., Duncan, R.A., McBirney, A.R., Richards, M.A., White, W.M., Harpp, K.S.,
Fox, C.G.: Drowned islands downstream from the Galapagos hotspot imply extended speciation
times. Nature 355(6357), 246 (1992)
16. Hughes, R.A., Pilatasig, L.F.: Cretaceous and tertiary terrane accretion in the Cordillera
Occidental of the Andes of Ecuador. Tectonophysics 345(1–4), 29–48 (2002)
17. Toulkeridis, T.: The volcanoes of the Galapagos, 2nd edn, 224 pp. Abad Offset, Guayaquil,
Ecuador (2019)
18. Jeon, H., Williams, I.S.: Trace inheritance—Clarifying the zircon O-Hf isotopic fingerprint of
I-type granite sources: implications for the restite model. Chem. Geol. 476, 456–468 (2018)
19. Ashwal, L.D., Wiedenbeck, M., Torsvik, T.H.: Archaean zircons in Miocene oceanic hotspot
rocks establish ancient continental crust beneath Mauritius. Nat. Commun. 8, 14086 (2017)
20. Shao, W.Y., Chung, S.L., Chen, W.S., Lee, H.Y., Xie, L.W.: Old continental zircons from a
young oceanic arc, eastern Taiwan: implications for Luzon subduction initiation and Asian
accretionary orogeny. Geology 43(6), 479–482 (2015)
21. Rojas-Agramonte, Y., Williams, I.S., Arculus, R., Kröner, A., García-Casco, A., Lázaro, C.,
Buhre, S., Wong, J., Geng, H., Echeverría, C.M., Jeffries, T.: Ancient xenocrystic zircon in
young volcanic rocks of the southern Lesser Antilles island arc. Lithos 290, 228–252 (2017)
22. Suhr, N., Rojas-Agramonte, Y., Chew, D.M., Pinto, A.J., Villagómez-Díaz, D., Toulkeridis,
T., Mertz-Kraus, R.: Detrital-zircon geochronology and provenance of the El Oro Metamor-
phic Complex, Ecuador: geodynamic implications for the evolution of the western Gondwana
margin. J. S. Am. Earth Sci. 90, 520–539 (2019)
Geopolitical Perspective on the Sea: Key
Highlights from the Past
and for the Future
Aneta Kazanecka , Wojciech Kazanecki , Joao Reis ,
and Marta Nowakowska
Abstract For centuries, Sea has played an important role in geopolitical thought
and geopolitical analyses. The dichotomy between Land and Sea has been explored
since ancient times and received seep attention from thinkers like Alexander Dugin.
Since the end of the nineteenth century, the attention of researchers like A. T. Mahan
and H. J. Mackinder, followed by German and Soviet traditions, were adopting a
holistic perspective on Sea while retaining a national point of view. Twenty-first-
century outlook needs to take into attention the need for dynamic instead of static
perception of Sea connecting it with multidimensional aspects of maritime outlook.
Security and socio-economic considerations need to be treated as a complex matrix
for developing broad view of the Sea to better understand and plan for behavior of
states and other geopolitical actors.
1 Introduction
In the beginning, a few disclaimers should be made. First, the paper presents the
perspective of classic geopolitical outlooks on the Sea—to showcase the role they
© The Editor(s) (if applicable) and The Author(s), under exclusive license 497
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_43
498 A. Kazanecka et al.
played in shaping the mindsets of decision-makers and coining the popular narra-
tives for societies. To understand that, it leans to critical geopolitics, so writings
of Gerald Toal, Klaus Dodds, John Agnew, and others—to understand the classic
geopolitics outlook, that has close references to (neo-)realist perspective on Interna-
tional Relations (IR). Second, it refers to some of the classical traditions and presents
the importance of Sea in Geopolitics referring to “classics”, like Sir Halford John
Mackinder or Admiral Alfred Thayer Mahan. Third, the observations—due to the
scope of this paper—do not attempt to come up with universal laws, yet they might
be treated as an addition to existing understanding of the maritime dimension of
power in geopolitics.
In the current literature of the subject, there are only several relevant papers
to consider when thinking about maritime security from geopolitical perspective,
the most important ones are published in Marine Policy journal (see: [1–4]). For
example, Germond [1] highlighted the importance of “geopolitical dimension” into
a discussion on maritime security, yet his focus was on a contemporary view (so,
without the historical background) and NATO and EU recent strategic documents.
Looking more broadly, Krell [5] undertook recently at an attempt to present a holistic
view of the Sea, including the reflection (or meditation, to refer to his own words)
on why humankind is so attached to the Sea. Our contribution to existing literature
is twofold. First, we bring examples from history (for example, the Soviet Union
perspective). Second, we add non-Anglo-Saxon references—from France, China,
Russia.
This paper begins with a simple remark, which does seem obvious: location mat-
ters. Whether geopolitical agency (in modern times associated with national state)
is landlocked or with access to sea, or whether we refer to an island, a perspective
on space—both within your closer neighborhood or beyond it—will differ and—as
a result—will shape thinking about geography, policymaking, diplomacy, etc. More
to that, historical perspective plays a role there, connected with established views
on space (including Sea) of a given society. Such views are mainly established and
promoted by that society elites and the storytellers that are making the dominant
perspective regarding location, which is difficult to change in public debate. Classic
example is the “curse” of Poland’s location between Russia and Germany. The key
finding of this paper is that Sea dimension has played and will continue to play an
important role in geopolitical narratives. Sea forms a geopolitical “state of mind”
and reference for states and empires, as well as for thinkers attempting to understand
and explain the realm of IR. It seems even that in geopolitics the role of Sea is much
more underlined and appreciated than in traditional IR.
The question arises here, what is the relationship between geopolitics and IR the-
ory? Are they synonymous, is one part of the other, are they separate with some/great
degree of overlap? Intuitively it seems that the political realism and classic geopol-
itics have lots in common: state-centrist perspective, quest for power—to name the
first associations. Critical geopolitics and popular geopolitics seem close to social
constructivism. At the same time, geopolitics and IR do have a strong feeling of
being separate from one another, and not being part of the other. While we would
Geopolitical Perspective on the Sea: Key Highlights … 499
not attempt here to make any decisive statement [as the discussion on the relation-
ship between IR and geopolitics (and political geography) is ongoing], it should be
pointed that there are enough similarities to treat geopolitical perspective as part of IR
toolbox to understand the world, also from a maritime security perspective. Within
geopolitics, we can generally apply the notion of geopolitical codes, as introduced by
Flint [6]. He describes it as a way in which a country defines itself versus the world.
According to him, there are five main calculations that define a country’s geopolitical
code. They are as follows:
• Who are our current and potential allies?
• Who are our current and potential enemies?
• How can we maintain our allies and nurture potential allies?
• How can we counter our current enemies and emerging threats?
• How do we justify the four calculations above to our public, and to the global
community? [6, p. 62]
Sea plays an important/decisive role in defining geopolitical code for a range of
countries such code was existing in Great Britain at the end of nineteenth century,
when Sir Halford John Mackinder was preparing foundations for his view of the
world. Such code was created when Admiral Alfred Thayer Mahan, whose writings
and activity was influencing the political decisions of US presidents and beyond (see:
[6], see also below). But also, in popular geopolitics, the attempt to present a view
on a country using Sea–Land dimension is existing, as visible, e.g., in contemporary
French book thought as an introduction to basic geopolitical concepts (see Fig. 1,
Chap. 21 of the book is titled “France Between Continent and Ocean”).
What is important to notice, is that from the early writings, dating to ancient Greece,
the division between (geopolitical) power based on Sea and based on Land was seen
as a distinguishing factor for thinkers and observers of political competition between
Sparta (Land-centered power) and Athens (Sea-based power). The conflict that began
in 435 BC and is known as “Peloponnesian War” led to the decline of Athens as a
power, and overall meant a breaking point in the supremacy of the Hellenic world
[7]. What is worth mentioning is the fact that difference in foundations (maritime or
landlocked) was also underlined in differences between the two nations with regards
to their leading values and organization of society. This Sea–Land division is further
expanded and taken to the extreme by current Russian thinker Aleksandr Dugin,
who uses it as “geopolitical paradigm of history” and using reductionist approach
brings all features of the world complexity into binary view of opposing geopolitical
spheres:
Sea (Thalassocracy), being synonymous to the West
500 A. Kazanecka et al.
Fig. 1 Part of a book (La Géopolitique pour les nuls) presenting a world view from French
perspective. Source Author’s visit in France, FNAC bookstore, March 2018
as an easy recipe to explain and give meaning to the world events to a large part
of (especially, but not exclusively) Russian elite and society. Dugin is constantly
referring to the perspective of Sir Halford John Mackinder who is his famous speech
in 1904 underlined that “The revolution commenced by the great mariners of the
Columbian generation endowed Christendom with the widest possibility of power,
short of winged mobility. The one and continuous ocean enveloping the divided
and insular lands is, of course, the geographical condition of ultimate unity in the
command of the sea (…)” [9, p. 432]. This sea–land competition for power is—taken
to extreme meaning by Dugin—the backbone of the civilizational world division,
where powers based on Land must actively act against the aggressive activities of the
Sea-based powers (previously led by Great Britain, currently by the USA). And the
fact, that various strategic thinkers, like Admiral Alfred Thayer Mahan, did focus on
the meaning of naval strategy when presenting ideas for their nation’s greatness at
the end of nineteenth century, do support that reasoning.
When thinking of a modern state with imperial perspective based on Sea power,
British Imperium is probably the first association, cultivated with popular culture
and images. Located in the western part of Europe, Britain has been an island with
a global perspective due to its sea orientation. And until the late nineteenth century,
its dominance over the seas made it a leading global player, which combined with
their highly industrialized and trade-oriented economy, liberal ideology and boom-
ing population, created a highly favorable situation. However, at the beginning of
twentieth-century geographers, among them Sir Halford John Mackinder, were con-
cerned with the rise in power land-based (geopolitical) entities that could question
the Sea-based dominance of Great Britain.
A. T. Mahan was an influential author at the end of the nineteenth century, focusing
on the role of Sea in the development of states and empires. His publication, “The
Influence of Sea Power upon History 1660–1783” [10], issued in 1890,1 provided a
broad analysis of reasons why naval supremacy was a key to achieving success in IR
for states. Sea—we could say—is a precondition for greatness. Mahan was also an
advocate of the Panama Canal, which helped overcome the challenge of moving the
US Navy between the oceans.
Following the growth of the United States of America in the late nineteenth cen-
tury, Sea became a growing point of reference for the elites ruling in Washington.
Fueled by ideas of Mahan (see above) key decision-makers, like presidents William
2 In1976 he published a book in Russian called “The Sea Power of the State” which—published in
English in 1979—was a great source of insight into Soviet way of framing the world and Sea from
strategic perspective.
3 As phrased used by Ronald Reagan in 1983. For video record of the speech, visit: https://youtu.
Fig. 2 Title page of Karl’s Haushofer book devoted to Sea. Source Author’s private resources
capabilities to be able to potentially destroy submarine cables that are vital to global
connectivity).
on global and regional actors to deal with rising geopolitical risks, that have increas-
ingly important maritime components [4]. Before we enlist key focus areas to be
analyzed by geopolitics focused on Sea, let us highlight two core observations that
should not be omitted when reflecting on the Sea in geopolitics.
First, Sea is not static. Despite often treated in classic geopolitics as a stage for
the activity of geopolitical actors that “just is”, it undergoes changes from physi-
cal geography and political and economic geography perspective. Global warming
increases the global Sea level, changing the lives of societies settled close to the
shore. Sea nature is evolving enabling increasing navigation through the so-called
Northern Sea Route. Humans create artificial islands that bring new landscapes to
the interplay of actors and enable new agency at Sea, bringing new challenges. New
canals and passages are being created (Suez Canal and Panama Canal are the most
remarkable evidence in recent history, but Canal in Nicaragua might at some point
also join the list). Laws are being introduced (such as fisheries policy in the EU)
that introduce legal limitations and bring new dynamics to the geopolitical compe-
tition. Innovations, like standardized containers, bring additional context for Sea as
a place—strengthening the shipping network as visible in Fig. 3 [15]. Hence, what
was not existing a few decades ago, now is a reality. Treating Sea in the same way as
it was decades ago would be a mistake for geopolitical thinkers and policymakers.
Second, Sea has few multidimensional aspects that reach beyond just trade or
movement of military forces. It serves as a place for obtaining natural resources (from
aquaculture to non-renewable sources of energy, like oil or gas), it enables movement
(transport of goods and people, including military projections of power), it provides
access to most of the information through the system on submarine cables that are
References
1. Germond, B.: The geopolitical dimension of maritime security. Mar. Policy 54, 137–142 (2015).
https://doi.org/10.1016/j.marpol.2014.12.013
2. Bueger, C.: What is maritime security? Mar. Policy 53, 159–164 (2015). https://doi.org/10.
1016/j.marpol.2014.12.005
3. Suarez-de Vivero, J.-L., Rodriguez Mateos, J.-C.: Changing maritime scenarios, the geopolit-
ical dimension of the EU Atlantic Strategy. Mar. Policy 48, 59–72 (2014). https://doi.org/10.
1016/j.marpol.2014.03.016
506 A. Kazanecka et al.
4. Suarez-de Vivero, J.-L., Rodriguez Mateos, J.-C.: Forecasting geopolitical risks: oceans as
source of instability. Mar. Policy 75, 19–28 (2017). https://doi.org/10.1016/j.marpol.2016.
10.009
5. Krell, D.F.: The Sea: A Philosophical Encounter. Bloomsbury Academic, London (2019).
https://doi.org/10.5040/9781350076747
6. Flint, C.: Introduction to Geopolitics [We have used Polish edition, 2008]. Routledge, London
(2006). https://doi.org/10.4324/9780203503768
7. Allison, G.: Destined for war: can America and China escape Thucydides’ Trap? [We have
used Polish edition of 2018]. Houghton Miffin Harcourt, Boston (2017). https://doi.org/10.
