• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 93
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 120
  • 120
  • 120
  • 45
  • 28
  • 24
  • 23
  • 23
  • 22
  • 15
  • 14
  • 14
  • 14
  • 11
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

'n Kritiese beskouing van die beheertaak in die partikuliere onderneming in die Republiek van Suid-Afrika

Pretorius, Johannes Stephanus 10 February 2014 (has links)
M.Com.(Business Management) / Beheer as een van die take van bestuur, soos reeds in 1916 deur Fayol beskryf, is in die moderne idioom nie 'n losstaande taak wat in isolasie beoefen word nie. Dit word vandag erken dat beheer aIleen sinvol toegepas kan word indien dit reeds vanaf die beplanningsfase doelbewus met die ander bestuurstake geintegreer is. Koontz & 0 I Donnell (1976 635) sê in die verband: "Before there can be any meaningful control, both plans and organization structure must be as clear, complete, and integrated as possible". Schutte (1981:14) bepleit 'n verdere veredeling van die integrasieproses wanneer hy sê: "If an organisation is to become more effective and efficient it has to move from an empirical type of management structure to a normative type ... ", waar die normatiewe bestuurstruktuur streef na die optimalisering van die tydsbesteding aan beplanning en beheer van bestuurders op die onderskeie vlakke in die organisasiestruktuur. Binne die beheertaak is beheerstelsels kernbelangrik vir die voortgesette suksesvolle funksionering van 'n onderneming, want sonder beheerstelsels is daar geen lewensvatbare meganisme om te verseker dat hulpbronne effektief toegedeel en benut word nie, aldus Steers, et al. (1985 : 207). Die behoefte aan beheermaatreëls en -tegnieke wat deurlopend aangepas word by die veranderende omstandighede waaraan bestuur blootgestel is, is 'n integrale komponent van die proses van voortdurende verfyning van die totale bestuurstaak...
72

A methodology for simulation and modeling of C41 simulation

Merritt, William Rogers 01 July 2001 (has links)
No description available.
73

Mission tasking of unmanned vehicles

Johnson, Jada E. 06 1900 (has links)
Approved for public release, distribution is unlimited / Unmanned vehicles (UVs) are expected to be an integral part of the U.S. Navy's expeditionary and carrier strike groups and are quickly being integrated into maritime operations. Command and control issues must be resolved, however, in order to utilize unmanned systems as intelligence, surveillance, and reconnaissance assets. The purpose of this research was to assess the current doctrine of mission tasking with respect to tactical unmanned vehicles (UVs) and determine a method for effectively tasking these systems. The problem was analyzed by applying the factors of METT-T: mission, enemy, terrain and weather, troops and support available, and time available to UV-enabled maritime missions. The analysis identified specific implications for unmanned vehicles and emphasized important considerations for tasking and allocating UVs. METT-T analyses generally result in courses of action, however, tasking is a command and control issue, and therefore, four organizational structures emerge for tasking UVs A significant finding of this study is that the current doctrinal framework of the composite warfare commander's concept can support tasking unmanned vehicles, but requires revision to effectively address UV allocation issues. / Ensign, United States Navy
74

Network centric warfare: a command and control perspective

Lim, Soon-Chia 03 1900 (has links)
Approved for public release, distribution is unlimited / This paper seeks to analyze the command and control issues arising from the advent of NCW. It aims to contribute to a practical understanding of the concept and an implementation approach for NCW by attempting to provide an analytical framework, the various options/models, and considerations across the spectrum of NCW issues. While information superiority is not a new concept, the blazing speed of advancement in information technologies has brought about dramatic changes to our lifestyles and profound changes in the conduct of modern warfare. This led to the birth of Network Centric Warfare (NCW). NCW offers great opportunities to dramatically enhance combat prowess by exploiting shared situational awareness, increased speed of command, improved systems' lethality and survivability, and greater flexibility achieved through self synchronization. However, these revolutionary changes do not depend on technology alone. In order to achieve the full promise of NCW, the entire span of elements ranging from organization, doctrine, and operational concepts to training must co-evolve. The success of NCW is dependent on aligning the organization's commitment, resources and efforts, fostering a learning and innovative culture, constructing a seamless, robust and secure infostructure, and establishing measures of effectiveness of C2. The journey to NCW is not a linear process, but rather a spiral developmental process. Continued evolution and efforts are required to shape and deliver the enhanced combat capability as the apex of maturity of the spiraling cone. / Lieutenant Colonel, Republic of Singapore Air Force
75

