• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 714
  • 455
  • 115
  • 86
  • 75
  • 62
  • 39
  • 28
  • 28
  • 27
  • 8
  • 8
  • 8
  • 7
  • 7
  • Tagged with
  • 2013
  • 362
  • 314
  • 257
  • 228
  • 220
  • 187
  • 183
  • 174
  • 165
  • 155
  • 144
  • 138
  • 128
  • 126
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

TELEMETRY CHALLENGES FOR BALLISTIC MISSILE TESTING IN THE CENTRAL PACIFIC

Markwardt, Jack, LaPoint, Steve 10 1900 (has links)
International Telemetering Conference Proceedings / October 28-31, 1996 / Town and Country Hotel and Convention Center, San Diego, California / The Ballistic Missile Defense Organization (BMDO) is developing new Theater Missile Defense (TMD) and National Missile Defense (NMD) weapon systems to defend against the expanding ballistic missile threat. In the arms control arena, theater ballistic missile threats have been defined to include systems with reentry velocities up to five kilometers per second and strategic ballistic missile threats have reentry velocities that exceed five kilometers per second. The development and testing of TMD systems such as the Army Theater High Altitude Area Defense (THAAD) and the Navy Area Theater Ballistic Missile Defense (TBMD) Lower Tier, and NMD systems such as the Army Exoatmospheric Kill Vehicle and the Army Ground-Based Radar, pose exceptional challenges that stem from extreme acquisition range and high telemetry data transfer rates. Potential Central Pacific range locations include U.S. Army Kwajalien Atoll/Kwajalein Missile Range (USAKA/KMR) and the Pacific Missile Range Facility (PMRF) with target launches from Vandenberg Air Force Base, Wake Island, Aur Atoll, Johnston Island, and, possibly, an airborne platform. Safety considerations for remote target launches dictate utilization of high-data-rate, on-board instrumentation; technical performance measurement dictates transmission of focal plane array data; and operational requirements dictate intercepts at exoatmospheric altitudes and long slant ranges. The high gain, high data rate, telemetry acquisition requirements, coupled with loss of the upper S-band spectrum, may require innovative approaches to minimize electronic noise, maximize telemetry system gain, and fully utilize the limited S-band telemetry spectrum. The paper will address the emerging requirements and will explore the telemetry design trade space.
162