2017/s0008423917001433
8. Dugin, A.: Filosofia vayny [The Philosophy of War]. Jauza, Moscow (2004)
9. Mackinder, H.J.: The geographical pivot of history. Geogr. J. XXIII(4) (1904) (Apr). Reprinted
in: Geogr. J. 170(4), 298–321 (2004) (Dec). https://doi.org/10.1111/j.0016-7398.2004.00132.x
10. Mahan, A.T.: The Influence of Sea Power upon History 1660–1783 (1890). E-text accessed via:
https://en.wikisource.org/wiki/The_Influence_of_Sea_Power_upon_History. Accessed Nov
2019
11. Savell, S.: This map shows where in the world the U.S. military is combatting terrorism.
Smithsonian Mag. 2019 (2019). Access online www.smithsonianmag.com/history/map-shows-
places-world-where-us-military-operates-180970997/#zZHBZ7LpyCVyf306.99. Accessed
June 2019
12. Haushofer, K.: Weltmeere und Weltmächte. Wilhelm Andermann, Berlin (1937)
13. Kissinger, H.: On China [I used Polish edition of 2017]. Penguin Press, New York (2011)
14. Gorshkov, S.: Pot˛ega morska współczesnego państwa [English: The Sea Power of the State].
Ministerstwo Obrony Narodowej, Warszawa (1979)
15. Global Shipping Network. Nicolas Rapp website https://nicolasrapp.com/studio/portfolio/the-
shipping-news/. Accessed and Permission Dec 2019
Enabling the Securitisation of the Sea
Through Hybridity: EU Narrative Under
Scrutiny
1 Introduction
The European Union (EU) has been innovative in creating a de facto security com-
munity that overcame the European interstate conflict, and since the end of the Cold
War, it endeavoured to institutionalise the security actorness (with global reach and
through a comprehensive approach) to tackle complex security challenges. In a con-
text in which EU discourse has been fertile in declaring the priority of the security
agenda and of the achievement of both the ‘Security Union’ and the ‘Defence Union’,
A. P. Brandão (B)
CICP, EEG, University of Minho, Braga, Portugal
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 507
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_44
508 A. P. Brandão
it is paramount to reflect upon the rationale and effects of the evolving EU security
actorness.
EU security actorness reinforces and is reinforced by the narrative on the security
nexuses, namely between internal and external security, public and private security,
civilian and military security. This narrative and its practices raise several question-
ings about what (means the nexuses), the why, how (to implement them), and the
‘with what effects’. The paper focuses on the latest declared nexus between secu-
rity and hybridity that connect the aforementioned nexuses, applied to the maritime
space.
Bearing this in mind, the central research question guiding this paper is: How and
why does the EU construct the nexus between maritime security and ‘hybrid threats’?
Resorting to the securitisation theoretical framework [1] combined with a conceptual
matrix on security actorness [2], applied to the analysis of EU strategic documents
on security, it is argued that EU narrative reflects a securitising move intensified by
the mutual reinforcing broadness and vagueness of the terms ‘maritime security’ and
‘hybrid threats’. This securitising move is explained by a co-constitutive rationale:
‘more security’—appropriation of policies and instruments of a multifunctional actor
for security purposes; ‘more actorness’—securitisation of issues in order to promote
the actor and its policies. This securitising move is favoured by the convergence
of opportunity (broadening and deepening of security intensified by the post-2014
events), capacity (legal, institutional, policy and operational capacity in the field of
security), and (ambition to have a global) presence.
The concepts of ‘maritime security’ (MS) and ‘hybrid threats’ (HT) are both buz-
zwords in the field of international relations and security [3], and therefore contested
(polysemic) concepts.
The notion of non-conventional threats appeared during the Cold War associated
with military force and ‘hybrid warfare’. More recently, the narrative on HT has been
disseminated and obtained a particular relevance in national and European political
agendas associated to different phenomena such as the transnational terrorism by
non-state actors, the radicalisation and recruitment (into terrorism) using the internet
(e.g. Daesh), the cybercrime increase and sophistication, the annexation of Crimea
by Russia, disinformation campaigns by State (e.g. Russia, China) or/and non-state
actors.
The expression is a political construct characterised by imprecise, fluid, catch-all
notions used by States and IOs, such as the EU and NATO, without a consensual
definition. HT is a contested concept: “each differs over issues of attribution, vulner-
abilities, capabilities and intentions” [4], and over the importance and urgency of the
fight against them. Alongside that semantic polysemy and those different approaches,
Enabling the Securitisation of the Sea Through Hybridity … 509
some authors question the novelty about HT and consider the expression a “concep-
tual honey trap which attracts attention by dressing up a very old phenomenon as
something fresh and new” [4].
Hybridity is a challenging term at both conceptual/theoretical (academic)
and practical/political (decision/policy-making) levels: “the terms hybridity and
hybridization are used to characterise phenomena which are easily detected as some-
how “borderline” but not so easily explained” [5]. In rigour, it implies opposition to
purity. “Every discipline which argues about hybridity has to define what it under-
stands to be pure. If nothing can be designated as pure, everything is hybrid and
hybridity becomes a redundant term which might then be used in a metaphorical
way for stimulating discussion, but not as a conceptual tool.” [6].
The conceptualisation and theorisation of hybridity has been particularly relevant
in Cultural and Post-colonial Studies. Homi Bhabha, for some the father of the “Hy-
brid Theory”, mentions “a Third Space of Enunciation”, a shared culture mutually
developed by (the interdependence between) colonizers and colonised. Yazdhia uses
this framework “for deconstructing the rigid labels that maintain social inequities
through exclusion in race, language, and nation” [7].
In International Relations and, in particular, in Security Studies, the term was
used for the first time during the Cold War and applied to asymmetric warfare. In the
twenty-first century, “a wider debate within American (Western) military circles on
the inefficiency of Western conventional power in asymmetric conflicts (…) has been
caused by the combined use of conventional and irregular methods of warfare by the
Taliban, Al Qaeda and Hezbollah” [8]. Despite the increasing academic and political
relevance of the issue, hybridity “remains confusing. Scholars and practitioners in
the defence and security field have many different meanings in mind, considering
their own agenda and concerns” [9].
“Maritime security” is also a broad and “nebulous concept” [10]. The minimum
consensus is on the relevance of MS. Besides this, its practical meaning differs
“across actors, time and space” [11]. It encompasses not only the protection against
natural and environmental challenges [12], but also protection from crimes at sea (e.g.
piracy), peace and security the Security of Sea Lines of Communications, resource
security, access to resources at sea and to the seabed, security of all seafarers and
fishermen, among others [13]. The list of threats ranges from interstate disputes,
including human trafficking, to pollution [14].
The securitisation process is analysed through the lens of the Copenhagen School
[1]: the speech acts on ‘maritime security’ and ‘hybrid threats’ by three EU insti-
tutions, two that represent the Member States interests (Council of the EU, Euro-
pean Council) and one that represents the common interest (European Commission),
including the High Representative for Foreign and Security Policy (member of the
Council and of the Commission); the (perceived) threats (‘hybrid threats’). The anal-
ysis of EU actorness was based on the three elements conceptualised by Bretherton
and Vogler [2]: opportunity (“denotes factors in the external environment of ideas
and events which constrain or enable actorness”), presence (“conceptualises the abil-
ity of the EU, by virtue of its existence, to exert influence beyond its borders”) and
capability (“refers to the internal context of EU external action—the availability
510 A. P. Brandão
of policy instruments and understandings about the Union’s ability to utilise these
instruments, in response to opportunity and/or to capitalize on presence”) [15]. Based
on the conceptual framework of Kirchner and Sperling [2], two security functions
were considered in the analysis: compulsion (Common Security and Defence Pol-
icy) and protection (internal security). For the purpose of this paper, the qualitative
analysis of EU official documents, namely EU strategies on security [16], is focused
on the nexus between ‘maritime security’ and ‘hybrid threats’.
In the post-9/11, the security policy area ascended in the EU agenda alongside the
internal-external security nexus narrative, and with the comprehensive approach to
security challenges, problems and threats. Although the 2008 crisis put in the fore-
front the economic and financial issues, post-2014 events (the Daesh and several
terrorist attacks in European cities, the Islamic radicalisation, including the use of
the Internet to propagate the message and to recruit mainly young people to violent
actions, the foreign fighters phenomena, the Crimea annexation by Russia, the Face-
book/Cambridge Analytics scandal, the external-based disinformation campaigns in
EU Member States national elections) justified the relevance of the security agenda,
declared a political priority by the Junker Commission [17] and the subsequent
announcement of measures in order to create a ‘Security Union’ and a ‘Defence
Union’ [18]. The above-mentioned developments also contributed to enhance the
narrative on ‘hybrid threats’. These have been prioritised in EU security agenda:
“Hybrid activities by State and non-state actors continue to pose a serious and acute
threat to the EU and its Member States. (…) Our societies face a serious challenge
from those who seek to damage the EU and its Member States, from cyber-attacks dis-
rupting the economy and public services, through targeted disinformation campaigns
to hostile military actions.” [19].
The milestone of the EU agenda on HT is the “Joint Framework on countering
hybrid threats—a European Union response” adopted in 2016 [20]. This document
presented a common definition of HT (see Table 2) and formulated 22 measures
to fight them by recognising the hybrid nature of the threat; improving awareness;
building resilience; preventing, responding to crisis and recovering; increasing coop-
eration with NATO [20]. In 2018, it was reinforced by the “Joint Communication—
Increasing resilience and bolstering capabilities to address hybrid threats”, more
focused “on strategic communications and situational awareness, chemical, biolog-
ical, radiological and nuclear threats, resilience and cybersecurity as well as counter
intelligence” [21]. Since then, there have been political, legislative and institutional
improvements to counter HT. As in the fight against terrorism, the EU adopted a
comprehensive approach, and the changes included both the adaptation of existing
and transversal (political, legislative, institutional) instruments (in line with the com-
prehensive approach to security) and the creation of specific ones. The advance of
the implementation of the measures was presented in three Progress Reports (2017,
Enabling the Securitisation of the Sea Through Hybridity … 511
2018, and 2019). Besides a panoply of measures in sectorial domains relevant for
countering HT, it is worth mention the main (and new) specific instruments in order
strengthen EU capacity [22]: the StratCom Task Forces (East StratCom Task Force’
(2015); the Inter-Service Group (ISG) on countering hybrid threats (CHT) (2016); the
Council’s Friends of Presidency Group on Countering Hybrid Threats (FoP) (2016);
the EU operational protocol for countering hybrid threats—EU Playbook (2016, cur-
rently under revision); the EU Hybrid Fusion Cell, created inside EU INTCEN of the
EEAS (2016); the Centre of Excellence for Countering Hybrid Threats (Hybrid CoE)
(2017); the Hybrid Fusion Cell’s network of national points of contact for countering
hybrid threats (2017); the Risk survey (launched in 2017) and the report on the key
findings of the survey and policy recommendation (2018); the Action Plan against
Disinformation (2018); the report on the Chimera exercise (2018); the Rapid Alert
System (2019); a conceptual model for the analysis of hybrid threats with parameters,
such as actors, tools, domains and timeline under development by the Commission
and the Centre of Excellence (peer reviewed in May 2019); a pan-European network
of practitioners and other actors to monitor research and innovation projects, express
common requirements and indicate priorities for standardisation (to be created in
2020); the international cooperation (NATO; G7; partners countries the Hybrid Risk
Surveys launched in Moldova, Georgia, Jordan, Albania, North Macedonia, Kosovo
and Montenegro).
In the first trimester of 2019, under the Romania presidency, a high-level confer-
ence and a simulation took place in Bucharest in order to enhance EU action on HT,
resilience and strategic communication (HRS). The main conclusions were on: the
importance of EU norms and values to counter harmful and false messaging; better
coordination among institutions, governments and policy sectors (overcome ‘hybrid
silos’); the deepening of EU-NATO cooperation; the development of communities of
expertise (in health, energy, transport, finances, space, media, cyber); the importance
of the security of the EU’s digital supply networks and infrastructure (the personal
data usage, the digital resilience, the foreign direct investment, the security of elec-
toral processes and free and fair electoral campaigns, intellectual property rights
and the responsible use of social media as key aspects of critical infrastructure);
the rapid identification of and reaction to HT; the nuanced strategic communica-
tion approaches that target specific audiences; the development of resilience in the
digital world considering that patterns of media and information consumption are
rapidly changing [4]. Despite the general and specific achievements, the Report also
identifies critical points regarding information-sharing and intelligence exchange
between Member States and across EU institutions, risk assessments (minimal level
of information exchange), lack of trust that hamper proper response networks, and
compartmentalised strategies and responses to HT by the EU institutions [4].
The use of ‘hybridity’ in the realm of security is particularly problematic. ‘Hybrid-
ity’ is a grey area (state and non-state actors, conventional and non-conventional
methods) aggravated by its association to terms such as ‘fluidity’, ‘ambiguity’, ‘flex-
ibility’, ‘evolving nature’ [23], ‘multidimensional’ [24], ‘amorphous’ [25]. Differ-
ently from the rational sustained by Yazdhia [7], in the security area hybridity enables
securitisation (see for instance the whole-society approach to fight HT) and derived
512 A. P. Brandão
In 2014 the Council declared: “sea matters” [26]. EU Maritime Security Strategy
(EUMSS) marked the third phase of EU road to promote a European agenda on
maritime affairs beyond the fisheries sector. The first phase corresponded to the
longest period characterised by the omission of the topic in EU agenda [27], followed
by the politicisation and securitisation phases [28]. The second phase started with the
prioritisation of maritime environment protection by the sixth environmental program
(2002). The interconnected environmental and economic rationales [29] were also
behind the three main Commission’s communications of the politicisation process,
intended to implement an integrated maritime policy: the proposal for a European
Marine Strategy (2005), the Maritime Policy Green Paper (2006) and the Blue Book
(2007). The EUMSS enshrined the securitisation trend: maritime security is perceived
nowadays as one “of the fundamental strategic interests of the European Union” [30],
not only for economic and environmental reasons that underlined the politicisation
phase, but also for an interconnected security and political rationale—EU presence
as a “global maritime security provider” [31] (Table 1).
