• D2.1 User Requirements Analysis (summary)

    This document summarises the work undertaken in task T2.1 of IPATCH to orientate the research and development of the project towards the stakeholders’ perspectives. This consisted of: • A synthesis of main information collected to provide the context of piracy in the two project focus areas, namely, East Africa and West Africa: geopolitical and legal context, piracy courses of action, and existing anti-piracy measures in the area • A state of the art of existing piracy countermeasures • A functional description and associated requirements established from end users interviewees on the IPATCH on-board system, combining detection, threat recognition and decision support • A list of constraints highlighted through surrounding elements analysis

    Uploaded:  12 / Oct / 2016

  • D2.2 – System Wide Privacy Solutions (summary)

    This document summarises the work undertaken in task T2.2 of IPATCH to establish a thorough understanding of all the relevant technologies/sensors used to collect data on vessels. On the basis of this list, the ethical, social and legal challenges are identified and the technologies/sensors are screened through an analysis of all pertinent legislation to establish the legal framework for collection, processing, storage and sharing of personal data in the context of maritime threat detection. In addition, an ethical, social and legal analysis is performed in order to document the privacy requirements for an ethically acceptable balance between security and privacy and provide “privacy by design” requirements for the system specification (T2.3) and the development (WP5-7).
  • D2.3 – System Specification (summary)

    This report contains the overall IPATCH system design which is presented as the set of architectural views. These views describe how the system will operate in various conditions and what kind of functionality will be delivered. The design takes into account the requirements which were specified in task 2.1 and privacy constraints from task 2.2. The specification decouples the system to the set of modules which have explicitly defined methods. These methods refers to the common data model which is also defined in this document and will be used to have ensured common understanding of data. Subsequently the defined methods with the data model have been used in sequence diagrams to define how system will fulfil its use cases. Finally the document contains the project of integration components and example of deployment diagrams providing information on how system should be installed.

    Uploaded:  27 / Oct / 2016

  • D3.1 – Data Acquisition and Structuring Report (summary)

    The objective of Work Package 3 of IPATCH was to collect, systematise and analyse data on pirate attacks to assess their consequences, and to develop a set of threat scenarios to be used in the development of the threat recognition and decision support modules. This report presents the results of Task 3.1. In particular, it describes the sources which were used to collect the data and provides an evaluation of the quality of the information they contained. The common data model which has been developed as a result of the structuring process is also documented.

    Uploaded:  20 / Oct / 2016

  • D3.2 – Data Analysis Findings (summary)

    The IPATCH project aimed to develop a situational awareness system that will robustly monitor the area around maritime vessels, providing early warning to crew members if piracy threats are detected. A low false alarm rate due to environmental or other innocuous events, combined with high threat detection sensitivity are central ambitions of the project. To achieve these goals, a multispectral sensor suite comprising both passive and active sensors was envisaged, i.e., a system based on radar, visual and thermal sensors. The sensor suite was to be complemented with advanced algorithms for information fusion, object detection and classification, and high level modelling of intent and behaviour analysis. This document reports on the analysis of the threats and countermeasures, identifying the probability of threat (probability of attack) and the probability of harm (efficacy of counter-measures).

    Uploaded:  13 / Feb / 2017

  • D3.3 – Threat Scenarios and Countermeasure Definitions (summary)

    This Threat Scenarios and Countermeasure Definitions Report (D3.3) presents the results of Task 3.3, which aimed at identifying possible threat scenarios and evaluating the effectiveness of the countermeasures most frequently used against piracy attacks. Threat scenarios and countermeasures were defined and evaluated in terms of their frequencies, outcome of the attack, and potential reduction/increase of the harm to ships or crews. The results of the analysis presented in this report will provide input to the manual on countermeasures (Task 4.4), the threat recognition algorithms (Task 6.2), and the decision support tool (Task 7.2).

    Uploaded:  1 / Nov / 2016

  • D4.4 – Manual on Countermeasures (summary)

    This report describes the methodology used for creating the manual and the content of the countermeasures database. An Annex, published as a separate document, gathers the information sheets associated with the considered countermeasures, and contains the material suitable for publication to the shipping industry. An electronic version of the Annex will be integrated into the IPATCH on-board system with an appropriate Human-Machine Interface for direct use on board ships.

    Uploaded:  2 / Nov / 2016

  • D5.1 – Sensors for Maritime Threat Detection (summary)

    One goal of the IPATCH project is to develop an on-board automated surveillance and decision support system providing early warning of piracy threats. A key component of the on-board system is a suite of sensors. This report analyses the requirements on those sensors from previous work packages; user requirements from WP2 and requirements stemming from the threat scenarios developed in WP3. These requirements are related to the capabilities of relevant sensors, resulting in technical requirements on sensor suites for data collection, system demonstration as well as a final system. In conclusion, the system should exploit existing AIS and ship radar for detection and analysis of potential threats at long range. To these, a sensor suite of thermal and visual cameras should be added for tracking approaching threats; thermal cameras for all-weather and day/night performance at ranges below a few kilometres, and visual cameras for tracking and also for providing imagery at close range, that is, during boarding attempts. Specific requirements on these sensors are given in this document.

    Uploaded:  25 / Oct / 2016

  • D8.32 – FNK Vessel Field Trials Report (summary)

    This document describes in detail the 2nd IPATCH Sea Trials that took place between 13-19th May 2017 in Corinth, Greece on-board the M/T KAMARI crude oil carrier, while the vessel was at anchorage at Agioi Theodoroi bay, Corinth, Greece. The report describes the vessel that was used for the 2nd field trials and the scenarios that were played out. It also analyses the performance of each module of the IPATCH system and evaluates the system as a whole. Overall, the trials were a success. The prototype IPATCH system proved capable of detecting and tracking targets, performing situational analysis and displaying the results in an adequate form on the Human-Machine Interface.

    Uploaded:  27 / Jun / 2017

  • D9.61 – Report on the IPATCH-PROMERC Workshop (summary)

    On May 27th 2015, NATO Maritime Research and Experimentation (CMRE) in La Spezia hosted a joint workshop between the two projects PROMERC and IPATCH, which are both receiving funding from the EU Commission to research non-military measures to protect against piracy. The purpose was to discuss counter-piracy measures manuals, as both projects have to create a countermeasures manual to be used by the crew responsible for security on board commercial vessels passing through areas with a risk for piracy. This report presents a brief recapitulation of the two projects followed by a discussion on the data models and on the counter measures manual.

    Uploaded:  2 / Nov / 2016