01.12.2014 Views

monitoring

monitoring

monitoring

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />

Figure A‐3 Example Decomposition Map<br />

The next step of decomposition moves from the problem description (the red shaded area in<br />

the decomposition map) towards the articulation of a solution architecture (the blue shaded<br />

area in the decomposition map). The scenario sub‐nodes are decomposed into strategic<br />

capability areas dividing the problem space into discrete mission areas – in this case border<br />

<strong>monitoring</strong> is highlighted. In addition to other functional objectives, it may be desirable as part<br />

of border <strong>monitoring</strong> to control a perimeter around an area of interest, preventing nuclear<br />

materials or devices of interest from moving across that perimeter (it may also be desirable to<br />

allow innocent traffic to cross the perimeter, as in border control scenarios). Additionally, the<br />

capability to search small areas thoroughly, and search large areas efficiently may be important<br />

functional objectives.<br />

The functional objective, “Perimeter Control” can be further decomposed into a set of tasks<br />

that must be accomplished in order fulfill that objective. These tasks and the assets associated<br />

with them represent a proposed solution architecture for accomplishing the objectives<br />

specified. For example, the perimeter must be established and maintained. Additionally, items<br />

that pass through that perimeter must be inspected to ensure that no nuclear contraband is<br />

DSB TASK FORCE REPORT Appendix A: Unabridged Description | 87<br />

Nuclear Treaty Monitoring Verification Technologies<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!