This securitising trend has been intensified by the HT construct. Differently from
the 2014 EUMSS [26], the conclusions of the Council on the revision of this strategy
and its Action Plan [31] includes for the first time measures to fight HT: “assess
and improve the resilience of critical maritime transport infrastructure, such as port
security, sea lines of communication, energy infrastructure, offshore installations and
telecommunications networks and sensors (…), including under water”; “pursue a
comprehensive approach to maritime security risk management, in particular by
conducting common risk analysis and identifying possible gaps and overlaps in this
domain” (see Part A ‘Horizontal actions’—strand ‘Risk awareness and management’
of the revised Action Plan) [31]. Since 2017, the Hybrid CoE has been developing
practitioner networks across Member States, EU and NATO and the private sector
on several areas, in order “to train, exercise and share best practice with one another,
as well as coordinating action and testing policy response options” [32]. In March
2018 it launched a Network on Maritime vulnerabilities and resilience—the Centre’s
Community of Interest (COI) on Vulnerabilities and Resilience. The COI work is
being developed along three strands: ports, shipping and underwater cables [33].
At the Informal Meeting of EU Defence Ministers in Helsinki (August 2019), the
ministers discussed on hybrid threats and maritime security, and Federica Mogherini
presented the concept of “Coordinated Maritime Presences” aimed at coordinating
“naval presence in a certain specific area that would be recognised as strategically
important for the European Union as such” and focused on getting and sharing
information, awareness and assessments at European level, and also with partners
[30]. It is expected to be implemented at the Gulf Guinea in order to precisely
tackle the HT-attacks or threats posed to the maritime routes by piracy or criminal
organisations [30]. Even though they were implemented before the Joint Framework
[16], it is worth mention that the two major maritime operations of the Common
Security and Defence Policy—Atalanta and Sophia Operations—are in fact against
HT (counter-piracy and counter-migrant smuggling and trafficking).
“Threats in the maritime domain tend to be progressively hybrid in nature and
difficult to model on account of their complex appearance and cascading nature” [34].
The nexus between MS and HT is established through the comprehensive approach to
deal with HT, particularly threats against critical infrastructure on maritime transport
and supply chain security and cyber-attacks against the maritime transport sector
[20]. According with: rapid digitalisation process and interconnectivity of the naval
world HT reinforce MS broadness: an evolving broad definition and comprehensive
approach (see Table 2) to the benefit of two co-constitutive desiderata—EU security
and EU global actorness.
5 Concluding Remarks
EU security actorness has been evolving since the end of the Cold War by a com-
bination of opportunity (broadening and deepening of security discourses, changes
in the internal-external security environment), capacity (legal, institutional, policy
and operational capacity in the field of security), and (ambition to have a global)
presence. This evolution has been characterised by a securitising trend associated
514 A. P. Brandão
References
1. Buzan, B., Waever, O., Wilde, J.: Security: A New Framework for Analysis. Lynne Rienner
Publishers, Boulder, CO (1998)
2. Bretherton, C., Vogler, J.: The European Union as a Global Actor. Routledge, New York (2006);
Kirchner, E., Sperling, J.: EU Security Governance. Manchester University Press, Manchester
(2007)
3. Bueger, C.: What is maritime security? Mar. Policy 53, 159–164 (2015). https://doi.org/10.
1016/j.marpol.2014.12.005; Fiott, D., Parkes, R.P.: Protecting Europe: The EU’s response to
hybrid threats. Chaillot Pap. 151(2019) (EUISS, Paris)
4. Fiott, D., Parkes, R.P.: Protecting Europe: The EU’s response to hybrid threats. Chaillot Pap.
151(2019) (EUISS, Paris)
5. Stockhammer, P.W.: Questioning hybridity. In: Stockhammer, P.W. (ed.) Conceptualizing
Cultural Hybridization: A Transdisciplinary Approach, vol. 1. Springer, Berlin (2012)
6. Stockhammer, P.W.: Questioning hybridity. In: Stockhammer, P.W. (ed.) Conceptualizing
Cultural Hybridization: A Transdisciplinary Approach, vol. 2. Springer, Berlin (2012)
7. Yazdhia, H.: Conceptualizing Hybridity: Deconstructing BOUNDARIES Through the Hybrid,
vol. 31. CUNY Academic Works (2010). http://academicworks.cuny.edu/gc_pubs/314
8. Vračar, M., Ćurčić, M.: The evolution of European perception of the term ‘hybrid warfare’.
Vojno Delo 1, 5 (2018)
9. Facon, I., Mazzucchi, N., Patry, J.-J.: Workshop Countering Hybrid Threats: EU and the Western
Balkans Case, vol. 9. European Parliament, Brussels (2018). https://doi.org/10.2861/850978
10. Feldt, L., Roell, P., Thiele, R.: Maritime security—perspectives for a comprehensive approach.
ISPSW Strategy Ser. Focus Defense Int. Secur. 2, 222 (2013)
11. Bueger, C.: What is maritime security? Mar. Policy 53, 163 (2015). https://doi.org/10.1016/j.
marpol.2014.12.005
516 A. P. Brandão
12. There is also no consensus on the difference between ‘maritime security’ and ‘maritime safety’.
According to Kira Frankenthal, the latter corresponds to the environmental dimension [Franken-
thal, K.: The EU as a Maritime Security Actor in the Mediterranean Sea. Nomos, Baden Baden
(2019)]. Differently, Bueger defines ‘maritime safety as “the safety of ships and maritime
installations with the primary purpose of protecting maritime professionals and the marine
environment” [Bueger, C.: What is maritime security? Mar. Policy 53, 160. https://doi.org/
10.1016/j.marpol.2014.12.005 (2015)]. According to Yarin Eski, “Maritime safety encom-
passes the protection of ports, ships, and their communities against unintentional dangers
and harms” [Eski, Y.: Maritime security: problems of security versus safety practices. In:
Shapiro, L.R., Maras, M.-H. (eds.) Encyclopedia of Security and Emergency Management
Living. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_90-2 (2018)]. According
to Suk Kyoon Kim, “maritime safety concerns primarily with preventive activities to protect
life and property at the sea and is the responsibility of the shipping industry and actors at the
operational level” [Kim, S.K.: Define Maritime Safety and Security, Global Maritime Safety
& Security Issues and East Asia, vol. 9. Brill Nijhof, Leiden (2019)]
13. Feldt, L., Roell, P., Thiele, R.: Maritime security—perspectives for a comprehensive approach.
ISPSW Strategy Ser. Focus Defense Int. Secur. 222, 3 (2013)
14. See: Bueger’s Maritime security matrix that connects four dimensions of MS: marine envi-
ronment, economic development national security, human security [3]; the “Maritime Secu-
rity Index—Stable Seas”, launched by the One Earth Foundation in a joint event with IMO
and UNDOC, measures and maps nine issues across sub-Saharan Africa that are central to
achieving sustainable maritime security and good maritime governance, including both threats
and buffers against the threats: international cooperation; rule of law; maritime enforcement;
coastal welfare; blue economy; fisheries; piracy and armed robbery at sea; illicit trades; mar-
itime mixed migration [Bell, C.S, Glaser, S.: Stable Seas Maritime Security Index: Codebook,
Version 1.0. One Earth Future, 1 (2018). https://stableseas.org/sites/default/files/stable_seas_
codebook.pdf]
15. Bretherton, C., Vogler, J.: The European Union as a Global Actor, vol. 24. Routledge, New
York (2006)
16. EU Maritime Security Strategy (2014); European Agenda on Security (2015); Joint Framework
on Countering Hybrid Threats (2016); EU Global Strategy (2016)
17. President Juncker’s Political Guidelines. 15 July 2014 (2014). https://ec.europa.eu/
commission/publications/president-junckers-political-guidelines_en
18. President Jean-Claude Juncker’s State of the Union Address 2017 (2017). https://ec.europa.eu/
commission/presscorner/detail/en/SPEECH_17_3165
19. European Commission & High Representative High Representative of the European Union
for Foreign Affairs and Security Policy: Joint communication to the European Parliament,
the European Council and the Council—Increasing resilience and bolstering capabilities to
address hybrid threat (JOIN/2018/16 final) (2018). See also: “threats such as those posed by
cyberterrorism and hybrid threats could increase in the years to come” (European Commission:
Communication from the Commission to the European Parliament, the Council, the European
Economic and Social Committee and the Committee of the Regions—The European Agenda
on Security (COM/2015/185 final) (2015)); “Today terrorism, hybrid threats, climate change,
economic volatility and energy insecurity endanger our people and territory. To preserve and
develop what we achieved so far, a step change is essential” [European Council: Shared Vision,
Common Action: A Stronger Europe—A Global Strategy for the European Union’s Foreign
And Security Policy (2016)]; “Hybrid threats are a persistent challenge” [European Commis-
sion and High Representative High Representative of the European Union for Foreign Affairs
and Security Policy: Joint staff working document Report on the implementation of the 2016
Joint Framework on countering hybrid threats and the 2018 Joint Communication on increasing
resilience and bolstering capabilities to address hybrid threats (SWD/2019/200 final) (2019)]
20. European Commission and High Representative High Representative of the European Union
for Foreign Affairs and Security Policy: Joint communication to the European Parliament
Enabling the Securitisation of the Sea Through Hybridity … 517
and the Council—Joint Framework on countering hybrid threats a European Union response
(JOIN/2016/18 final) (2016)
21. European Commission and High Representative High Representative of the European Union
for Foreign Affairs and Security Policy: Joint communication to the European Parliament, the
European Council and the Council—Increasing resilience and bolstering capabilities to address
hybrid threat (JOIN/2018/16 final) (2018)
22. European Commission and High Representative High Representative of the European Union
for Foreign Affairs and Security Policy: Joint staff working document Report on the imple-
mentation of the 2016 Joint Framework on countering hybrid threats and the 2018 Joint
Communication on increasing resilience and bolstering capabilities to address hybrid threats
(SWD/2019/200 final) (2019)
23. “While definitions of hybrid threats vary and need to remain flexible to respond to their evolving
nature” [20] “By design, hybrid threats will continuously evolve based on the success of
their application, continuing technological developments, changes in potential adversaries’
vulnerabilities and developments in measures to counter them. The important factor for the
EU is to be able to recognise the overall effect and build resilience as a means of countering
the attack” [EEAS: Food-for-thought paper “Countering Hybrid Threats” (2015). https://www.
statewatch.org/news/2015/may/eeas-csdp-hybrid-threats-8887-15.pdf]
24. Multidimensional hybrid campaigns intended to damage and destabilise countries [21]
25. “This amorphous set of threats exists below the level of war, enabling other powers to
exploit existing societal divisions and sow confusion and instability”. [Gressel, G.: Protecting
Europe against hybrid threats, Policy Brief (2019). https://www.ecfr.eu/publications/summary/
protecting_europe_against_hybrid_threats]
26. Council of the European Union: Maritime Security Strategy (2014). http://register.consilium.
europa.eu/doc/srv?l=EN&f=ST%2011205%202014%20INIT
27. See “Sea blindeness” [Frankenthal, K.: The EU as a Maritime Security Actor in the
Mediterranean Sea, vol. 14. Nomos, Baden Baden (2019)]
28. “Politicization means to make tin issue appear to be open, a matter of choicer/something
that is decided upon and that therefore entails responsibility, in contrast to issues that either
could not be different (laws of nature) or should not be put under political control (e.g. a free
economy, the private sphere, and matter for expert decision). By contrast, securitization on the
international level (although often not on the domestic one) means to present an issue as urgent
and existential, as so important that it should not be exposed to the normal haggling of politics
but should be dealt with decisively by top leaders prior to other issues.” [Buzan, B., Waever,
O., Wilde, J.: Security: A New Framework for Analysis, vol. 29. Lynne Rienner Publishers,
Boulder, CO (1998)]
29. See the “Sustainable development” argument: Green Paper—Towards a future Maritime Policy
for the Union: A European vision for the oceans and seas “ (COM (2006) 275) (2006); “Blue
Book”—Communication from the Commission to the European Parliament, the Council, the
European Economic and Social Committee and the Committee of the Regions—An Integrated
Maritime Policy for the European Union (COM(2007) 574 final) (2007)
30. Remarks by High Representative/Vice-President Federica Mogherini at the press con-
ference following the Informal Meeting of EU Defence Ministers Helsinki, 29/08/2019
(2019). https://eeas.europa.eu/headquarters/headquarters-homepage/66784/remarks-high-
representativevice-president-federica-mogherini-press-conference-following_en
31. Council of the European Union: Council conclusions on the revision of the European Union
Maritime Security Strategy (EUMSS) Action Plan (2018). https://ec.europa.eu/maritimeaffairs/
sites/maritimeaffairs/files/2018-06-26-eumss-revised-action-plan_en.pdf
32. Hybrid CoE: Strategic Communications and Resilience—Speech by Director Matti
Saarelainen (2019). https://www.hybridcoe.fi/news/strategic-communications-and-resilience-
speech-by-director-matti-saarelainen
33. Hybrid CoE: Network on Maritime vulnerabilities and resilience launched (2018). https://www.
hybridcoe.fi/news/network-maritime-vulnerabilities-resilience-launched. The Hybrid CoE
also published two Working Papers on “Maritime Security”: [35]; Savolainen, J.: Hybrid
518 A. P. Brandão
© The Editor(s) (if applicable) and The Author(s), under exclusive license 519
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_45
520 J. Silva et al.
1 Introduction
The concept of territoriality is established as a key concept in the search for maximiz-
ing the effectiveness of resources for all State Security Forces and Corps in charge of
safeguarding citizens’ rights and freedoms. It is for this reason that the statistic study
of criminality is constant in order to optimize the disposition of forces on the ground.
This study, which is constant over time, increases even more in times of economic
crisis since it is when there is a marked tendency to reduce resources while, due to
several reasons, there is a risk of an increase in criminality [1, 2].
Leaving aside the investigation of cybercrime and fraud, the use of automatic
learning techniques in the prediction of common crimes is very scarce. In recent
years, just some promising studies start to appear in this area. The focus of this
paper is to relate demographic data and voting trends in Spanish municipalities, with
criminal acts committed during a year, for predicting the criminality of municipalities
based on these variables [3].
In this sense, the study that most closely resembles the one presented in this paper
is of [4], who apply regression techniques with Random Forests [5] to predict the
number of urban homicides in Brazil through sociological and demographic city
data. Predictions reach a determination coefficient of 0.97. The authors point to
unemployment and illiteracy as the main variables used in their predictive model.
