Spelling suggestions: "subject:" command"" "subject:" ommand""
111 |
Designing a common interchange format for unit data using the Command and Control information exchange data model (C2IEDM) and XSLTHodges, Glenn A. 09 1900 (has links)
Approved for public release, distribution unlimited / Approved for public release; distribution is unlimited. / A common problem between Military applications and operators is the consistent and meaningful exchange of data. Currently, several models and simulations exist for the purposes of training and analyzing military data. Due to the absence of an agreed-upon standard with which to represent unit data, much is lost during interchange and applications are not maximized. This thesis is a step towards a solution. Extensible Markup Language (XML) technology has been widely accepted as a standard for representing information in such a way that it is self-documenting, self-validating and platform independent. By using the Command and Control Information Exchange Data Model (C2IEDM), formerly known as Generic Hub, and XML it is possible to develop a representation of unit data that is extensible and broadly useable by tactical systems and human operators alike. This thesis approaches the problem exploring the Model Driven Architecture (MDA) and the Extensible Modeling Simulation Framework (XMSF) as possible overarching architectural concepts for a global solution. The C2IEDM is used as the core data interchange model for this research and applies XML technologies, schema and the Extensible Stylesheet Language for Transformations (XSLT) to derive a formatted data representation that is acceptable within the Flexible Asymmetric Simulation Technologies (FAST) Toolbox. The transformation example serves as template for other simulation programs to follow for interchange through the common base model. This thesis shows that by using a common data representation like C2IEDM coupled with the power of XML and XSLT, unit information can be transformed and interchanged between applications. In order to accomplish this, an extensive analysis is done on recently performed and ongoing research as well as the development of exemplars to show how the proposed process is completed. The result of this work is a transformation of unit data extracted from an example C2IEDM instance file that is compliant with the schema for an actual unit order of battle tool used for modeling and simulation. / Major, United States Army
|
112 |
Adult learning and naval leadership trainingHitchcock, Melanie J. 06 1900 (has links)
Approved for public release, distribution is unlimited / Adult learning embraces andragogy, constructivism, Transformative Learning Theory, praxis, and the understanding that not all adults are prepared initially for complete learning autonomy. The concept of andragogy can be traced to the Nineteenth Century, and the volume of follow-on research has reinforced the basic tenants of adult learning. It is, therefore, valid to expect that adherence to adult learning will indicate one measure of the effectiveness of curricula that target adults. This thesis, therefore, analyzes the Center for Naval Leadership Facilitator Training course and the Center for Naval Leadership Learning Site, Coronado Advanced Officer Leadership Training Course curricula for adherence to the adult learning model. The curricula follow adult learning practices to a great extent within the parameters of the military environment and limited resources. / Commander, United States Navy
|
113 |
Comparisons of attacks on honeypots with those on real networksDuong, Binh T. 03 1900 (has links)
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyber-attacks and attacker behavior. When implemented as part of a security posture, honeypots also protect real networks by acting as a decoy, deliberately confusing potential attackers as to the real data. The objective of this research is to compare attack patterns against a honeypot to those against a real network, the network of the Naval Postgraduate School. Collection of suspicious-event data required the implementation and setup of a honeypot, in addition to the installation and use of an intrusion-detection system. A statistical analysis was conducted across suspicious-event data recorded from a honeypot and from a real network. Metrics used in our study were applied to the alerts generated from Snort 2.4.3, an open-source intrusion detection system. Results showed differences between the honeypot and the real network data which need further experiments to understand. Both the honeypot and the real network data showed much variability at the start of the experiment period and then a decrease in the number of alerts in the later period of the experiment. We conclude that after the initial probing and reconnaissance is complete, the vulnerabilities of the network are learned and therefore fewer alerts occur; but more specific signatures are then aimed at exploiting the network.
|
114 |
An exploratory case study of the effects of gender related combat stress on adult learning in a military academic environmentBerg, Paul Eric January 1900 (has links)
Doctor of Philosophy / Department of Educational Leadership / Sarah Jane Fishback / This study describes how combat experiences affected female Army officers who attended the Command and General Staff College (CGSC) in Fort Leavenworth, Kansas. The female Army officers’ combat experiences were found to affect their academic learning, classroom experience, and coping mechanisms in a graduate-level professional military education. The themes identified included combat-related gender specific experiences and additional gender themes related to learning in a male-dominated military education environment.
