-
公开(公告)号:US11816012B2
公开(公告)日:2023-11-14
申请号:US17500533
申请日:2021-10-13
Applicant: RAYTHEON COMPANY
Inventor: Paul C. Hershey , Marcus A. Teter , Vikram A. Prasad
CPC classification number: G06F11/3428 , G06F9/4498 , G06F11/3048
Abstract: Techniques for multi-domain systems integration and evaluation are disclosed, including: obtaining criteria associated with a strategic objective; determining that a first system, operating in a first operating domain, is only partially capable of satisfying a first criterion in the criteria; determining that a second system, operating in a second operating domain that is different from the first operating domain, is capable of augmenting the first system with respect to satisfying the first criterion; responsive to determining that the second system is capable of augmenting the first system with respect to satisfying the first criterion, modeling a multi-domain system including at least a first component from the first system and at least a second component from the second system; and generating a performance metric that objectively evaluates capabilities of the multi-domain system against the criteria associated with the strategic objective.
-
公开(公告)号:US20230334351A1
公开(公告)日:2023-10-19
申请号:US17721896
申请日:2022-04-15
Applicant: Raytheon Company
Inventor: Paul C. Hershey , Brianne R. Hoppes , Kyle K. Ottinger , Bryan R. Harris , James E. Parry
Abstract: Systems, devices, methods, and computer-readable media for normalized (threat, effect) pair algorithm generation. A method can include, for a defined scenario, identifying (threat, effect) pairs and for each (threat, effect) pair of the identified (threat, effect) pairs categorizing metrics of an algorithm, the algorithm indicating a probability of mitigating damage, by the effect, caused by the threat and generating a normalized algorithm for the identified (threat, effect) pair based on the metrics, the normalized algorithm operating based on input parameters of same units as other normalized algorithms. The method can include operating generated normalized algorithms resulting in respective probabilities and corresponding confidence intervals, combining the probabilities and confidence intervals to provide an overall probability and corresponding confidence intervals of mitigating identified threats of the identified (threat, effect) pairs using the identified effects of the identified (threat, effect) pairs, and deploying effects to mitigate the threats.
-
公开(公告)号:US20230125362A1
公开(公告)日:2023-04-27
申请号:US17506847
申请日:2021-10-21
Applicant: Raytheon Company
Inventor: Paul C. Hershey , Vikram A. Prasad , Marcus Alton Teter
IPC: H04B17/391 , G06F30/18 , G06F30/20
Abstract: Systems, devices, methods, and computer-readable media for concurrent visualization of sensor and communications operations. A method can include receiving mission data indicating a target, a sensor, a communications system, and an operation to be performed regarding the target, identifying one or more operational layer, functional layer, and physical layer models for the sensor and communications system, and a physical layer model for weather, identifying, based on a comparison of the physical models of the sensor and communications system to a propagation equation, any gaps or inconsistencies between the physical models of the sensor and communications system and the propagation equation, and executing a simulation model resulting in a visual display of execution of the mission using the sensor and the communications system, the simulation model generated based on a filler model that fills any identified gaps or fixes any identified inconsistencies.
-
公开(公告)号:US20230112257A1
公开(公告)日:2023-04-13
申请号:US17500533
申请日:2021-10-13
Applicant: RAYTHEON COMPANY
Inventor: Paul C. Hershey , Marcus A. Teter , Vikram A. Prasad
Abstract: Techniques for multi-domain systems integration and evaluation are disclosed, including: obtaining criteria associated with a strategic objective; determining that a first system, operating in a first operating domain, is only partially capable of satisfying a first criterion in the criteria; determining that a second system, operating in a second operating domain that is different from the first operating domain, is capable of augmenting the first system with respect to satisfying the first criterion; responsive to determining that the second system is capable of augmenting the first system with respect to satisfying the first criterion, modeling a multi-domain system including at least a first component from the first system and at least a second component from the second system; and generating a performance metric that objectively evaluates capabilities of the multi-domain system against the criteria associated with the strategic objective.
-
公开(公告)号:US20220019920A1
公开(公告)日:2022-01-20
申请号:US16930998
申请日:2020-07-16
Applicant: Raytheon Company
Inventor: Robert J. Cole , David J. Wisniewski , Ryan M. Kaulakis , Paul C. Hershey
Abstract: Evidence decay in PGMs is achieved using virtual evidence nodes that create and send lambda messages that when combined with the other evidence force specified beliefs onto the decaying evidence nodes. The virtual evidence nodes compute a step along a path from the decaying node's current belief to a target belief to determine the specified belief. Belief propagation is executed to process the pi and lambda messages to update the current beliefs for all nodes. Observation evidence is removed from the model. For each decaying node, belief propagation is executed absent the evidence of that node to generate an updated target belief. Following an observation, the node's belief will decay in a smooth, continuous manner.