There are other studies in smaller geographical areas. In [6], the conflict zones of
a police district are studied in order to plan the action of street patrols. They worked
with data from Los Angeles (USA) and Kent (GB) and used an approximation based
on time series to study the evolution of those areas.
In [7], SVMs are used to predict whether a zone is conflictive or not, carrying out
the research in Columbus (Ohio) and St. Louis (Missouri).
In [8], the risk zones for sexual crimes on the University of Virginia Charlottesville
campus are analyzed. The logistic regression and Random Forests classifiers [9] are
used to sort a point as conflictive or not. It establishes, as the most important vari-
ables, the proximity of people with antecedents in sexual violence and residences
with student fraternities. They also use an approach of time series to analyze the time
interval, day of the week and time of the year with greater risk; as well as the influ-
ence of meteorological conditions, finding that temperature is the most determining
climatological factor. They use Kernel Density Estimation (KDE) to compare risk
probabilities over different time periods.
Deep Learning techniques are also used in the prediction of crimes [10]. In this
case, the deep networks predict probable locations and moments of criminality in
the city of Chicago. This study merges socio-economic data with police data, as well
as climate data. Another work in the same line for the city of Manila is that of [11],
applying the Bayesian Networks as the classification algorithm among the tests that
offer better results.
The study presented in this paper covers all types of crimes in Colombian geogra-
phy. Unlike most of the previously reviewed works, it does not consider the temporal
Algorithms for Crime Prediction in Smart Cities … 521
evolution of criminal acts, since it focuses on predictions for the whole year. In addi-
tion to the use of demographic data, it presents the use of political preference data
obtained from the election results. The results obtained are the first step in a wider
project that aims to integrate more public data to improve predictions but, in the
current state, already offers some interesting results.
2 Method
2.1 Data
For this research, public official data were crossed with statistics from the State
Security Office through the General Direction of the Guardia Civil. Public or open
data is understood as data that must be freely available to access, use, modify and
publish without copyright restrictions [12].
Governments have the capacity to obtain large amounts of information about the
population through various organizations (such as the National Institute of Statistics).
In this study, each instance of the data set represents a municipality. The number of
records in the set is 10,254, with a total of 126 attributes without considering the
class (number of criminal acts) [13]. Two public sources were used:
1. National Institute of Statistics (DANE). Statistics for the year 2016, correspond-
ing to the place of birth and age ranges. A total of 114 attributes. Place of birth
(51 attributes), Age ranges (64 attributes) [14].
2. Ministry of Interior. Electoral data, congressional elections (June 2016). A total
of 12 attributes [15].
The attributes of age ranges are distributed into 22 categories (0–4 years, 5–9 years,
…, 90–94 years, 95–99 years, more than 100 years) each of them broken down into
three sub-categories (women and men, only women, only men). The number of votes
for each formation was grouped into 10 categories (Extreme Left, Left, Center Left,
Center, Center Right, Right, Extreme Right, Others, Blank, and Null.). In order to
optimize the objectivity of the final conclusions, these categories were selected and
categorized by open sources and external to the researchers, in order not to introduce
subjectivities that could generate errors or induce erroneous conclusions [16].
In terms of class, in the 10,254 municipalities evaluated, a total of 45,254,985
events were recorded, the most common of which were: Theft crime (12.5%), infrac-
tion for consumption or possession of drugs in public places (8.4%), and robbery
with force (18.8%) [17].
522 J. Silva et al.
The data set in the previous section underwent two transformations before being
used. First, all attributes were normalized, except for the variable to be predicted
in the interval [0.1]. Second, since the variable to be predicted represents a count
(number of criminal acts), it is assumed that it follows a Poisson distribution, so the
square root was applied to that variable.
Once the data were transformed, the researchers proceeded to experiment in
WEKA [18] by cross-validation 10 × 10 different regression techniques, to know
the most suitable of them. In the beginning, the default WEKA configuration was
used for all regressors, except where otherwise stated.
The regressors used in the experiment are grouped into two families: on the
one hand, regressors in solitary or singletons, and on the other, multi-regressors
or ensembles. The following singletons were tested:
• Decision tree M5P [19]. M5Ps are decision trees of the model trees family. These
trees contain a linear regression in the leaf nodes.
• M5Rules [20], which is a method that obtains decision rules from M5P trees,
so they are not expected to give very different results than the M5P. The reason
for including them is to justify their reliability in order to use them as a tool for
interpreting the results.
• Linear Regression, for optimizing the ridge parameter of the four tested versions,
and that arose from activating/deactivating the selection of variables and the elim-
ination of collinear attributes. The best version was taken as the one that did not
make selection of variables but eliminated colinear attributes.
• SVM for regression (SVM-Reg) [21], using LIBLINEAR [9] with linear kernel
and optimized C parameter.
• K-NN. Due to the high number of characteristics in the data set, two versions
were tested. The first one without attribute selection, the second one with attribute
selection using Correlation-based Feature Subset Selection [2]. In both versions,
the number of neighbors was optimized. The best version was the one that does
not make attribute selection and is the one reported on this paper.
The tested ensembles were as follows:
• Random Forest [5].
• AdaBoost.R2 [8]. Three configurations with linear, quadratic and exponential loss
function were tested. The configuration with the best results was selected in the
cross-validation 10 × 10 (quadratic loss).
• Additive Regression, which is an implementation of Stochastic Gradient Boosting
[10].
• Bagging [4].
• Iterated Bagging [6]. In this case, 40 Bagging iterations of 7 trees each are used
to simulate 120 trees.
Algorithms for Crime Prediction in Smart Cities … 523
The results are shown in Table 1. As can be noted, the ensembles are at the head,
while the linear methods are at the bottom. This may be because, as indicated in
[16], the relationship between the size of cities and their criminality obeys more to
a potential law than to a linear relationship. In fact, the correlation coefficients in
the table show a very discrete correlation when using linear models, which improve
considerably in the case of M5P trees and M5Rules, which also use linear models
on the leaves, and reach an approximate value of 0.9 ensembles used.
The generation of rules using the M5Rules algorithm [13] was used to interpret the
data set. M5Rules generates an M5P tree, selects the best leaf, and, by doing AND
with the nodes in the path between the root and the leaf, generates the first rule. Then,
it discards from the tree the data that have fallen on that leaf and builds a new M5P
repeating the whole process to generate a second rule, and so successively generates
new trees for each rule with training data that are not covered by the previous rules,
until finally, every instance corresponds to a rule.
The WEKA implementation of M5Rules, at configuration of the algorithm by
default, includes a pruning process, so it eliminates the final rules, which tend to
concentrate on particular cases, replacing them with a linear model.
Table 1 shows that there are no relevant differences in terms of RRSE between
the best method and M5Rules, so it seems an acceptable approach to have a certain
interpretation of the data from the point of view of decision trees.
For this purpose, the complete training set was used and the following five rules
were generated (Fig. 1).
V represents the total number of males in the municipality, V [x, y] represents
the number of males in the age range [x, y], V + M[x, y] represents the sum of
males and females in the age range [x, y], Right and Center D is the percentage of
524 J. Silva et al.
votes to right and center-right formations, respectively. The last rule (ELSE) does not
contain a logical condition because it is the one that comes from the pruning of the
less important rules, already commented before. Note that the rules in the illustration
are not the originals generated by the algorithm, which, as indicated above, works
with normalized data in the range [0.1]. Instead, and for better comprehension, these
rules were translated with the values corresponding to unstandardized data. It can be
observed that the logical expressions in the five rules take the age ranges as variables,
paying close attention to the ranges around 30–39 years to characterize the five groups
of municipalities. It is probable that the model is taking these ages to characterize
the size of the municipalities. As an important novel contribution compared to other
related works, the orientation of the vote was also taken into account. On the contrary,
the origin of the population (foreign, born in the same municipality, etc.) was not
used.
The five groups generated by the rules are described in Table 2. This table includes
a Weight column calculated from the absolute values of the coefficients so that it
represents the quotient between the absolute value of the coefficient of that attribute,
divided by the sum of the absolute values of all the coefficients. Once the weight was
calculated, the attributes are sorted by the same descending order. The tables show
only those with the highest absolute value, namely those necessary for their sum to
exceed the threshold of 33.33% of the total weight.
The linear models in this table are confusing and do not draw conclusions about the
influence of a particular group in the occurrence of criminal acts. This is mainly due
to the inclusion relationships that exist between a large part of the attributes. That is,
some attributes represent collectives that are included within collectives represented
by other attributes. For example, in the linear model number 1, apparently, the most
important variable is the number of foreigners, which contributes to the appearance of
criminal acts with a positive sign and a weight of 10.11%. Although linear models do
not seem to yield any plausible conclusions, the analysis of the groups that generate
the rules is more revealing. Table 3 includes minimum, maximum, average and typical
deviation of the population, number of criminal acts and /hab for each of the groups
of municipalities defined by the five rules.
Algorithms for Crime Prediction in Smart Cities … 525
4 Conclusions
In this study, a predictive model was obtained based on Random Forests allowing to
predict the number of criminal acts that are reported to the Guardia Civil annually in
each municipality. The RRSE value achieved is 40.12, but all ensembles give results
that are not very different. The data is used to combine the location of the Guardia
Civil with public data sources (DANE and 2016 electoral data).
A novelty that this work incorporates is the use of electoral data. On the other
hand, the M5Rules discriminated against five groups of municipalities. The first four
groups seem to segment municipalities by size and the fifth one by islands.
References
1. Zaharia, M., Xin, R.S., Wendell, P., Das, T., Armbrust, M., Dave, A., Meng, X., Rosen, J.,
Venkataraman, S., Franklin, M.J., Ghodsi, A., Gonzalez, J., Shenker, S., Stoica, I.: Apache
spark: a unified engine for big data processing. Comm. ACM 59(11), 56–65 (2016)
2. Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In:
Proceedings of the 20th International Conference on Very Large Data Bases, VLDB, pp. 487–
499 (1994)
3. Manning, C.D., Surdeanu, M., Bauer, J., Finkel, J., Bethard, S.J., McClosky, D.: The Stanford
CoreNLP natural language processing toolkit. In: Proceedings of the 52nd Annual Meeting of
the Association for Computational Linguistics: System Demonstrations, pp. 55–60 (2014)
4. Hahsler, M., Karpienko, R.: Visualizing association rules in hierarchical groups. J. Bus. Econ.
87, 317–335 (2017)
Algorithms for Crime Prediction in Smart Cities … 527
5. Alves, L.G.A., Ribeiro, H.V., Rodrigues, F.A.: Crime prediction through urban metrics and
statistical learning. Phys. A Stat. Mech. Appl. 505, 435–443 (2018)
6. Silverstein, C., Brin, S., Motwani, R., Ullman, J.: Scalable techniques for mining causal
structures. Data Min. Knowl. Discov. 4(2–3), 163–192 (2000)
7. Amelec, V., Carmen, V.: Relationship between variables of performance social and financial
of microfinance institutions. Adv. Sci. Lett. 21(6), 1931–1934 (2015)
8. Viloria, A., Lezama, O.B.P.: Improvements for determining the number of clusters in k-means
for innovation databases in SMEs. Procedia Comput. Sci. 151, 1201–1206 (2019)
9. Kamatkar, S.J., Kamble, A., Viloria, A., Hernández-Fernandez, L., Cali, E.G.: Database per-
formance tuning and query optimization. In: International Conference on Data Mining and Big
Data, pp. 3–11. Springer, Cham (2018)
10. Erlandsson, F., Brodka, P., Borg, A., Johnson, H.: Finding influential users in social media
using association rule learning. Entropy 18, 164 (2016)
11. Baculo, M.J.C., Marzan, C.S. de Dios Bulos, R., Ruiz, C.: Geospatial-temporal analysis and
classification of criminal data in Manila. In: Proceedings of 2nd IEEE International Conference
on Computational Intelligence and Applications, pp. 6–11. IEEE (2017)
12. Viloria, A., et al.: Integration of data mining techniques to PostgreSQL database manager
system. Procedia Comput. Sci. 155, 575–580 (2019)
13. Clougherty, E., Clougherty, J., Liu, X., Brown, D.: Spatial and temporal analysis of sex crimes
in Charlottesville, Virginia. In: Proceedings of IEEE Systems and Information Engineering
Design Symposium, pp. 69–74. IEEE (2015)
14. Pineda, C.J.: Apuntes críticos: Visión Colombia 2019. Institución Universitaria Politécnico
Grancolombiano (2016)
15. Torres, A.X.O.: Los derechos de los colombianos en el extranjero y de los extranjeros en
Colombia. En mora de un enfoque integral. Vniversitas 57(117), 357–376 (2008)
16. Drucker, H.: Improving regressors using boosting techniques. In: Proceedings of the Fourteenth
International Conference on Machine Learning, ICML ’97, San Francisco, CA, USA, pp. 107–
115. Morgan Kaufmann Publishers Inc. (1997)
17. Fan, R.-E., Chang, K.-W., Hsieh, C.-J., Wang, X.-R., Lin, C.-J.: LIBLINEAR: a library for
large linear classification. J. Mach. Learn. Res. 9, 1871–1874 (2008)
18. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data
mining software: an update. SIGKDD Explor. 11(1), 10–18 (2009)
19. Kang, H.-W., Kang, H.-B.: Prediction of crime occurrence from multimodal data using deep
learning. PLoS ONE 12(4), e0176244 (2017)
20. Kianmehr, K., Alhajj, R.: Effectiveness of support vector machine for crime hot-spots
prediction. Appl. Artif. Intell. 22(5), 433–458 (2008)
21. Leitão, J.C., Miotto, J.M., Gerlach, M., Altmann, E.G.: Is this scaling nonlinear? R. Soc. Open
Sci. 3(7) (2016)
Social Mobilizations as a Silent
Instrument for Seizing Power: The
Ecuadorian Case
Abstract The escalation of violence and democratic fragility is mainly due to the
incidence of external and internal factors including the political, economic and social
that live the world, the region and in particular the country. These factors have led to
the rejection of certain groups antagonistic through social protests, violent acts and
questioning to the incumbent governments, characterized by the use of strategies
(tangible and intangible) and insurgent techniques causing severe effects on the
population, state resources and democratic stability. Analysis of social mobilizations
as an instrument for the seizure of power, the Ecuadorian Case, makes a study from
the world, regional and local perspective. Besides, it analyses some theories, trends
and ideologies that were applied in Ecuador, as tools for destabilizing the government
and finally the possible alternative solutions to avoid weakening a regime.
