monitoring
monitoring
monitoring
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
UNCLASSIFIED<br />
DEFENSE SCIENCE BOARD | DEPARTMENT OF DEFENSE<br />
Figure A‐3 Example Decomposition Map<br />
The next step of decomposition moves from the problem description (the red shaded area in<br />
the decomposition map) towards the articulation of a solution architecture (the blue shaded<br />
area in the decomposition map). The scenario sub‐nodes are decomposed into strategic<br />
capability areas dividing the problem space into discrete mission areas – in this case border<br />
<strong>monitoring</strong> is highlighted. In addition to other functional objectives, it may be desirable as part<br />
of border <strong>monitoring</strong> to control a perimeter around an area of interest, preventing nuclear<br />
materials or devices of interest from moving across that perimeter (it may also be desirable to<br />
allow innocent traffic to cross the perimeter, as in border control scenarios). Additionally, the<br />
capability to search small areas thoroughly, and search large areas efficiently may be important<br />
functional objectives.<br />
The functional objective, “Perimeter Control” can be further decomposed into a set of tasks<br />
that must be accomplished in order fulfill that objective. These tasks and the assets associated<br />
with them represent a proposed solution architecture for accomplishing the objectives<br />
specified. For example, the perimeter must be established and maintained. Additionally, items<br />
that pass through that perimeter must be inspected to ensure that no nuclear contraband is<br />
DSB TASK FORCE REPORT Appendix A: Unabridged Description | 87<br />
Nuclear Treaty Monitoring Verification Technologies<br />
UNCLASSIFIED