Die bestuur en administrasie van burgerlike beskerming in Suid-Afrika

Cronje, Johannes Andreas 12 1900 (has links)
Thesis (MPA) -- Stellenbosch University, 1993. / ENGLISH ABSTRACT: The history and development of civil protection in South Africa, as well as in seven world states, appear to have common characteristics. The phenomenon civil protection and the authoritive allocation of protection values can be categorised in three models. The traditional model depicts the allocation of protection values based on inheritance from generation to generation. The command approach refers to the allocation and exercising of protection values in accordance with authoritative and dictatorial government powers. The market model of civil protection refers to the free market mechanism within which the demand and supply of protection values will determine the nature and extent of civil protection measures. The origin and development of civil protection world wide can be traced back from the earliest times, i.e. from the family grouping through feudalism, mercantalism and city states up to the contemporary representative government systems. The general theory of civil protection, based on the semantics and genetics of civil protection, identifies the authoritive allocation of protection values in accordance with five perspectives viz; (a) the historic traditional perspective based on the evolutionary development of protection skills handed down from generation to generation; (b) the war perspective with threats against civilians, in times of war, being the motivation for civil protection; (c) the disaster- and emergency situation perspective with man- and natural caused threats being the motivation for civil protection; (d) the generic perspective with logic in accordance with semantics and genetics being the motivation for understanding civil protection; and (e) the human need perspective with deprivation of human need satisfaction giving rise to civil protection. In South Africa civil protection can be described in relation to informal civil protection based on resistance movements, to the left of the government-of-the-day political spectrum as well as to the right of the government-of-the-day political spectrum. Due to the early stage of existence, research on right wing resistance can only be superfluous. Nongovernmental organisations represent the second formation of informal civil protection. South African civil protection based on legislation in the form of political acts as well as executive legislation, formulated by the burocracy, the so-called regime, represents the third formation of civil protection viz. formal civil protection. The efficiency of civil protection in South Africa is a bone of contemporary contention due to present day unrest- and natural contingencies that threatens civilians. Theoretical principles of efficiency, based on five approaches in determining organisation efficiency can be compared to the status of civil protection in South Africa, by way of an introspection and problem statement in order to evaluate the performance of civil protection. An eclectic approach based on the five approaches mentioned, is an appropriate method of evaluating organisational efficiency. The efficiency of the resistance- and non-governmental civil protection formations in South Africa seems to be adequate for continued existence within the South African protection environment. The formal formation of civil protection seems to have an inadequate standard of organisational efficiency. A normative future perspective is therefore essential. The generic all encompassing nature of civil protection as phenomenon should be confirmed, along with the prerogative of non-governmental organisations and resistance movements to be acknowledged as civil protection formations. Formal civil protection in South Africa encompasses the entire governmental sector with all its branches and within all levels of hierarchy. The establishment of a Corporate Civil Protection Support and Management Prooramme, as a facilitating staff function for the protection of civilians, is recommended in order to alleviate the present standard of formal civil protection inefficiency and in eliminating malperceptions on civil protection. The Corporate Management Programme, should eliminate the fragmentations, duplications and encroachments currently existing within formal civil protection in South Africa. Contributions to the efficiency of civil protection can also be realised. / AFRIKAANSE