1 Introduction
This last decade the world has suffered a critical irruption of social movements
claiming old aspirations for equality, respect for human rights, gender equity, access
to essential services and technology. Furthermore, the pursuit of peace and security
that guarantees a dignified and equitable life considered as inalienable universal
rights. Events have revealed the evolution of movements and perspectives of social
L. Recalde (B)
Universidad de las Fuerzas Armadas—ESPE, 170603 Quito, Ecuador
e-mail: [email protected]
M. A. Criollo
Subsecretaría de Defensa Nacional, 170605 Quito, Ecuador
e-mail: [email protected]
M. D. Santos
Isocmonitoreo Cía. Ltda., 170603 Quito, Ecuador
e-mail: [email protected]
© The Editor(s) (if applicable) and The Author(s), under exclusive license 529
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_46
530 L. Recalde et al.
change, so it is necessary to use new analytical tools to understand the dynamics and
social aspirations of contemporary movements.
The position and nature of social movements in the world are visualized and
radicalized with the rise of the so-called Arab Spring in 2011, which is considered as
the first great wave of secular and democratic protests in the world in the twenty-first
century. These protests, of a social nature, spread like wildfire throughout the city
through the European and Asian continents.
In Latin American countries, there have been various mobilizations that maintain
their dynamics and are consistent with political times and events, externalizing great
social unrest in the region. As expected, we find a mix of actors and mobilizations
that have been present for decades in different countries that renew demands and
conflict issues [1].
According to Geoffrey Pleyers, “Latin America has its history, marked by the
strength of indigenous culture and actors, and by the experience of colonization and
its specific challenges; it is also deeply anchored in evermore global history and
circulation of knowledge and actors” [2].
The different mobilizations and protests carried out in the region have demon-
strated the willingness of the social actors to influence, often at a local and sometimes
national level, the decision processes [3]. It could be abstracted that, in many cases,
it seeks to delegitimize representative democracy and try to implement new modes
and areas of citizen participation such as the so-called twenty-first-century social-
ism, trying to modify institutional representation and fundamentally seeking a new
distribution of power.
At the local level, the preponderance of social movements and their increasingly
aggressive irruption in the political landscape have been trying to claim old aspi-
rations for equality and equity in wealth distribution. So it could be said that the
consolidation of democracy still faces significant challenges in Ecuador. There is no
real renewal of the political class and the factional system, nor political practices,
and the rule of law remains weak, allowing corruption and impunity to gain space in
the country’s already cracked democracy.
The present work is based on a cyclical analysis that allows identifying the actors,
tendencies and theories related to social protests in the Andean region and Ecuador in
a particular way that could influence democratic stability. Besides, the present study
aims to propose possible alternatives to avoid or reduce its scope and consequences
of the actions of the social movements, especially in the Ecuadorian case.
World Scope The world is in one of the most complex stages in its history; we live in
a context of challenges, paradoxes and contradictions within the new global security
Social Mobilizations as a Silent Instrument for Seizing Power … 531
environment. The emergence of multilateralism and polarities after the fall of the
Berlin Wall, and the attack on the Twin Towers in 2001, have changed in a volatile,
uncertain, complex and ambiguous way (VUCA) [4], the global geopolitical scene,
where the structural changes of the States are evidenced to strengthen the power
relations with the hegemonic blocks based on their particular interests.
The nation-state as a political-legal organization in force since Westphalia in 1648
has replaced the feudal order giving way to territorial organizations defined around
a government that recognizes its limits and spaces of power (sovereignty, territory
and people). This power of the nation-state is being questioned by transversal factors
that affect this structure through globalization, the new geopolitical architecture and
the influence of the powers [5].
Globalization understood as the structural transformation that the world is suf-
fering affects the nation-state through the progressive dissolution of its borders. It
has allowed an unlimited expansion of economic, political, technological, social,
cultural, military activities and communications that directly influence the internal
politics of the States. According to Habermas, it is taking away from the governments
the power to make internal decisions, because other external actors have assumed
the public space of decision [6].
The diversity of state actors, international organizations, supranational organiza-
tions and non-governmental organizations (NGOs) change the power relations and
the territorial perspective of the nation-states, which is further weakened by the cre-
ation of new institutions such as the World Trade Organization (WTO), International
Court of Justice, International Human Rights Courts, World Bank, International Mon-
etary Fund, International Finance Corporation, Inter-American Development Bank,
United Nations, Amnesty International, Greenpeace, etc. Accordingly, the nation-
states are affected in three fundamental aspects, such as the population, the territory
and their sovereignty.
On the other hand, the geopolitical architecture is affected by acts of manifest
rebellion and actions that break the governability. It is causing a crisis on the nation-
state, where the functionality of the State is lost, paralysis on the social welfare and
the institutionalization of democracy. Actions that show the weakening even of the
monopoly of the use of force added to the loss of authority and the preservation
of state order [7]. Non-state or non-governmental actors associated with illicit or
underground economies that act through coercion and violence within illegality are
identified, proclaiming and calling themselves new states. A clear example is the
conformation of the Islamic State (ISIS), within a legally constituted State, with non-
peaceful purposes to impose its ideology based on actions associated with terrorism,
drug trafficking and related crimes with manifest violence [8].
However, these strategic political decisions could be exploited and linked to the
influence of world powers, which took advantage of the instability of states. The high-
lighting actions are generally hegemonic to promote bilateral and multilateral conven-
tions and agreements both in the political, economic and military fields. Therefore,
the nation-state will inevitably be obliged to develop the concept of geo-economics to
achieve relations of powers, since the current world of globalization requires to pre-
serve resources, manage production factors and incorporate to networks to conquer
532 L. Recalde et al.
some market segment. The dispute between geostrategic spaces within the geopolit-
ical game, established especially in the Pacific, considered the centre of the world, is
where the commercial activity of the great hegemonic countries of the world takes
place, within the so-called BRICS, TPP, RCEP, ASEAN and APEC by the USA and
China. It generates spaces of uncertainty since two economic proposals are materi-
alized worldwide, such as the Indo-Pacific initiative and the Strip and the Road [9].
The first to suppress the Chinese hegemony and the second unquestionably consid-
ered the vital space of survival of the Asian giant, generating the existing inequities
within some nation-states by the wrong redistribution of wealth. It has been the spear-
head for the emergence of new actors that taking advantage of globalization and the
impact of the logic of multilateralism and transnationality adopted by emerging and
hegemonic economies such as the USA, China, Russia and Iran in the global context.
They cause destabilization and discomfort to legally constituted governments,
having the Russian influence and participation in the “Caribbean Circle”, formed
by Nicaragua, Cuba and Venezuela, through the establishment of strategic actions
associated with political, economic and military leadership to guarantee the presence
and control of the communist system in the region [9].
That, according to Antonio Gramsci, is the reflection of the social protest against
the disproportionate intervention of the State through its Armed Forces, which causes
the socialist revolution in the world [10].
Regional Scope Latin America is considered the most violent region in the world, as
well as the one with the greatest social inequality, where the gap between the richest
and the poorest is highly disproportionate, thus demonstrating a poor redistribution
of wealth.
The emergence of new actors associated with illegal mining, drug trafficking and
related crimes, along with corruption through transnational operations such as the
Lavajato or Odebrecht scandal [11], highlights the multidimensionality of crimes in
the present. It evidences the agenda of mafias and associated groups that use the fifth
geopolitical element “cyberspace” [7] as a highway to achieve their dark interests.
In Latin America, the situation does not differ from the other continents, given the
uncertainty, the fragility of political, ideological and commercial initiatives that have
been fractured by global economic instability. The existence of many cooperation
spaces in different fields such as ALBA-TCP, CAN, CELAC, UNASUR, PROSUR,
MERCOSUR, among others, that have not landed in a shared consensus shows the
lack of interest and commitment of the States for maintaining a South American
identity. The countries of the region are currently experiencing problems of similar
characteristics, where social organization prevails through demonstrations and claims
to the current regimes. However, there have been cases of extreme violence used by
insurgent cells whose revolutionary ideology is associated with certain extremist
groups. Nevertheless, they are isolated incidents that cannot be generalized; proof of
this are the following cases in the Andean region:
In Colombia, President Iván Duque promulgated various economic and social
measures that generated great popular discontent, wage and pension reform affected
the youngest. Likewise, the distress escalated due to the breach of the agreements
Social Mobilizations as a Silent Instrument for Seizing Power … 533
of the year 2018 regarding public education and investment in Colciencias (entity
responsible for providing scholarships and research in the country). Finally, for the
right to protest and for excessive of the non-lethal force of the police that is designed
to carry out riot operations (ESMAD), in past marches of university students before
the embezzlement of more than 11 billion pesos by the university education author-
ities. On November 21, the Unitary Central of Workers (CUT) summons a national
strike that had great repercussion and included widespread vandalism. The discon-
tent and unemployment arise against alleged government measures, the application
of the “security and defence policy” and the death of 8 minors in a military opera-
tion, which at the beginning of the month led to the resignation of the Minister of
Defence, Guillermo Botero [12]. Given the violence on Thursday, November 21, the
government decreed the curfew in Bogotá, the capital of the country. The year 2019
closes with a GDP growth of 3.3% year-on-year, above the regional average.
In Peru, President Martín Vizcarra dissolved the National Congress on Septem-
ber 10, 2019, and advanced the parliamentary elections on January 26, 2020 [13]. In
response, the National Congress dismissed him, appointing Vice President Mercedes
Aráoz instead. There were protests and clashes with the police, in support of pres-
idential continuity. The National Police and the Commander in Chief of the Army
spoke in favour of presidential stability. Vizcarra remains with a high level of pop-
ularity because it has promoted a fight against corruption, contrary to the National
Congress that faces the rejection of almost 90% of citizens.
Chile is the country with the most extended duration of the crisis period, which
originated on October 18 following the increase of 30 pesos in the metro ticket, a
measure that was later withdrawn. The middle-class stars in protests in a country
where poverty went from 34.7% in 1987 to 11.7% in 2018; however, Chile is one
of the 15 most unequal countries in the world. The pension system, the costs of
education and the privatization of primary resources (electricity, water and gas) are
the factors that drive the uncertainty of the precarious middle class. At the moment,
the exit to the crisis is sought by the side of a Constitutional Reform. The so-called
Agreement for Social Peace and the inadequate management of the crisis by the
government has encouraged the prolongation and massiveness of the protest [14].
In Bolivia, Evo Morales ignored the result of the referendum of the year 2016
and presented himself to a fourth term, committing fraud to avoid the second elec-
toral round in which he would be defeated. There was a widespread popular revolt,
demanding his resignation. Then, Morales asked for international support and went
into exile to Mexico two days later. From here on out a power vacuum arose, barely
covered by a weak transitional government, who by agreement with the legisla-
ture called elections for 120 days without Evo Morales as a candidate. In the entire
regional process, he is the only President who resigned [15].
Local Scope For our country, the situation is complicated, the economic growth of
2019 was close to 0% year-on-year, while the country is heading to enter the Pacific
Alliance and to meet very demanding productivity and sustainability standards [16].
The main concern is the resolution of internal problems, after the October crisis,
where thousands of people protested against Decree 883 [17], which, according
534 L. Recalde et al.
to them, eliminated fuel subsidies, as part of the agreement reached between the
Ecuadorian government and the International Monetary Fund [18].
The so-called crisis is not only based on the reduced thinking of the product of
the Sao Paulo Forum, but of other actions that have the particularity in each State,
and in the case of Ecuador, the incidence of new social actors that have caused
the democratic fragmentation in Latin America. It is a regional relevance issue that
should be analysed in depth within the influence of the States [19].
On October 13, President Lenin Moreno repealed Decree 883 at a dialogue table
[17]. Among the events that took place during the protest, the relevant ones were:
the burning of the General Comptroller’s Office of the State, where the judicial files
on corruption acts of Correa administration [20], and the attacked to Teleamazonas
facilities in Quito by a group of vandals [21]. During the protests, organized violent
actions were evidenced, to challenge the State, threatening public order and citizen
security. Groups contrary to the regime called for the President of the Republic to
resign, evidencing an attempted coup d’etat. The information war was of various
kinds.
The participation of the Armed Forces in the October 2019 crisis was decisive,
effectively fulfilling the military objective imposed by the political party, based on
constitutional norms and preserving the security of the population and resources.
The actions that derive from the use of the Armed Forces were framed to the strict
fulfilment of Human Rights and national and international protocols, within contrary
actions by protesters that led to chaos, where it was intended to delegitimize and
provoke the State, taking advantage of the social upheaval [22].
Based on the information provided by the Ministry of Government [23], the actors
of the escalation of violence during the last national strike, completed five phases,
clearly established as they are: (1) Start of the transport guild protests [24]. (2)
Declaration of the State of exception by CONAIE [24]. (3) Escalation of the crisis:
increased violence. Attack on military barracks of La Balbina, San Jorge, University
of the Armed Forces [25]. (4) Kidnapping military, police, provincial and cantonal
authorities, the fire of the State (Comptroller) and Private infrastructure (Teleama-
zonas and El Comercio) [25]. (5) The outcome, where the negotiation took place
through the OAS [26].
It theorizes the rejection of the capitalist world that considers it intolerable because
it destroys humanity. The revolution is not in the seizure of the State, but rather in
the daily acts of rejection and organization against capitalist society, which is called
anti-power [27]. Among the most remarkable ideas of this theory, we have:
Social Mobilizations as a Silent Instrument for Seizing Power … 535
1. The scream: It is the fury externalized against the system and the dominant social
forms. It is the recognition of an alternative.
2. Power-over: It is what dominates and subjugates the human creative possibility.
The State, as a power-over, is a capitalist form of domination and, therefore,
unable to become the middle of the revolution.
3. Power-to: It is the creative human power (Potentia). Recover the centrality of
human doing against the world that denies this human doing.