Nine female active duty Army officers who were attending CGSC participated in this research with each having a minimum of two combat tours. In addition, two active duty Army CGSC military instructors with multiple combat tours and two behavioral counselors specializing in military patients were also interviewed.
The findings of this case study indicated that combat experiences affect t a degree the female students who served in the Army in Iraq and Afghanistan. The level of perceived academic stress was contingent upon the impact of the CGSC classroom environment, personal combat experiences, prior education, gender related combat stress, and other factors. Also, the learning experience of female students at CGSC was influenced due to marginalization in the classroom, instructor biases, and two-female limitations. This study contributes the continued research on effects of combat on adult learning, specifically adding to the limited works on being a female serving in the Army.
|
115 |
Soviet economic thought and economic policy in the 1940s : influence on 1950s-1960s reformsCadioli, Giovanni January 2018 (has links)
The present thesis looks at the Soviet economy in the 1940s-1960s period. It specifically focuses on the influence of economic policy and thought developed in the late 1940s on the post-Stalinist era. The thesis' aim is to prove that several key elements of 1950s-1960s economic reforms had already been conceptualised, proposed or implemented during the Stalinist period. The pillars of this 1940s-1960s reforming continuity which the research deals with are khozraschet, economic levers (profit, value, market, prices, credit, bonuses), perspective planning, the balance of the national economy method, as well as the debates concerning the law of value and the repeated attempts at drawing up a General Plan and at drafting a new Party Programme. The key figure this thesis focuses on is N.A. Voznesensky, top Soviet planner in 1939-1949. In the late 1930s he revived practices and methods discontinued after 1928, while under his aegis, policies and debates that later influenced post-Stalinist reforms were developed in the late 1940s. The thesis relies on primary evidence gathered at four Russian state archives (RGAE, GARF, ARAN, RGASPI) and on research carried out at British, Russian, Italian and German libraries.
|
116 |
Functional Circuitry Controlling the Selection of Behavioral Primitives in Caenorhabditis elegansLindsay, Theodore, Lindsay, Theodore January 2012 (has links)
One central question of neuroscience asks how a neural system can generate the diversity of complex behaviors needed to meet the range of possible demands placed on an organism by an ever changing environment. In many cases, it appears that animals assemble complex behaviors by recombining sets of simpler behaviors known as behavioral primitives. The crawling behavior of the nematode worm Caenorhabditis elegans represents a classic example of such an approach since worms use the simple behaviors of forward and reverse locomotion to assemble more complex behaviors such as search and escape.
The relative simplicity and well-described anatomy of the worm nervous system combined with a high degree of genetic tractability make C. elegans an attractive organism with which to study the neural circuits responsible for assembling behavioral primitives into complex behaviors. Unfortunately, difficulty probing the physiological properties of central synapses in C. elegans has left this opportunity largely unfulfilled. In this dissertation we address this challenge by developing techniques that combine whole-cell patch clamp recordings with optical stimulation of neurons. We do this using transgenic worms that express the light-sensitive ion channel Channelrhodopsin-2 (ChR2) in putative pre-synaptic neurons and fluorescent protein reporters in the post-synaptic neurons to be targeted by electrodes.
We first apply this new approach to probe C. elegans circuitry in chapter II where we test for connectivity between nociceptive neurons known as ASH required for sensing aversive stimuli, and premotor neurons required for generating backward locomotion, known as AVA. In chapter III we extend our analysis of the C. elegans locomotory circuit to the premotor neurons required for generating forward locomotion, known as AVB. We identify inhibitory synaptic connectivity between ASH and AVB and between the two types of premotor neurons, AVA and AVB. Finally, we use our observations to develop a biophysical model of the locomotory circuit in which switching emerges from the attractor dynamics of the network. Primitive selection in C. elegans may thus represent an accessible system to test kinetic theories of decision making.