Command structure of the ballistic missile defense system

Weller, David B. 03 1900 (has links)
Approved for public release; distribution is unlimited. / The United States is embarking on a course of designing and fielding a Ballistic Missile Defense System (BMDS) to protect the US and her citizenry against ballistic missile attacks. The BMDS will need a Command and Control, Battle Management, and Communications (C2BMC) organization/system to support military and national decision makers in times of crisis. The C2BMC must also be able to react quickly once a missile event has occurred. This thesis will cover the doctrinal issues with merging Theater Missile Defense (TMD) and the National Missile Warning System into one system, how the Unified Command Plan affects missile defense efforts, the lessons learned from Desert Storm, and presents alternative chains of command that might allow the BMDS to engage threat missiles in a timely and efficient manner. Preliminary findings indicate that a 'flattened' chain of command for missile defense forces seems to be a positive starting point for the initial deployment of the BMDS. / Lieutenant Commander, United States Navy
76

Modeling the use of the AJCN in a tactical environment / Modeling the use of the Adaptive Joint C4ISR Node in a tactical environment

Watts, Krista L. 06 1900 (has links)
The Adaptive Joint Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Node (AJCN) is a new C4ISR system with four functional capabilities: communications, signal intelligence (SIGINT), electronic warfare (EW) and Information Operations. This thesis evaluates the first three capabilities of the AJCN: communications, SIGINT and EW. Simulation is used as a time- and cost-effective way to model the AJCN's capabilities. Eleven communications and combat effectiveness MOE are used to evaluate the AJCN's performance. Point of Attack 2, a tactical simulation with an extensive database is used to replicate the AJCN and UA operations. Results of the analysis include: 1) the AJCN significantly increased friendly detection of enemy forces; 2) the AJCN significantly decreased average message transmittal time and the number of failed messages; 3) the AJCN increased the friendly force's capability to jam and intercept enemy messages.
77

Integration of mini-UAVs at the tactical operations level implications of operations, implementation, and information sharing / Integration of mini-unmanned aerial vehicles at the tactical operations level

Crouch, Collier Craig. 06 1900 (has links)
Small units maneuvering on the battlefield have little time to establish data links and interface with the Global Information Grid (GIG) while trying to achieve an objective. The bandwidth and interface requirements necessary to receive live data from current strategic level systems limit the small unit operational user's ability to receive and act upon data and intelligence. Without the ability to interface with current strategic-level UAV assets, these small units are left without a comprehensive operational picture. Mini-UAVs offer the capability for the tactical user, in a variety of missions, to have direct control over the aerial asset without intervention from higher authority. Organic UAV assets can be used to collect data relevant to small units without the need for connecting to intelligence systems. This offers increased mobility and a dedicated collection platform; however, there are still drawbacks to this capability. This thesis examines mini-UAVs, and their integration into the Coalition Operating Area Surveillance and Targeting System (COASTS) network.
78

Border monitoring based on a novel PIR detection model

Dikmen, Iskender 03 1900 (has links)
Approved for public release, distribution unlimited / Improvements in technology have enabled the development of cost-effective, low-power, multifunctional wireless sensor nodes, which are used in various applications including surveillance and intrusion detection. We have made experiments in order to discover the detection probability of the Crossbow MSP410 mote sensor nodes. We have developed a new PIR detection model, which has a high probability detection region and a low probability detection region, for MSP410 mote sensor nodes based on the observed probabilities. The PIR model is used in the proposed sensor placement strategy for MSP410 mote sensor nodes intended for a border monitoring scenario. The detection probability of the low probability region of the new PIR detection model is increased by overlapping with the low probability region of the neighboring sensor nodes in the proposed sensor placement strategy.
79

Information security requirements for a coalition wide area network

McGovern, Susan C. 06 1900 (has links)
To achieve information superiority in a coalition environment the U. S. has to seamlessly integrate coalition members, both NATO and Non-NATO, into its command and control processes along all echelons of military operations. In a coalition environment, it is extremely challenging to fuse multinational information systems to achieve seamless integration. This thesis focuses on the security issues that are involved in establishing coalition network interoperability. The coalition environment is defined in terms of purpose, command structure, mission area, and control functions. Network and information protection are discussed in terms of minimizing the threats to information systems security. Coalition information system user requirements are defined and some of the security mechanisms required to meet those requirements are discussed. Current solutions to secure coalition network interoperability are surveyed, followed by conclusions, recommendations and areas for further study. / US Navy (USN) author
80

System effectiveness analysis for command and control

Bouthonnier, Vincent January 1982 (has links)
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 1982. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING / Bibliography: leaves 89-90. / by Vincent Bouthonnier. / M.S.

Page generated in 0.1077 seconds