OPSOMMING: Burgerlike beskerming openbaar wêreldwyd bepaalde geskiedkundige en ontstaanskenmerke. Beskermingswaardes word gesaghebbend toegewys volgens drie benaderings oftewel toewysingsmodelle. Die tradisionele model, verwys na die toewysing van beskermingswaardes kragtens oorerwing van geslag tot geslag. Die bevelsbenadering verwys na die toewysing en uitoefening van beskermingswaardes kragtens outoritêre en diktatoriale regeringsmag. Die markmodel van burgerlike beskerming verwys na die vryemarkmeganisme waar die vraag en aanbod na beskermingswaardes sal bepaal wat die omvang van burgerlike beskermingsmaatreëls sal wees. Die ontstaan en geskiedenis van burgerlike beskerming wêreldwyd dateer sedert die vroegste tye vanaf die familiegroepering deur die feudalisme, merkantilisme en stadstate tot die hedendaagse verteenwoordigende regeringstelsel. Die algemene teorie van burgerlike beskerming, aan die hand van die betekenis van die term en kragtens die genetiek en semantiek, bevestig vyf perspektiewe as verklaring vir die bestaan van burgerlike beskerming, naamlik: (a) die kultuur-historiese perspektief met evolusie van tradisionele beskermingsgebruike as verklaring; (b) die oorlogsperspektief stel oorlogsbedreigings teen die burgerlike as verklaring; (c) die ramp- en noodbestuursperspektief, stel ramp- en noodtoestand bedreigings as verklaring; (d) die behoefte bevredigingsperspektief, stel ontneming van die menslike reg tot behoeftebevrediging as verklaring: en (e) die generiese perspektlef stel logika kragtens die semantiek en genetiek as verklaring. In Suid-Afrika word weerstand informele burgerlike beskerming bedryf deur weerstandsbewegings, oftewel bevrydingsbewegings links van die regering-van-die-dag politieke spektrum, sowel as regs van die regering-van-die-dag politieke spektrum. Nie-owerheid organisasies as 'n vergestalting van nie-owerheid informele burgerlike beskerming word vry algemeen aangetref as die tweede informele vergestalting en word bedryf deur die privaatsektor as sake-ondernemings, welsynsorganisasies en gemeenskapsgroeperings soos sosiale klubs. Formele burgerlike beskerming aan die hand van afgekondigde politieke- sowel as uitvoerende wetgewing, aan die hand van die burokrasie, die sogenaamde regime, verteenwoordig die derde vergestalting van burgerlike beskerming wat ook vry algerneen in Suid-Afrika aangetref word. Die effektiwiteit van burgerlike beskerming in Suid-Afrika het in die jongste tye 'n knellende vraagstuk geword vanwee toenemende bedreiging teen burgerlikes. Die teoretiese grondslag van die betekenis van effektiwiteit asook benaderings tot organisasie-effektiwiteit kan, indien met oorleg toegepas, 'n geldige aanduiding wees van burgerlike beskerming effektiwiteit. Formele burgerlike beskerming in Suid-Afrika, toon 'n kommerenswaardige standaard van effektiwiteit aan die hand van 'n introspeksie en probleemstelling. Daar· teenoor toon die twee informele vergestaltings 'n toereikende effektiwiteitstandaard ten einde voortgesette funksionering te regverdig. Die normatiewe toekoms van burgerlike beskerming in Suid-Afrika, kragtens aard en omvang, behoort normatief opgeklaar te word ten einde die persepsiologiese dwalings en verwarrings op te klaar. Die generies-omvattende aard van burgerlike beskerming as verskynsel en die bestaansreg van nie-owerheid organisasies en weerstandsbewegings as informele burgerlike beskermingsvergestaltings behoort amptelik erken te word as deelhouers van burgerlike beskerming. Die normatiewe vooruitskouing van formele burgerlike beskerming daarenteen is 'n aangeleentheid wat indringende en regstellende maatreëls verg. Formele burgerlike beskerming in Suid-Afrika behels die geheel owerheidsektor in sy vele vertakkinge en hierargiese vlakke. Die vestiging van 'n Korporatiewe Burgerlike Beskerming Ondersteunende Bestuursprogram as fasiliterende staffunksie vir die beskerming van burgerlikes is 'n tydgenootlike vernuwing wat ernstige oorweging behoort te geniet. Die vestiging van sodanige Korporatiewe Bestuursprogram word as opklaring vir die Suid-Afrikaanse formele burgerlike beskermingsprobleem voorgehou. Die vestiging en bedryf van die Korporatiewe Bestuursprogram verg dat daar 'n geintegreerde korporatiewe en gekoordineerde program tot stand gebring behoort te word wat bestaande fragmenterings, dupliserings en oorvleuelings van formele burgerlike beskerming in Suid-Afrika behoort uit te skakel en ook die effektiewe beskerming van burgerlikes in Suid-Afrika behoort te realiseer.
163