4. Identity, non-identity and subjectivity: Identity is something that the capitalist
social system imposes on people to assign them a function and thus establishes its
power-over. Holloway observes that power-to is a force that could be identified
within non-identity. Thus, for Holloway, subjectivity manifests itself in non-
identity.
Application Starting from the analysis of the use of Holloway’s theory during the
strike in Ecuador, it can be inferred that they used the theory of the scream, when
manifesting widespread popular discontent and asking for an alternative to Decree
883. The measures taken by the State impose power over, as a capitalist form of
domination; therefore, the protesters requested the centrality of human activity to be
recovered as a reference object of the State. These actions were also used in Colombia,
Chile and Bolivia, among the various social sectors (indigenous, workers, students,
etc.). It was against the government, through demonstrations attributed that the State
does not give them an identity, because it limits their actions and imposes power over
the people with these common measures in the Andean region especially.
The application of the theory of revolution and social emancipation is materialized
in the planning and execution of public and private meetings to convene marches and
mobilizations at local and national levels. Likewise, the use of active non-violence
and obedience to leaders in demonstrations to have the expected success was the
common factor since they contributed to the taking of their planned objectives based
on actions in some peaceful cases.
The groups led by the indigenous leaders employed actions duly agreed with the
leaders, to cause fear in people who do not directly support the mobilizations, through
the suspension or fine for the use of essential community goods and services. Acts
that promoted disobedience of the protesters against the legitimate State authority,
in the conspiracy of its leaders and sowing chaos.
The author embodied in his book “The non-violent political struggle: criteria and
methods” that raises the use of citizen power to counteract a conflict that affects them,
as a way to resist that they consider dictatorships and to cause weakening of a regime.
The theory of non-violence is based on two premises: the first, active non-violence
as an instrument of struggle and social mobilization; and second, the entire power
structure is based on the obedience of the subjects to the orders of their leaders [28].
536 L. Recalde et al.
Under the first premise non-violent action is divided into three stages: protest
and persuasion (symbolic actions), non-cooperation (customer boycotts); and the
intervention (disturb the natural development, take entities and carry out blockages).
According to the second premise, every power structure is based on the obedience
of the subjects to the orders of the leaders. The individuals recognize that they are
the source of state power; by rejecting obedience, its leaders will be left without that
power. The use of violence as a form of repression by the State in the face of non-
violent resistance contributes to the reduction of its power, authority and legitimacy
[28].
Application Carrying out the analysis of the use of Sharp’s non-violent action theory
is evidenced in the rejection of citizenship to the government for economic measures
due to the impact on the family economy. For 11 days, the citizens carried out
daily acts of rejection of non-violent action against government measures indicating
that they were capitalist measures and affected the most impoverished sectors. The
common factor in the mobilizations was protest and persuasion, as Sharp points out,
with symbolic actions revealed in mass meetings, especially in Quito, subsequently
applied nationwide.
General actions were combined in the indigenous communities associated with
non-cooperation and generating acts against consumers to achieve better results and
trying to avoid the supply of products. The intervention: actions to disrupt the normal
development of activities such as the taking of governments, strategic areas, essential
services and road blockades. Finally, they identified that the strength of the State
rests in the FF. AA and PP. NN and that these could not be used violently with lethal
weaponry.
Nye developed the concept of “Smart Power” or intelligent power, which is the
use of a mixture of hard power (coercion and purchase) and soft power (attraction
and persuasion) in the strategies used by the States to obtain their objectives. This
concept has been applied in international relations to analyse the scope of the powers
and their influence on the global system. The difference between soft power and
intelligent power is that the first one can be harmful or beneficial depending on how
it is used, while the second evaluates the application of soft power, thus improving
the effectiveness of the strategy applied [29].
Based on the ideas expressed by Nye, it is difficult to establish an agreement
that power over man is always distinguishable from the one over things, for this
social power is a thing or its possession is a relationship between men. Likewise, he
recognizes that none of the types of power can solve all problems. However, there
are two countries that align with the forms of power described: USA (hard power)
and China (soft power and intelligent power) [29].
Social Mobilizations as a Silent Instrument for Seizing Power … 537
Application It is important to highlight that in our analysis this theory has a logical
application in international relations; it can be argued that the groups involved in the
demonstrations used soft power actions to persuade both the non-involved population
and the government actors themselves and thus obtain their objectives. Also, it is
presumed that they allowed personal infiltration that carried out violent actions such
as the use of hard power.
Similarly, the use of soft power by the powers in the countries in question can be
adduced, not necessarily to overthrow governments, but to discredit internationally
governments that are aligned with their rival powers. This was evidenced in TV
channels such as TeleSur and Russia Today that showed the demonstrations from the
streets and Protestant groups.
8. Reform the National Electoral Council, and enact a law for the formation of polit-
ical parties and movements under the fulfilment of strict and verifiable require-
ments, for which a close link must be maintained with the relevant State agencies,
especially in economic and legal matters.
1. Make amendments to the Constitution that support the actions of the Armed
Forces in the area of insurgency.
2. Include the terminology relevant to the insurgency in the Comprehensive Organic
Criminal Code to support the prosecution of cases.
3. Update the Public and State Security Law, and other legal instruments with the
new insurgency terminology.
4. Modifications to the Public and State Security Law and the Comprehensive Crim-
inal Code are required to support the actions of the Armed Forces in compliance
with its constitutional mission.
5. Redefine the role of the Armed Forces since according to the Republic Constitu-
tion, they have the mission to defend the sovereignty and territorial integrity of
the State and the internal sphere that is the responsibility of the National Police.
Starting from the logic that education provides identity to the people. Based on the
reality that our country lives, the evident crisis of values that has an impact on the
disrespect for the laws, rights and obligations of citizens, provoking a high rate of
violence, intolerance of authority, people and nature, in this context the following
proposals should be included:
1. It is necessary to perform an analysis to identify the variables of social fabric
breakdown in the country and thus implement appropriate actions, mainly in the
educational field.
2. Empower the sense of belonging of society, through the promotion of values,
principles and national identity at all educational levels.
3. Foster military, civil relations, through the application of institutional, edu-
cational projects in areas such as development support and voluntary student
military training and resistance forces.
4. Redesign the curriculum of the entire Ecuadorian education system (primary,
basic, third and fourth levels), where the subjects of moral and civic, national
and ethical reality are resumed, to provide students with a baseline for their
training as good citizens.
Social Mobilizations as a Silent Instrument for Seizing Power … 539
1. The State does not own or implement the concept of critical infrastructure;
therefore, it is necessary to translate this concept into the legal regulations of
the security and defence sector. Likewise, the survey and detailed cataloguing
of the critical infrastructure (physical and digital) of the State must be carried
out to update and prioritize security, control and monitoring.
2. FFAA fulfils the mission of protection of the reserved areas, having to verify
the zones and areas that need to be included so that contingency plans will be
activated with public institutions (GAD’S) and civil society actors.
3. Create a doctrine, to face social crises in the internal area; as well as the inclusion
of military training and training at a strategic and operational level for the use
of Armed Forces in the internal sphere.
4. Strengthen the intelligence system (CIES) and its subsystems (military and
police intelligence), especially in the analysis, acquisition and timely dissemi-
nation of strategic intelligence.
5. Reduce the incidence of external threats through the implementation of interin-
stitutional strategies and address threats of an inner nature through policies that
involve public institutions.
6. Project the image of the Armed Forces outside the scope of force, coercion and
violence, working in cooperation with the actors of the society and not on them.
7. Update the White Paper on Defence and redefine the real threats and risks to
generate doctrine and planning at the strategic military levels, with a strategic
vision of the danger.
8. Propose to the Legislative the reforms to the Laws referring to the Progressive
Use of Force as well as the use of lethal armament in case they exceed the
escalation of the crisis and become acts of terrorism motivated by the insurgency.
This legal framework will protect the actions of the Armed Forces and the
monopoly of the use of force to safeguard the infrastructure of the State, maintain
and preserve the social order, the law regulating the life of the State.
9. Update the Military Defence Directive that integrates the new threats and allows
increasing the training of the Armed Forces with techniques used in other
countries, the principle of CRISIS MANAGEMENT to prevent escalation.
10. The capabilities of the Armed Forces have to be strengthened through the assign-
ment of economic resources by the State to equip the Armed Forces with arma-
ment and AC equipment to face the social crisis and new threats. It also has to
consider the acquisition of weapons of mass neutralization, drones, for example,
sound cannons used in Spain, among others.
11. Promote the development of the relationship of the Armed Forces with the com-
munity in the educational, technological, research and social fields, to maintain
the image of the Armed Forces cohesive with civil society (recover the leaders’
seedbeds that were the COMILES, to recover institutions of higher education
like the ESPE—IAEN). The reserve is a crucial strategy to win followers and
also the resistance forces.
540 L. Recalde et al.
12. Urgently implement the active and passive real cyber defence project to avoid
being the target of cyber tacks, hacks, fakes news, social networks of false
information that flooded with the uneasiness of the population.
13. Cohesion members of the Armed Forces and detach infiltrated corrupted mem-
bers (FFAA clearance); improve recruitment and selection processes to enter
the Military Schools for training both officers and troops, analyse the gratuity
to have more suitable personnel based on profiles.
14. Update and approve the Armed Forces personnel directory to have staff with
the appropriate profile.
15. Analyse the creation of defence in social networks and trends (trolls, cyber-
war) to face media power. This organization should be formed by sections
anti-cyber-attacks, social network management, hackers, video surveillance,
drones, electronic warfare passive, knowledge of the organization of the threat,
signal blockers (inhibitors), anti-fakes (information operations), interception,
cancellation of false accounts, source validation, cybersecurity, among others.
While the fragility of the world economy can be mainly attributed to deliberate
political decisions, it also reflects more considerable structural changes, according
to the perspectives report. Digitization is transforming business models, while climate
and demographic changes are already altering existing activity patterns [24].
Countries must develop fiscal incentives to achieve greater equality and to encour-
age the middle class to maintain more financial assets. They should also implement
higher inheritance taxes for the very rich, improve free public education and establish
electoral campaigns financed with public funds.
For our Ecuadorian case, the following strategies should be included:
1. Implement an alternative solution that involves all citizens, both in the public
and private contexts. Understanding that economic measures are not a whim of
the government, but is the necessary and immediate solution that is required to
put a stop to the current weak economy.
2. The Ecuadorian fiscal situation is difficult, especially with the existing structure
of public debt (with high interest and short payment terms). In this sense, new
fiscal devaluation measures must be proposed, for which the involvement of the
people with the national government is required to recover the pace of economic
growth.
3. Achieving a financial balance will mean giving into the demands of the popula-
tion, especially on incentives to increase competitiveness for exporters and their
alliances, as well as for small- and medium-sized businesses, to strengthen tax
issues, reduction of procedures, and facilities for hiring staff.
4. The Ecuadorian economy cannot continue to sustain itself at the cost of a higher
level of indebtedness. Therefore, a fiscal consolidation program that is gradual
Social Mobilizations as a Silent Instrument for Seizing Power … 541
and credible is required to optimize public spending and increase spaces for
private investment, especially with public–private alliances.
5. In addition to having a strict policy of economic austerity, except for priority
fields such as health, education, energy and security, the most feasible solution
will be the involvement of private company participation, as well as increased
exports of no oil products.
6. The increase in competitiveness and a higher opening of markets for exports is
an urgent and priority matter, so the elimination of the advance to the income
tax (IR) should be analysed, since the aspect will benefit especially agricultural
sectors such as the cocoa and coffee sector.
7. The participation of Ecuador within the international context should be strength-
ened with its presence in the Pacific Alliance, not only for commercial benefits,
such as customs cooperation, zero tariffs and free mobility of goods and services
but also for financial integration, which will allow accessing the bond regional
catastrophic risk management for mitigating the impact of natural disasters on
public finances.
5 Conclusions
Within the international context, there is a common problem, “the economic one”,
whose particularity expands towards Latin America and Ecuador. The high indebt-
edness of the States requires governments to execute structural adjustment policies,
being forced to finance loans to pay the interest generated or part of the debt, becom-
ing cyclical and impossible to solve. However, these decisions can be tough for the
general public.
As demonstrated in Latin America, despite presenting different solution strategies,
the massive demand of the citizens for the antipopular measures, for the abuse of
power and the freedom of expression remains. Manifestations that, based on the
ideologies and proposals by the authors mentioned above, could be found aligned as
a whole. It should be mentioned that the origin of the claims depends exclusively on
the national identity, evidencing that the Andean societies are fractured.
In Ecuador, the indigenous component was the majority, with a strong organiza-
tional and assembly tone. The indigenous movement, loaded with naivety, was pen-
etrated by the correísmo that mounted their interests inside the mobilization without
bearing the overall weight of the protest.
In the region, the rulers who no longer belong mostly to the political line of the
previous extended and stable democratic processes tend to organize their cabinets
with experienced people. However, some political-ideological lags remain, which
keeps latent the look of citizens who expect a radical change from their presidents.
The crisis experienced by the left, especially in Ecuador, contributed to the ideological
fracture of the people, who look with uncertainty at the behaviour of their leaders
and what leads to un-governability in the countries of the region.
