• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 92
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 119
  • 119
  • 119
  • 45
  • 28
  • 23
  • 23
  • 22
  • 22
  • 15
  • 14
  • 14
  • 14
  • 11
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

A software prototype for a Command, Control, Communications and Intelligence (C³I) workstation

Coskun, Vedat. Kesoglu, Cengiz. January 1990 (has links)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 1990. / Thesis Advisor(s): Luqi.; Hughes, Gary. "December 1990." Description based on title screen as viewed on ... DTIC Descriptor(s): Computer programs, prototypes, display systems, costs, reliability, platforms, language, user needs, work stations, resources, message processing, ADA programming language, naval equipment, commonality, theses DTIC Identifier(s): Command control communications, prototypes, software engineering, computer programs, computer aided design, interfaces, communications networks, work stations, theses, real time, ADA programming languages, commonality, connectivity, weapons systems, tactical communications Author(s) subject terms: Computer aided prototyping, C³I systems, hard-real-time systems, user interface, ADA, command and control, prototyping language. Includes bibliographical references (p. 301-304). Also available in print.
32

Command structure of the ballistic missile defense system

Weller, David B. January 2004 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2004. / Title from title screen (viewed Nov. 10, 2004). "March 2004." Includes bibliographical references (p. 65-69).
33

Performance measure analysis of command and control organizational and task structures

Smith, Neil Albert. January 1996 (has links) (PDF)
Thesis (M.S. in Operations Research) Naval Postgraduate School, September 1996. / Thesis advisor(s): William G. Kemple. "September 1996." Includes bibliographical references (p. 121). Also available online.
34

Command generation for tethered satellite systems

Robertson, Michael James, January 2004 (has links)
Thesis (Ph.D.)--School of Mechanical Engineering, Georgia Institute of Technology, 2005. / Singhose, William, Committee Chair ; Banerjee, Arun, Committee Member ; Chen, Ye-Hwa, Committee Member ; Ebert-Uphoff, Imme, Committee Member ; Olds, John, Committee Member. Includes bibliographical references.
35

Command in air war : centralized vs. decentralized control of combat airpower /

Kometer, Michael W. January 1900 (has links)
Thesis (Ph. D.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology, Management, and Policy Program, 2005. / "May 2005". Includes bibliographical references. Also available via the Internet.
36

Requirements of the Navy's Tomahawk Theater Mission Planning system relating to object-oriented technology

Bozarth, John D. 30 March 2010 (has links)
It was discovered during the Gulf war that the current time required to plan a Tomahawk Land Attack Missile (TLAM) mission was too long and that the current mission planning system design was limited in its capabilities. The possibility of incorporating object-oriented technology into the TLAM Planning System (TPS) was invest i gated ; n order to reduce the time required to plan a particular mission and to increase the capabilities of mission planning. The current time to plan a Tomahawk mission is approximately over three hours. Ut i 1 i zing Object-Oriented Technology (DOT) within the TPS will reduce this time significantly. DOT also allows for the use of complex data transactions and data types such as voice, video, graphics, image and text. Utilizing complex data types in mission planning will increase mission capabilities and performance. / Master of Science
37

Designing a common interchange format for unit data using the Command and Control information exchange data model (C2IEDM) and XSLT

Hodges, Glenn A. 09 1900 (has links)
Approved for public release, distribution unlimited / Approved for public release; distribution is unlimited. / A common problem between Military applications and operators is the consistent and meaningful exchange of data. Currently, several models and simulations exist for the purposes of training and analyzing military data. Due to the absence of an agreed-upon standard with which to represent unit data, much is lost during interchange and applications are not maximized. This thesis is a step towards a solution. Extensible Markup Language (XML) technology has been widely accepted as a standard for representing information in such a way that it is self-documenting, self-validating and platform independent. By using the Command and Control Information Exchange Data Model (C2IEDM), formerly known as Generic Hub, and XML it is possible to develop a representation of unit data that is extensible and broadly useable by tactical systems and human operators alike. This thesis approaches the problem exploring the Model Driven Architecture (MDA) and the Extensible Modeling Simulation Framework (XMSF) as possible overarching architectural concepts for a global solution. The C2IEDM is used as the core data interchange model for this research and applies XML technologies, schema and the Extensible Stylesheet Language for Transformations (XSLT) to derive a formatted data representation that is acceptable within the Flexible Asymmetric Simulation Technologies (FAST) Toolbox. The transformation example serves as template for other simulation programs to follow for interchange through the common base model. This thesis shows that by using a common data representation like C2IEDM coupled with the power of XML and XSLT, unit information can be transformed and interchanged between applications. In order to accomplish this, an extensive analysis is done on recently performed and ongoing research as well as the development of exemplars to show how the proposed process is completed. The result of this work is a transformation of unit data extracted from an example C2IEDM instance file that is compliant with the schema for an actual unit order of battle tool used for modeling and simulation. / Major, United States Army
38

Comparisons of attacks on honeypots with those on real networks

Duong, Binh T. 03 1900 (has links)
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyber-attacks and attacker behavior. When implemented as part of a security posture, honeypots also protect real networks by acting as a decoy, deliberately confusing potential attackers as to the real data. The objective of this research is to compare attack patterns against a honeypot to those against a real network, the network of the Naval Postgraduate School. Collection of suspicious-event data required the implementation and setup of a honeypot, in addition to the installation and use of an intrusion-detection system. A statistical analysis was conducted across suspicious-event data recorded from a honeypot and from a real network. Metrics used in our study were applied to the alerts generated from Snort 2.4.3, an open-source intrusion detection system. Results showed differences between the honeypot and the real network data which need further experiments to understand. Both the honeypot and the real network data showed much variability at the start of the experiment period and then a decrease in the number of alerts in the later period of the experiment. We conclude that after the initial probing and reconnaissance is complete, the vulnerabilities of the network are learned and therefore fewer alerts occur; but more specific signatures are then aimed at exploiting the network.
39

TECCNET : a testbed for evaluating command and control NETworks

January 1982 (has links)
by Elizabeth R. Ducot. / "August 1982." / Bibliography: p. 61-62. / Air Force Office of Scientific Research contract AFOSR-80-0229
40

Problems of organizational structure in C3 systems

January 1982 (has links)
by Alexander H. Levis. / Bibliography: p. 54. / With: On modeling teams of interacting decisionmakers with bounded rationality / Alexander H. Levis, Kevin L. Boettcher. Cambridge, Mass. : Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, [1982] / "March, 1982." / NASA Grant No. NAG1-2

Page generated in 0.1483 seconds