Service denied : injured military contractors fight for compensation

Choi, Ann 09 October 2014 (has links)
During the Iraq and Afghanistan wars the U.S. government has relied heavily on military contracting companies and their employees to carry out military missions in Middle East. Since 2001, high salaries and the call to serve the country have persuaded many people to take the risk of working in war zones. Yet the many individuals who have been injured while performing such duties now find themselves caught between their insurance companies and the U.S. Department of Labor, as they fight for the workers’ compensation and healthcare coverage they were promised. / text
164

Outsourcing R&D in the Defense Industry : Developing Strategies for Collaborating with Indian Suppliers

Dalborg, Per, Henriksson, Linnea January 2014 (has links)
An important step in making an impact on the Indian market, Saab India Technology Center, SITC, was inaugurated on October 21, 2011. SITC is a collaboration with the Indian company Tech Mahindra, and supplies all of Saab’s Business Areas with skilled engineers. The growing interest for SITC has spread to TDH, the department for Human Machine Interface and Avionics. Possible benefits, but also challenges, of utilizing SITC have been discussed. This thesis attempts to address challenges and maximize benefits for TDH by exploring how a Swedish R&D organization in the defense industry, that has a tradition of performing most work in-house, can initiate outsourcing to a supplier in India. In order to do this, a literature study was performed. Since gaps in the literature regarding outsourcing in the defense industry were identified, a combination of a descriptive and exploratory research approach was chosen. Following the literature study, interviews were conducted to collect experience from working with external partners at TDH, experience from working with SITC, experience from other companies that have outsourced R&D to India and experience of working with Saab from SITC. Empirical data was also gathered via informal meetings and observations during the researchers’ 5 month stay at TDH in Sweden and SITC in India. The outcome of this study shows that drivers and risks for outsourcing R&D, as well as the characteristics of the outsourcer and the supplier, will influence how the strategy for initiating outsourcing should be built. TDH’s main drivers in deciding to use SITC are mainly cost reduction goals, the possibility to access the Indian defense market and the opportunity to gain knowledge from collaborating with international suppliers. The type of risk that is most urgent for TDH is operational risk. Risks in this category, like overestimating cost reduction and risks associated with not understanding cultural differences are all highly relevant for any organization with limited experience in outsourcing. Strategy wise, the main finding is that an R&D organization in the defense industry will benefit from working in a more collaborative manner than traditional outsourcing entails. In an R&D organization, tasks are often complex and highly integrated with each other which, combined with a limited level of outsourcing experience, requires a tighter collaboration. With a high level of involvement from the outsourcer, problems can be detected early and insufficient requirements can be handled. Close collaboration also enhances knowledge sharing, which is important to ensure that the goal of gaining knowledge from international collaboration is achieved. Furthermore, organizational acceptance can be improved by a collaboration that enables close contact between outsourcer and supplier. Improving acceptance in the organization for collaborating with the supplier should be prioritized in order to strengthen the positive effects of outsourcing.
165

Homeland Security Knowledge Management for local law enforcement in the national capital region

Walker, Deirdre I. 09 1900 (has links)
CHDS State/Local / Within the last three years, Homeland Security (HLS) has emerged as a new focus for local law enforcement agencies throughout the nation. While local police must effectively address community needs associated with crime and quality of life, they are also now on the front lines of the nation's battle against the forces of international terrorism. Using existing knowledge (derived primarily from the emergency management field), police agencies have worked to develop locally relevant, viable and available expertise in the developing field of HLS. If federal estimates are accurate, however, a critical mass of these experts will retire within the next five years. As these organizational experts approach retirement, their communities will be forced to deal with the consequences of an exodus of fundamental knowledge, experience and expertise. Police organizations will be challenged to continue the efficient delivery of homeland security services absent the experts who were instrumental in developing the field. Existing research in Knowledge Management (KM) may offer some guidance to managing this problem. KM seeks to offer organizational guidance on how to identify knowledge generation processes and then leverage, maintain and manage knowledge assets within an organization. This thesis seeks to explore the potential application of KM theories to the real challenges faced by local police agencies in the National Capitol Region as they attempt to effectively engage HLS management. / Assistant Chief of Police/Investigative Services, Montgomery County Department of Police
166

Homeland security and capabilities-based planning : improving national preparedness

Caudle, Sharon L. 09 1900 (has links)
CHDS State/Local / Beginning in 2004, the Department of Homeland Security (DHS) began to define and implement a national domestic all-hazards preparedness goal, intended to improve the nation's preparedness for national catastrophes, including terrorist attacks. DHS's approach was capabilities-based planning (CBP), adopted from the Department of Defense (DoD). CPB is intended to develop the means--capabilities--for organizations to set priorities responding to a wide range of potential, but uncertain challenges and circumstances, mindful of issues of cost and sustainability. This thesis is intended to help officials better understand CBP and the factors important to its successful implementation. These factors range from setting out the business case for CBP adoption to necessary organizational and cultural enablers. In conclusion, the thesis recommends enhancing the CBP approach to national preparedness planning through integrating its approach with use of a national preparedness management standard, coverage of the mission areas of the National Strategy for Homeland Security, and encouraging performance partnership and collaborative. / Analyst-In-Charge and Senior Analyst, US Government Accountability Office
167