542 L. Recalde et al.
References
1. Revilla, M., González-Gil, A.: Presentación. Política y Sociedad 56(1), 15–19 (2019)
2. Pleyers, G.: Movimientos sociales en el siglo XXI. Primera Edición. Colección Democracias
en Movimiento, Buenos Aires (2018)
3. García-Linera, Á.: Crisis del Estado y Poder Popular. New Left Rev. 37, 66–77 (2006)
4. Gutiérrez, A.: Momento VUCA: volatilidad, incertidumbre, complejidad y ambigüedad (2017)
5. Bavaresco, A.: La crisis del estado-nación y la teoría de la soberanía en Hegel. Recerca 1,
55–80 (2003)
6. Castells, M.: Globalización, Estado y sociedad civil: El nuevo contexto histórico de los derechos
humanos. Isegoría 22, 5–17 (2000)
7. Moncayo, P.: Geopolítica Espacio y Poder. Universidad de las Fuerzas Armadas ESPE, Ecuador
(2016)
8. BBC News Mundo: 7 preguntas para entender qué es Estado Islámico y de dónde surgió (2016)
9. Palomino, W., Cerón, A., Barreto, R.: Geoeconomía nuevas amenazas a la soberanía
hemisférica. Centro Regional de Estudios en Estrategia y Seguridad, Colombia (2019)
10. Gómez, N.: El concepto de Hegemonía en Gramsci: Una propuesta para el análisis y la acción
política. Revista de Estudios Sociales Contemporáneos 15, 150–160 (2016)
11. BBC News Mundo: Lo que se sabe de la enorme red de sobornos de la compañía Ode-brecht
en 10 países de América Latina Homepage (2016)
12. Zamora, H.: Tres claves de la caída del Mindefensa. https://www.eltiempo.com/justicia/
investigacion/analisis-por-que-renuncio-el-ministro-de-defensa-guillermo-botero-431216
(2019)
13. BBC News Mundo: Disolución del Congreso en Perú: 4 claves para entender el enfrentamiento
entre Vizcarra y el Parlamento (y lo que puede pasar ahora) (2019)
14. BBC News Mundo: Protestas en Chile: 4 claves para entender la furia y el estallido social en
el país sudamericano (2019)
15. BBC News Mundo: Informe de la OEA sobre Bolivia concluye que hubo “manipulación y
parcialidad” en los comicios del 20 de octubre (2019)
16. ASOBANCA: Boletín Macroeconómico - junio 2019, 1–20 (2019)
17. BBC News Mundo: Crisis en Ecuador: el histórico poder de los grupos indígenas (y qué buscan
con la gran marcha de este miércoles en Quito) (2019)
18. RT.: Gobierno e indígenas de Ecuador acuerdan derogar el decreto que eliminaba los subsidios
a combustibles y detener las protestas (2019)
19. El Comercio: Maduro habla de las protestas en Ecuador y Chile y hace referencia al Foro de
Sao Paulo: ‘Vamos mejor de lo que pensábamos (2019)
20. Teleamazonas: Las instalaciones de Teleamazonas en Quito fueron atacadas por grupo de
vándalos (2019)
21. Teleamazonas: Un grupo de manifestantes invadieron la Contraloría General del Estado (2019)
22. El Universo: Ministerio de Defensa de Ecuador anuncia ‘directiva’ contra insurgencia (2019)
23. El Comercio: Ministra de Gobierno entregó a la Asamblea informe preliminar sobre pro-testas
(2019)
24. Primicias: Ecuador sufre una escalada de violencia y aún espera el diálogo (2019)
25. OEA.: CIDH Presenta observaciones de su visita a Ecuador (2020)
26. Infobae: La OEA respaldó las negociaciones entre el gobierno de Lenín Moreno y los indígenas
para resolver la crisis en Ecuador (2019)
27. Holloway, J.: La teoría de la revolución de John Holloway y la dialéctica del zapatismo (2002)
28. Gene, S.: La lucha política no violenta: criterios y métodos, 1st edn. Chile América CESOC,
Chile (1988)
29. Añorve, D.: Más allá del poder suave, del poder duro y del poder inteligente: la resiliencia
ecológica y humana como fundamentos del poder. Revista de Relaciones Internacionales de la
UNAM 26 (2016)
The Armed Forces as a Immediate
Response State Institution and Its
Participation as an Articulator
in the Risk Management in Ecuador
Abstract The Ecuadorian Armed Forces have their constitutional mission as indi-
cated in Art. No. 158 of the Constitution of Ecuador. Its human conformation, its
technological resources, its equipment and training provide special features such
as flexibility, opportunity, scope, speed and efficiency, which all are essential when
reacting to a risk situation. As a support and reaction institution to deal with hazards
and risks in the national territory in front of multiple existing scenarios, the Army pro-
vides experience, equipment and capabilities in the field of risk management. With
this base, the military plans are elaborated next to other state institutions respon-
sible for the prevention, reaction and mitigation of the effects produced by natural
and anthropic disasters. The last high-magnitude earthquake occurred on April 16
of 2016, allowed to identify the need to know the components of the State based on
possible natural hazards. The way to exploit the resources of these components and
their distribution in case of emergencies in natural scenarios has been decisive, prior
to a decision-making process that optimizes mitigation work of damages. Finally, the
Armed Forces at present collaborate with their contingent in the creation of databases
on information collected during emergencies, in order to transmit it as inputs as a
pertinent corrective measure and perform it into doctrine and plans that facilitate
logistical displacement and mobilization of a large military contingent guarantying
the security of the population.
1 Introduction
In Ecuador, support against disasters of natural origin has its foundation from the
creation of its Armed Forces, with a basically decisive non-preventive behavior. Their
© The Editor(s) (if applicable) and The Author(s), under exclusive license 545
to Springer Nature Singapore Pte Ltd. 2020
Á. Rocha et al. (eds.), Developments and Advances in Defense and Security,
Smart Innovation, Systems and Technologies 181,
https://doi.org/10.1007/978-981-15-4875-8_47
546 V. Yépez et al.
employment is a reactive response to the crisis as a result of the disaster, rather than
in their anticipation, as this is an issue of other state institutions.
Until the 50s of the last century, Ecuador lacked of a specialized institution to
deal with the issues that affected the population by disasters of natural origin. In
1941, the Ecuadorian-Peruvian war forced to evacuate the habitants of the border
and take refuge farer away from the conflict, causing alteration in the lives of the
mobilized people [1]. Little later, the Pelileo’s earthquake of 1949 left some 6000
victims [2, 3]. With both experiences, in 1960 the National Defense Law was issued
with the assignment of responsibilities to an institution called Civil Defense, which
has been attached to the Military Sector, having a vision of preventing situations
arising from an international war [4]. In 1964, the National Security Law was issued,
in which the National Civil Defense System was organized and linked to the General
Secretariat of the National Security Council, the latter as a permanent advisory body
and dependent on the Presidency of the Republic, whose leadership falls to an active
duty officer, in the rank of General of the Armed Forces [5].
The process to institutionalize a disaster prevention and care agency has been
very extensive, which has led that in 1973 the National Civil Defense Directorate was
created, being in charge of training the population and reacting to an adverse event, in
coordination with the National Mobilization Directorate [6]. Although the authorities
have been civil and military, they were chaired by an officer of the Armed Forces.
With time management becomes decentralized through the Citizen Security, while
the Civil Defense boards at the parish and cantonal level, allocating mobilization and
security functions with members of the Public Force within the national territory. In
the National Security Law of 1996, its mission is determined in article No. 82 as “a
permanent service activity of the State in favor of the community.” It also mentions
that it coordinates the measures “to allow the continuity of the administrative and
functional regime in all orders of activity” [7].
Due to the political changes in the southern hemisphere, Ecuador modified its
constitution in 2008 [8], which subsequently created a “Decentralized National Sys-
tem of Risk Management” (SNDGR) having as an executive body the Secretariat of
Risk Management (SGR), whose authorities are civil citizens performing the relevant
coordination with the Armed Forces in cases of emergency and national commotion,
such as the volcanic crisis of Cotopaxi volcano in 2015 or by the Earthquake on
April 16, 2016 [9–13]. Within the same time frame, in 2011 the Integrated Security
Service ECU911 was created, being a technological tool, which integrates the emer-
gency services provided by fire departments, the Armed Forces, the National Police
and Institutions that compose the National Health System [14].
Currently, the SGR modified its structure through the Executive Decree No. 534
of October 3, 2018, converting into the National Risk and Emergency Management
Service [15, 16]. In addition, the Committee of the National Risk and Emergency
Management Service is created, which shall be permanently formed by the chair-
ing President of the Republic or his permanent delegate, the National Secretary of
Planning and Development or his permanent delegate, the Minister of Urban Devel-
opment and Housing or his permanent delegate, the Minister of National Defense or
its permanent delegate and the Minister of Economy and Finance or its permanent
The Armed Forces as a Immediate Response … 547
delegate. As noted, the importance of keeping the Armed Forces linked to risk man-
agement is due to national objectives and strict compliance with the Constitution of
Ecuador.
figure with such competence is explained. However, a further issue arises when the
emergency exceeds the capacity of resources of any kind of the organism. What
happens? Is support sought in other state institutions? Is help sought in interna-
tional organizations? Hence, the armed arm of the State becomes involved in the
organization, planning and execution of risk management activities.
The Armed Forces constitute the executing arm of the security and defense policies
that the State plans. Therefore, the use of the Armed Forces is the very use of state
resources to anticipate, confront, remedy or mitigate the hazards and risks that poten-
tially influence or alter the Nation. The Ecuadorian Armed Forces have a particular
organization to fulfill their missions, assigning responsibility areas corresponding
to the magnitude of the employment units, so that a platoon may have under its
competence a parish and a division to be in charge of a set of provinces. Accord-
ingly, the organization of the Armed Forces requires that its lines of command and
communication be vertical (from larger to subordinate units and vice versa) and also
horizontal (between units of similar magnitude). In the same way, the planning has
levels adequately distributed by its areas of influence, as follows: The strategic level
refers to the national level (Armed Forces), the operational level to the province or
similar scope (division and brigade) and the tactical level to the scope of cantons or
parishes (battalion, company and platoon). Each level is important for the parameters
they evaluate, being the tactical level the one that has the greatest demand for the
details of execution and the strategic level for obtaining resources to allocate in the
subordinate levels. In this sense, institutional planning is related to inter-institutional
planning with the Committee of the National Risk and Emergency Management
Service. The Armed Forces also consider: “Self-protection against emergencies and
disasters, both in relation to the care of the staff of the Institution and its assets; and,
inter-institutional coordination for the management of external risks in relation to
the analysis, reduction, response and recovery, within its scope of action.” [37].
Article No. 158 of the Constitution of Ecuador mentions the fundamental mission
of the Armed Forces verbatim: “The Armed Forces have as a fundamental mission
the defense of sovereignty and territorial integrity,” establishing an explicit task.
The state of exception conceived as “a legal, constitutional and political mechanism
that allows the restoration of public order in extraordinary circumstances in order
to guarantee constitutional rights, democracy and the rule of law” [38]. Under the
The Armed Forces as a Immediate Response … 549
decree of a state of exception, the President of the Republic authorizes the use of
the Armed Forces in the terms set forth in the Constitution, in accordance with the
provisions of articles No. 164 and 165. It follows that his employment in supporting
risk management, as a complementary activity, but no less important. Therefore, they
continue to fulfill their fundamental mission, while contributing to the missions of
other State agencies.
The Public and State Security Law, in its art. 34, “Of the coordination in case
of natural disasters,” indicates: “The agency responsible for Civil Defense will act
in coordination with the decentralized autonomous governments and civil society,
will also have the support of the Armed Forces and other agencies necessary for
the prevention and protection of security, will implement prevention and mitigation
measures necessary to face them and minimize their impact on the population” [39].
The Armed Forces, immediately after issuing the Executive Decree of a state of
emergency, implement the plans to support risk management, transforming them
into operations orders. The mobilization of military personnel is arranged according
to strategic planning, without neglecting their fundamental mission.
During the post-earthquake process of the emergency of the Pedernales Earth-
quake of 2016, the Armed Forces participated mainly in the working group No. 5
“Integral Population Security” organized by the SGR. However, as previously men-
tioned, the logistics and training of military personnel empowered them to collaborate
in all the working groups. Hereby, Table 1 lists a summary of the actions performed
during and details of their participation in the SGR working groups.
In order to operationalize the tasks deducted from the mission imposed [40], the
following stages are established:
1. Action and response: with the subtasks of security and control of the population
and resources; search, rescue and evacuation; safety of vital areas and strategic
points; water and food distribution.
2. Remediation: with the subtasks of security and control of the population and
resources; search, rescue and evacuation; safety of vital areas; collection and
distribution of humanitarian aid; production and distribution of water; dam-
age assessment; removal of debris; shelter implementation and administration;
medical care and sanitation.
3. Return to Normality: with subtasks of transition of responsibilities to State
institutions and other support agencies; reconstruction support; development of
scientific research in all areas of earthquake influence.
Responsible planning in the fulfillment of the constitutional missions by the
Armed Forces has been the main motives in the presence of the State in the most
distant areas of the Country. Within this framework, security and development sup-
port activities have been those that have defined the aspects of relief and assistance
550 V. Yépez et al.
Table 1 Armed Forces participation in the technical working groups in the SNGR
W.G.W. G. Technical Working Group Actions executed
working group
1 Water access and distribut Water purification systems
ion
2 Health, sanitation and hygi Armed Forces mobile surgical hospital,
ene promotion medical staff
3 Infrastructure, reconstructio Initial risk assessment
n and rehabilitation Debris removal, topograph
ic surveys, rescue support,
water purification
Demolition of structures at
risk
Reconstruction of main and
alternate roads, landslide
cleaning
4 Comprehensive attention to Platform construction, shelt
the population er installation, repair and
replacement of basic
services infrastructure
Hostels and shelters
avtivated
5 Comprehensive population security Search and rescue, hostel
security, strategic sectors,
standing and mobile
hospitals
Land, air and maritime tran
sport of humanitarian aid a
nd distribution of humanitar
ian aid
6 Productivity and livelihoods Security patrols,
management and security
of collection centers
7 Education, culture, heritage Community protection and
and environment the removal of effects on
the educational structure
8 Strategic sectors Supervision of the hydroca
rbon sector (heavy oil pipel
ine, refineries, dams and
reservoirs)
in the national coexistence newspaper and provide a link between the citizen and the
government.
The Armed Forces have specialized military units for technical and special support
for operations. These military units conduct missions in times of peace and war,
which allows integration into national risk management systems during emergencies
[41]. The Army Corps of Engineers (CEE) as the main executor of civil, road and san-
itary works, providing technical support to military operations in terms of mobility
(roads, airports, heliports and seaports), counter mobility (demolition and destruction
The Armed Forces as a Immediate Response … 551
The scientific technical work deployed by the Armed Forces [42] allows to identify
the following characteristics for its use, such as:
• It is essential to have self-sustaining military units.
• The logistics of military personnel must be individual and try to keep a supply of
food rations that allow them to remain in the sector for the necessary time until
they receive supplies, as the affectation of the zone produces the collapse of the
basic services.
• The digital, cartographic and satellite information provided by the IGM is essential
for the planning and development of operations.
