Battle Strategy and Terrain Complexity (TERCOM)

Citing Wikipedia: “An advantage of terrain occurs when military personnel gain an advantage over an enemy utilizing, or simply in spite of, the terrain around them. The term does not exclusively apply to battles, and can be used more generally regarding entire campaigns or theaters of war. Mountains, for example, can block off certain areas, making it unnecessary to station troops within the…

Counterfeit Electronics Detection – An Ontonix Success Story

From a Hill’s article: “… counterfeit electronics that threaten the reliability of military hardware and our critical infrastructure for telecommunications, energy and transportation. A study by the Senate Armed Services Committee found more than 1,800 cases of suspected counterfeits in advanced missile systems, helicopters, submarines and more. Because our company provides counterfeit detection services and…

Complexity-based Control of Dynamic Systems

Complexity-based control is possible because complexity can be measured in real-time using specifically developed hardware. The concept is illustrated below, whereby a QCM block is used to drive the complexity of a given system to desired levels. Because high complexity can lead to instability and fragility, the goal of QCM control is to drive complexity…

Increasing Cybersecurity. Locally.

A recent blog by CISCO speaks of how QCM – Quantitative Complexity Management – is used in anomaly detection in highly complex systems and contexts. In particular, it speaks of QCM as being able to detect the existence of an anomaly without having seen it before. Such capability goes beyond Machine Learning in that QCM…

Complexity of Car Electronics: Testing and Reliability

In an interesting article entitled Reliability Paradox for Worldwide Automotive Electronics and published in: 2017 Annual Reliability and Maintainability Symposium (RAMS), one may read: “Automotive Electronics is growing ever since the technological advancement has brought about a revolution in the Automotive Semiconductor and Telematics industry, especially in the past decade. Utilization of microelectronics and hence circuits’…

Which 21-st Century Technology is the Most Dangerous?

Which technology is the most dangerous? Which technology is most feared? Is it Artificial Intelligence? Is it nanotechnology? Genetic manipulation? Nuclear energy? Maybe superconductivity? Or robotics? No, it is none of these. The most dangerous technology of the 21-st century is indubitably QCM – Quantitative Complexity Management. The QCM has been established in the early…

Complexity and Revisiting Anomaly Detection

Wikipedia: “In data mining, anomaly detection (also outlier detection) is the identification of rare items, events or observations which raise suspicions by differing significantly from the majority of the data. Typically the anomalous items will translate to some kind of problem such as bank fraud, a structural defect, medical problems or errors in a text.…