Citizen involvement in disaster management

Gonzalez, Michael M. 09 1900 (has links)
CHDS State/Local / Responding and recovering from large scale disasters is extremely labor intensive. Unfortunately, a problem confronting all communities is inability to employ on a regular basis the large number of personnel needed to effectively manage large scale disasters. One possible solution to increase workforce capacity during times of critical need is for emergency managers to integrate a volunteer component into their existing disaster management plan. The federal government is assisting local communities with volunteer recruitment by nationally sponsoring Neighborhood Watch, Volunteers in Police Service, Medical Reserve Corps, Community Emergency Response Team and Fire Corps programs through county-wide Citizen Corps Councils. The acceptance of volunteers by paid responders can vary significantly from one community to another. The results of a 13 item questionnaire from 50 CERT volunteers from a metropolitan community, who had at least one previous experience working with paid responders during the recovery phase of a large scale disaster identified that 24 percent felt as if they were in the way, 20 percent felt as if they worked harder than the paid responders, 36 percent were given assignments that did not match their skill level or training, only 48 percent were tasked immediately and only 60 percent reported that paid responders were helpful. Encouraging is the fact that even though some experiences may have been less than optimal, 100 percent reported that they would feel comfortable working with the same responders during another event. In addition, two case studies are used to tell the story of CERT volunteers that assisted with the recovery phase after the 2004 hurricane season in Florida. Each case study concludes with a list of lessons learned that emergency managers can consider when planning for similar missions. Primary issues and courses of action are provided to assist community leaders with deciding whether or not volunteers should be integrated into their existing disaster management plans. If the decision is made to integrate volunteers, several recommendations are discussed to assist planners with developing implementation strategies to address the needs and concerns of both populationâ s volunteers and paid responders. / Division Chief, Tampa Fire Rescue
168

The path to terrorist violence : a threat assessment model for radical groups at risk of escalation to acts of terrorism

Olson, Dean T. 09 1900 (has links)
CHDS State/Local / A threat assessment model to identify domestic radical groups on a trajectory towards terrorist violence remains an elusive goal. The lack of a model constrains proactive counter-terrorism efforts resulting in largely reactive strategies that often are ineffectual in discovering and disrupting terrorist plots while in an inchoate stage. The Path to Terrorist Violence Model, based on a threat assessment model used in the emerging field of threat management for the judiciary and elected officials, is a valid and reliable assessment methodology to identify radical groups at risk of escalation to acts of terrorism. By focusing on attack-related behaviors that a group must take to mount a planned attack, the Path to Terrorist Violence avoids contentious issues related to psychosocial, religious, race or ethnicity-based profiling assumptions. / Captain, Douglas County Sheriff's Department
169

Preparing military officers for effective service in an inter-agency environment

Nancarrow, Clifford A. 09 1900 (has links)
CHDS State/Local / This thesis evaluates, through the lens of the 1986 Goldwater-Nichols Act, training and assignment policy alternatives for expediting the development and deployment of military officers to fill billets requiring interagency expertise. Using United States Northern Command as a case study, it examines these policy alternatives and proposes Joint Mission Essential Tasks that might form the basis for required training and education. It proposes the establishment of a Homeland Defense College and suggests that military officers be awarded credit for joint tours through service with non-DOD agencies. The thesis argues that uniformed service resistance to expanded DOD/inter-agency engagement should be anticipated. Mitigating measures are suggested based extensively upon a conceptual framework for successful military innovation developed by Terry C. Pierce. / Civilian, GS-14, USNORTHCOM
170

Quantitative risk analysis for homeland security resource allocation

Reifel, Christopher S. 12 1900 (has links)
Defense against terrorism both at home and abroad has become a priority in the United States. As a result, resource allocation has also increased. However, even as resources increase, they are still finite. So the dilemma becomes how to efficiently allocate these limited resources. Currently the data, while abundant, is confusing. One suggested method is to allocate resources based on risk. However, there is virtually no guidance on how that risk should be defined or what the parameters are in a risk-based approach. Also, there is no flow of information model that outlines how to communicate to decision makers the risk reduction potential of each policy alternative. This thesis investigates the usefulness of quantitative risk analysis as an approach to determine the allocation of counter-terrorism resources. This approach develops a simulation-based quantitative risk assessment method that allows for subjective elements and uncertainties. The risk assessment information is then integrated with the cost of the alternatives to yield a risk-reduction-cost-tradeoff curve that guides decision makers with resource allocation decisions. This approach is demonstrated by using the Port Security Grant Program as an example. We find that the approach provides the decision maker the information required to discover robust resource allocation solutions.

Page generated in 0.0291 seconds