• Technical military units must remain at the forefront of technology and science
to provide the required support in operations in the decision-making process.
• Population security, public service facilities and strategic facilities are the priority
for the Armed Forces.
• The plans must be verified periodically, as the conditions change eventually by
the obtained information.
• The stop periods for the employed personnel improve the performance, since the
situations of psychological and physical pressure in the operations of support to
the risk management have a high level of requirement.
• Keeping informed, the military personnel employed reduces the anxiety caused
by situations of danger and risk in the tasks of support to risk management.
• The information needs to be inter-agency and timely as efforts must be directed
toward common objectives.
• Military personnel and those of risk management support entities, they cannot
be considered as victims, in order to prioritize support for people affected by
disasters.
552 V. Yépez et al.
• Military logistics do not have a specific destination for risk management support,
hence the importance that government agencies have the means and resources for
risk prevention and remediation.
• The aircraft of all State entities must be arranged as a whole to avoid gaps in the
distribution and transportation of logistics and support personnel.
• International and private cooperation is essential; it should be emphasized because
the relations that are maintained with the UN and the OAS strengthen the SNGRE.
Therefore, humanitarian action is integral.
5 Conclusions
References
1. Bowman, I.: The Ecuador-Peru boundary dispute. Foreign Aff. 20, 757–761 (1941)
2. Ramírez, J.E., Semanate, A.D.: The earthquake of Pelileo, Ecuador, August 5, 1949 (abstract).
Earthquake Notes, Washington 22 (1951)
3. Sarmiento, F.O.: Geomorphology of natural hazards and human-induced disasters in Ecuador.
Dev. Earth Surf. Processes 13, 149–163 (2009)
4. Direccion Nacional de Defensa Civil, Defensa Civil: ¿Qué es?. ¿Cómo actúa?, Fenómenos
Naturales. Comunicación Social—DNDC, Quito, Ecuador (2000)
The Armed Forces as a Immediate Response … 553
5. Vélez, F.R., Santana, K.B.: Political intelligence and national security in Ecuador: a retrospec-
tive reading. J. Power Polit. Gov. 2(3&4), 115–133 (2014)
6. Hanratty, D.M. (ed.): Ecuador: A Country Study, vol. 52. US Government Printing Office
(1991)
7. Presidencia de la República del Ecuador: Ley de Seguridad Nacional. Dirección Nacional de
Movilización, Quito, Ecuador (1996)
8. Martínez Dalmau, R.: Democratic constitutionalism and constitutional innovation in Ecuador:
the 2008 Constitution. Latin Am. Perspect. 43(1), 158–174 (2016)
9. Toulkeridis, T., Arroyo, C.R., Cruz D’Howitt, M., Debut, A., Vaca, A.V., Cumbal, L., Mato, F.,
Aguilera, E.: Evaluation of the initial stage of the reactivated Cotopaxi volcano—analysis of
the first ejected fine-grained material. Nat. Hazards Earth Syst. Sci. 3(11), 6947–6976 (2015)
10. Toulkeridis, T., Zach, I.: Wind directions of volcanic ash-charged clouds in Ecuador—
implications for the public and flight safety. Geomat. Nat. Hazards Risks 8(2), 242–256
(2017)
11. Toulkeridis, T., Chunga, K., Rentería, W., Rodriguez, F., Mato, F., Nikolaou, S., Cruz D’Howitt,
M., Besenzon, D., Ruiz, H., Parra, H., Vera-Grunauer, X.: The 7.8 Mw earthquake and tsunami
of the 16th April 2016 in Ecuador—seismic evaluation, geological field survey and economic
implications. Sci. Tsunami Hazards 36, 197–242 (2017)
12. Toulkeridis, T., Mato, F., Toulkeridis-Estrella, K., Perez Salinas, J.C., Tapia, S. and Fuertes,
W.: Real-time radioactive precursor of the April 16, 2016 Mw 7.8 earthquake and tsunami in
Ecuador. Sci. Tsunami Hazards 37, 34–48 (2018)
13. Toulkeridis, T., Porras, L., Tierra, A., Toulkeridis-Estrella, K., Cisneros, D., Luna, M., Carrión,
J.L., Herrera, M., Murillo, A., Perez-Salinas, J.C., Tapia, S., Fuertes, W., Salazar, R.: Two
independent real-time precursors of the 7.8 Mw earthquake in Ecuador based on radioactive
and geodetic processes—powerful tools for an early warning system. J. Geodyn. 126, 12–22
(2019)
14. Servicio Integrado de Seguridad ECU 911, Informe de rendición de cuentas 2015, Quito: SIS
ECU911 (2015)
15. Corral-De-Witt, D., Carrera, E.V., Matamoros-Vargas, J.A., Muñoz-Romero, S., Rojo-Álvarez,
J.L., Tepe, K.: From E-911 to NG-911: overview and challenges in Ecuador. IEEE Access 6,
42578–42591 (2018)
16. Corral-De-Witt, D., Carrera, E., Muñoz-Romero, S., Rojo-Álvarez, J.: Statistical, spatial and
temporal mapping of 911 emergencies in Ecuador. Appl. Sci. 8(2), 199 (2018)
17. Hoorn, C., Ortega Andrade, H.M., Bonaccorso, E., Linder, P.: Celebrating Alexander von
Humboldt’s 250th anniversary: exploring bio- and geodiversity in the Andes (IBS Quito 2019).
Front. Biogeogr. 11(2) (2019)
18. Toulkeridis, T., Buchwaldt, R., Addison, A.: When volcanoes threaten, scientists warn.
Geotimes 52, 36–39 (2007)
19. Chunga, K., Toulkeridis, T.: First evidence of paleo-tsunami deposits of a major historic event
in Ecuador. Sci. Tsunami Hazards 33, 55–69 (2014)
20. Rodriguez, F., Cruz D’Howitt, M., Toulkeridis, T., Salazar, R., Ramos Romero, G.E., Recalde
Moya, V.A., Padilla, O.: The economic evaluation and significance of an early relocation versus
complete destruction by a potential tsunami of a coastal city in Ecuador. Sci. Tsunami Hazards
35(1), 18–35 (2016)
21. Toulkeridis, T., Rodríguez, F., Arias Jiménez, N., Simón Baile, D., Salazar Martínez, R., Addi-
son, A., Freyre Carryon, D., Mato, F., Díaz Perez, C.: Causes and consequences of the sinkhole
at El Trébol of Quito, Ecuador—implications for economic damage and risk assessment. Nat.
Hazards Earth Sci. Syst. 16, 2031–2041 (2016)
22. Toulkeridis, T.: Unexpected results of a seismic hazard evaluation applied to a modern
hydroelectric plant in central Ecuador. J. Struct. Eng. 43(4), 373–380 (2016)
23. Matheus Medina, A.S., Cruz D´Howitt, M., Padilla Almeida, O., Toulkeridis, T., Haro, A.G.:
Enhanced vertical evacuation applications with geomatic tools for tsunamis in Salinas, Ecuador.
Sci. Tsunami Hazards 35(3), 189–213 (2016)
24. Rodriguez, F., Toulkeridis, T., Padilla, O., Mato, F.: Economic risk assessment of Cotopaxi
volcano Ecuador in case of a future lahar emplacement. Nat. Hazards 85(1), 605–618 (2017)
554 V. Yépez et al.
25. Mato, F., Toulkeridis, T.: The missing Link in El Niño’s phenomenon generation. Sci. Tsunami
Hazards 36, 128–144 (2017)
26. Toulkeridis, T., Parra, H., Mato, F., Cruz D’Howitt, M., Sandoval, W., Padilla Almeida, O.,
Rentería, W., Rodríguez Espinosa, F., Salazar Martinez, R., Cueva Girón, J., Taipe Quispe,
A., Bernaza Quiñonez, L.: Contrasting results of potential tsunami hazards in Muisne, central
coast of Ecuador. Sci. Tsunami Hazards 36, 13–40 (2017)
27. Rodríguez Espinosa, F., Toulkeridis, T., Salazar Martinez, R., Cueva Girón, J., Taipe Quispe, A.,
Bernaza Quiñonez, L., Padilla Almeida, O., Mato, F., Cruz D´Howitt, M., Parra, H., Sandoval,
W. and Rentería, W.: Economic evaluation of recovering a natural protection with concurrent
relocation of the threatened public of tsunami hazards in central coastal Ecuador. Sci. Tsunami
Hazards 36, 293–306 (2017)
28. Chunga, K., Toulkeridis, T., Vera-Grunauer, X., Gutierrez, M., Cahuana, N., Alvarez, A.:
A review of earthquakes and tsunami records and characterization of capable faults on the
northwestern coast of Ecuador. Scie. Tsunami Hazards 36, 100–127 (2017)
29. Jaramillo Castelo, C.A., Padilla Almeida, O., Cruz D´Howitt, M., Toulkeridis, T.: Comparative
determination of the probability of landslide occurrences and susceptibility in central Quito,
Ecuador. In: 5th International Conference on eDemocracy and eGovernment, ICEDEG 2018
8372318, pp. 136–143 (2018)
30. Zafrir Vallejo, R., Padilla-Almeida, O., Cruz D’Howitt, M., Toulkeridis, T., Rodriguez
Espinosa, F., Mato, F., Morales Muñoz, B.: Numerical probability modeling of past, present
and future landslide occurrences in northern Quito, Ecuador—economic implications and
risk assessments. In: 2018 5th International Conference on eDemocracy and eGovernment,
ICEDEG 2018 8372318, pp. 117–125 (2018)
31. Mato, F., Toulkeridis, T.: An unsupervised K-means based clustering method for geophysical
post-earthquake diagnosis. In: 2017 IEEE Symposium Series on Computational Intelligence
(SSCI), pp. 1–8 (2018)
32. Navas, L., Caiza, P., Toulkeridis, T.: An evaluated comparison between the molecule and
steel framing construction systems—implications for the seismic vulnerable Ecuador. Malays.
Constr. Res. J. 26(3), 87–109 (2018)
33. Matheus-Medina, A.S., Toulkeridis, T., Padilla-Almeida, O., Cruz-D´Howitt, M., Chunga,
K.: Evaluation of the tsunami vulnerability in the coastal Ecuadorian tourist centers of the
peninsulas of Bahia de Caráquez and Salinas. Sci. Tsunami Hazards 38(3), 175–209 (2018)
34. Chunga, K., Mulas, M., Alvarez, A., Galarza, J., Toulkeridis, T.: Characterization of seis-
mogenetic crustal faults in the Gulf of Guayaquil, Ecuador. Andean Geol. 46(1), 66–81
(2019)
35. Toulkeridis, T., Jacome, A., Mato, F.: Ethics, policy, and risk assessment of the Cotopaxi
volcanic crisis in Ecuador—vulnerable society versus unprepared volcanic monitoring staff
and authorities. In: Geoethics in Latin America, pp. 153–170. Springer, Cham (2018)
36. Pérez de Armiño, K.: Diccionario de Acción Humanitaria y Cooperación al Desarrollo, Icaria
(2002)
37. Secretaría de Gestión de Riesgos, Ley del Sistema Nacional Descentralizado de Gestión de
Riesgos (2012)
38. Melo Delgado, R.H.: El estado de excepción en el Ecuador y su relación con el estado de
derecho (online). Available at: http://hdl.handle.net/10644/3118 (2012)
39. Asamblea Nacional del Ecuador, Ley de Seguridad Pública y del Estado (2009)
40. Rodríguez, C.: Las Fuerzas Armadas de Ecuador en respuesta al Terremoto del 16/A. MIDENA,
Quito (2017)
41. Yépez, V.: Las Fuerzas Armadas ecuatorianas como ente articulador del Sistema Nacional
de Gestión de Riesgos durante la emergencia del terremoto en Pedernales, abril de 2016. In:
Posterremoto, gestión de riesgos y cooperación internacional: Ecuador, Quito-Ecuador, IAEN,
pp. 69–93 (2017)
42. Yépez, V.: El apoyo técnico del ejército dentro del sistema de gestion de riesgos. El empleo
del Ejército de los Ecuatorianos en el terremoto del 16 de abril de 2016, vol. 35, pp. 139–149
(2018)
Author Index
K
Kazanecka, Aneta, 283, 293, 497 R
Kazanecki, Wojciech, 497 Ramírez-Cabrales, Fabián, 3, 17
Kirkwood, Robert K., 135 Ramos, Valentina, 305
Recalde, Luis, 529
Reis, Bruno, 283
L Reis, João, 283, 293, 497
Larios, Omar, 519 Reyes Ch., Rolando P., 111, 271
León, María, 353 Roberto, López, 343
Lezama, Omar Bonerge Pineda, 149, 159, Rodríguez, Rosalba, 237
169, 177, 229, 259, 399, 409, 519 Rojas-Agramonte, Yamirka, 485
Lopez, Jonathan, 331 Romero, Ligia, 519
Loureiro, Nuno A. R. S., 443 Rosado, César, 149
M S
Machado Jiménez, José Alejandro, 17 Santos, Lúcio Agostinho Barreiros, 377
Manotas, Alberto, 519 Santos, María Dolores, 529
Marín-González, Freddy, 177 Sarmento Coelho, Maria Manuela Martins
Mayorga, Jaime, 271 Saraiva, 377
Mejía, Alexander, 343 Sharhorodska, Olha, 211
Mercado, Carlos Vargas, 159, 177 Silva, Jesús, 149, 169, 177, 229, 259, 399,
Merizalde, Darwin, 55, 65, 89, 101 409, 519
Molina, Esteban, 343 Standley, Vaughn H., 135, 461
Monzón, Fernando Huamán, 29 Suárez, Paolo, 305
N T
Natteri, Domingo, 259 Tapia, Freddy, 123
Noboa, Gustavo Paz, 485 Tituaña, Jonathan, 65
Norman, Benjamin E., 135 Toledo, Jorge, 545
Author Index 557
V
Valero, Lesbia, 259 Y
Vallejo, Isaac, 343 Yépez, Víctor, 353, 545
Vallejos, Diana, 123
Varela, Noel, 169, 177, 229, 399, 409
Vargas, Jesús, 149, 259 Z
Vega de la, Karim Guevara Puente, 211 Zambrano, José, 237