This dissertation includes previously published co-authored material.
|
117 |
Functional Modeling of C<sup>2</sup>Prytz, Erik January 2009 (has links)
<p>Command and Control (C2) refers to the process or function of commanding and controlling military or civilian units. For most military context C2 is exercised in an adversarial environment where two or more forces are fighting against each other. In these situations it is desirable to constrain the adversarial forces in order to prevent them from achieving their objectives. By maintaining an accurate view of the possible dependencies and couplings within the own forces and between the own and adversarial forces, constraints can be managed and coordinated.</p><p>The purpose of this thesis is to develop a model that is capable of capturing these dependencies and couplings. This model is developed using the Functional Resonance Analysis Method (FRAM; Hollnagel, 2004). FRAM builds on the assumption that all parts of the system can be described as functional units. These functional units can then be linked together to form large systems. The links themselves are defined by how a function may affect other functions or in turn be affected by them. This enables the model to incorporate complex interactions within the system as well as between two adversarial systems.</p><p>The microworld “Dynamiskt Krigsspel för Experiment” (DKE) was used to develop the model. A scenario with two teams battling in this adversarial microworld setting was analyzed in detail for this purpose. The developed model uses three different layers, or resolutions, of functions to capture all potential couplings between functions. The lowest level of functions, called the tactical level, is the physical actions of the units in the microworld. The next level, the operational level, concerns the more overarching goals for which the tactical functions are used. Last, the strategic level consists of the C2 functions, such as data collection, sensemaking and planning.</p><p>The developed model is then applied to the scenario in DKE and shown to be able to describe and explain all actions by the two adversary systems as well as the couplings and dependencies between them.</p>
|
118 |
Performance and Shared Understanding in Mixed C<sup>2</sup>-Systems / Prestation och delad lägesförståelse i C<sup>2</sup>-systemPrytz, Erik January 2010 (has links)
<p><strong>OBJECTIVE:</strong> This thesis had two purposes. The main one was to examine how mixed conditions affect a Command & Control (C<sup>2</sup>) system, particularly in terms of shared understanding, situation awareness (SA), performance and workload. Mixed conditions refer here to when subsystems of a larger C<sup>2</sup>-system differ in terms of capabilities, particularly those capabilities influencing the understanding of a situation e.g. sensors or communication, which could affect the C<sup>2</sup>-capabilities when working toward a common goal. The second purpose of this thesis was to investigate a newly developed tool for measuring shared understanding, Shared Priorities, in terms of validity and usefulness.</p><p><strong>METHOD:</strong> A number of hypotheses were constructed and investigated by a controlled experiment using a microworld, C3Fire, where two-man teams fought a simulated forest fire. The independent variable manipulated was the type of support system used. One condition used one computer interface per participant, the second was mixed conditions where one participant used the computer interface and one used a paper map, and the last condition was both participants using a paper map. Different questionnaires developed to measure SA, workload etc. was used to measure the dependent variables.</p><p><strong>RESULTS:</strong> The statistical analysis performed on the collected data showed that the performance and SA was comparatively better when both participants used the computer interface than the mixed condition, which in turn was better than when both participants used a paper map. For workload and teamwork, no differences between the mixed condition and the dual map condition were found. As for the Shared Priorities measurement, no differences were found between any of the conditions.</p><p><strong>CONCLUSION: </strong>A C<sup>2</sup>-system in which some additional capabilities are introduced for some but not all subsystems may not benefit in some regards, e.g. workload and teamwork, but could improve in others, e.g. SA and performance. A Structural Equation Model (SEM) shows that the theoretical constructs of SA, workload, teamwork and performance are related and affect each other, so that the workload of the system negatively affects the teamwork and SA, while the teamwork may affect SA positively and a high SA enables high performance. </p>
|
119 |
Flexible role-handling in command and control systemsLandberg, Fredrik January 2006 (has links)
<p>In organizations the permissions a member has is not decided by their person, but by their functions within the organization. This is also the approach taken within military command and control systems. Military operations are often characterized by frictions and uncontrollable factors. People being absent when needed are one such problem.</p><p>This thesis has examined how roles are handled in three Swedish command and control systems. The result is a model for handling vacant roles with the possibility, in some situations, to override ordinary rules.</p>
|
120 |
TECCNET : a testbed for evaluating command and control NETworksJanuary 1982 (has links)
by Elizabeth R. Ducot. / "August 1982." / Bibliography: p. 61-62. / Air Force Office of Scientific Research contract AFOSR-80-0229
|
Page generated in 0.0482 seconds