-
公开(公告)号:US09726460B2
公开(公告)日:2017-08-08
申请号:US14600920
申请日:2015-01-20
Applicant: Raytheon Company
Inventor: Paul C. Hershey , Robert E. Dehnert, Jr. , John J. Williams , David J. Wisniewski
Abstract: A method for accurately determining whether a response tool will be effective for responding to a given enemy threat object. Embodiments described herein provide a method and system for responding to a threat object, for example, negating missile threats. Embodiments may include validating effectiveness of a response to the threat object. Other embodiments may include verifying the continued effectiveness of a response to the threat object. Further embodiments may include providing feedback to re-perform the method for responding to the threat object. The system may include a mathematical method, and associated algorithms, to assess, in an automated fashion, the performance of non-kinetic techniques with respect to negating the threat object.
-
公开(公告)号:US20160127257A1
公开(公告)日:2016-05-05
申请号:US14529850
申请日:2014-10-31
Applicant: Raytheon Company
Inventor: Mu-Cheng Wang , Paul C. Hershey , Steven A. Davidson
IPC: H04L12/923 , H04W72/04 , H04W28/04 , H04W28/26
CPC classification number: H04L47/762 , H04L45/30
Abstract: In one aspect, a method includes receiving, at a first node in a network, a resource reservation request from a second node in the network, determining, at the first node, if there is another node in the network that can be used to reach a destination and meet the resource reservation request and notifying the second node a result of the determining.
Abstract translation: 一方面,一种方法包括在网络的第一节点处从网络中的第二节点接收资源预留请求,在第一节点处确定网络中是否存在可用于到达的另一个节点 目的地并且满足资源预留请求并且通知第二节点确定的结果。
-
公开(公告)号:US20140279809A1
公开(公告)日:2014-09-18
申请号:US14109059
申请日:2013-12-17
Applicant: Raytheon Company
Inventor: Paul C. Hershey , William J. Kyker , Donald H. Leonard , Jason Dudash , Douglas E. Toppin , Christopher J. Graham , Mu-Cheng Wang , Steven A. Davidson
IPC: G06N5/02
CPC classification number: G06N5/025
Abstract: A data broker-reasoner (DBR) system for automating mission planning and execution includes a context originating entity, a reasoner/decision entity, and a plurality of enforcement entities. The context originating entity extracts mission policy information from a variety of source materials, including checklists, manuals, and other documentation. The reasoner/decision entity interprets the mission policy in the context of situational awareness (SA) events to determine which policies should be enforced. Each of the enforcement entities is configured to enforce various policies within the context of a given mission lifecycle phase by providing commands, data, and requests to a plurality of user applications and/or other mission systems. The DBR can operate autonomously or semi-autonomously.
Abstract translation: 用于自动化任务规划和执行的数据代理推理器(DBR)系统包括上下文源实体,推理器/决策实体和多个执行实体。 上下文源实体从各种源材料中提取任务政策信息,包括清单,手册和其他文档。 推理者/决策实体在情境意识(SA)事件的背景下解释任务政策,以确定应执行哪些策略。 每个执行实体被配置为通过向多个用户应用和/或其他任务系统提供命令,数据和请求来在给定的任务生命周期阶段的上下文中执行各种策略。 DBR可以自主或半自主地运行。
-
公开(公告)号:US20250131301A1
公开(公告)日:2025-04-24
申请号:US18816736
申请日:2024-08-27
Applicant: Raytheon Company
Inventor: Paul C. Hershey , Vikram A. Prasad , Marcus A. Teter , Brianne R. Hoppes , Michael T. Bahns
IPC: G06N10/20
Abstract: A method includes obtaining, using at least one processing device of an electronic device, information defining a combinatorial logic gate design for a combinatorial logic circuit. The method also includes generating, using the at least one processing device, one or more polynomials representing operation of the combinatorial logic gate design. The method further includes mapping, using the at least one processing device, the one or more polynomials to one or more quantum polynomials, where each quantum polynomial has terms that are orthonormal. In addition, the method includes generating, using the at least one processing device, a quantum gate logic design based on the one or more quantum polynomials, where the quantum gate logic design is functionally equivalent to or better than the combinatorial logic gate design for the combinatorial logic circuit.
-
公开(公告)号:US10323910B2
公开(公告)日:2019-06-18
申请号:US14481288
申请日:2014-09-09
Applicant: Raytheon Company
Inventor: Paul C. Hershey , Joseph O. Chapa , Elizabeth Umberger
IPC: F41H11/02
Abstract: Embodiments of a method and apparatus for eliminating a missile threat are generally described herein. In some embodiments, the method includes identifying a vulnerability associated with the missile threat. The method can further include identifying a technique for exploiting the vulnerability to generate a vulnerability-technique (VT) pair. The method can further include applying a stochastic mathematical model (SMM) to generate a negation value, the negation value being representative of a probability that the technique of the respective VT pair will eliminate the threat by exploiting the vulnerability. The method can further include providing a recommendation for implementation the technique to eliminate the missile threat responsive to receiving a user selection of the technique, the user selection being selected based on the generated negation value. Other example methods, systems, and apparatuses are described.
-
-
-
-
-
-
-
-
-