• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 754
  • 350
  • 73
  • 73
  • 73
  • 73
  • 73
  • 72
  • 48
  • 31
  • 9
  • 5
  • 5
  • 4
  • 3
  • Tagged with
  • 1704
  • 1704
  • 271
  • 254
  • 245
  • 209
  • 186
  • 186
  • 175
  • 168
  • 145
  • 138
  • 137
  • 128
  • 125
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
601

Software Communications Architecture (SCA) compliant software defined radio design for IEEE 802.16 wirelessman-OFDMtm transceiver

Low, Kian Wai 12 1900 (has links)
Demands for seamless mobile communications are driving the research and development of software defined radio (SDR), which enables a single terminal to transmit and receive in distinct wireless systems through a simple change in software to reconfigure the terminal's functions. Its application areas include military use, home networks, intelligent transport systems and cellular communications. Several SDR software architectures have been developed during the last few years. One implementation of the Software Communications Architecture is the Open Source SCA Implementation
602

Shipboard wireless sensor networks utilizing Zigbee technology

Zacot, Chimi I. 09 1900 (has links)
This thesis studies the feasibility of utilizing Zigbee standard devices to create a shipboard wireless sensor network. Two primary methods were used to demonstrate feasibility. The first method demonstrated initial feasibility with a series of laboratory tests. The tests included range, reliability, and battery life tests. In the second portion, a prototype pressure sensor was created by matching a low power pressure transducer to a Zigbee modem via an integrated DAQ unit. Supporting software was generated using LabVIEW 6.0 to act as a server program and allow a remote Integrated Condition Assessment System (ICAS) workstation to log in via a TCP/IP connection and monitor sensor data. The expected contribution from the research effort would a completely wireless sensor network which would result in a net savings in man hours required to maintain and monitor. The sensor network would be reliable, relatively inexpensive, and entirely COTS available. With an extended battery life of 18 to 24 months, even the battery replacement could be fit into a standard annual or bi-annual PMS cycle, minimizing the workload to maintain. Initial feasibility testing was completed satisfactorily and the prototype sensor was successfully created and integrated to interface with the existing sensor infrastructure.
603

Genetic algorithm based optimization of advanced solar cell designs modeled in Silvaco AtlasTM

Utsler, James 09 1900 (has links)
A genetic algorithm was used to optimize the power output of multi-junction solar cells. Solar cell operation was modeled using the Silvaco ATLASTM software. The output of the ATLASTM simulation runs served as the input to the genetic algorithm. The genetic algorithm was run as a diffusing computation on a network of eighteen dual processor nodes. Results showed that the genetic algorithm produced better power output optimizations when compared with the results obtained using the hill climbing/gradient approach.
604

Analysis of operational pace versus logistical support rate in the ground combat element of a Marine Expeditionary Brigade

Miner, Roy 09 1900 (has links)
, and the transportation capacity assets within the CSSE dedicated to moving supplies are all significant contributing factors in sustaining the movement of the GCE. This thesis defines a logistics process and develops a simulation where the GCE consumes logistical resources necessary to sustain its movement toward assigned objectives while being supported by a CSSE in an expanding maneuver warfare environment. We define a successful sustainment of the GCE and using logistic regression, confirm the above three factors contribute significantly to the success rate of sustainment in the simulation. Through regression and leverage plots we determine which of the three factors contribute significantly more to the responses of success and time. We also conclude through a sample means comparison the combination of factor values that achieve a minimal delay in sustainment for the GCE in the simulation.
605

Commercial off The Shelf (COTS) security issues and approaches

Doan, Dung. 09 1900 (has links)
Custom built products do not always meet the new Department of Defense (DoD) requirements. Their high cost and lengthy development cycle does not suit the Information Age where communication information and technology develop rapidly. To adapt to this new environment, Commercial off The Shelf (COTS) software products have become the core for Military systems. This is the only way to approach the readiness requirements for armed forces. Like any other products, COTS software brings a lot of advantages but also carries side effects for military systems. One of the most serious issues for military use of a COTS software product is its security. This thesis provides an analysis of approaches to identify the security vulnerabilities and recommends an acquisition approach to minimize the issue. It is not the intent of this thesis to find a universal approach to solve the security issue of COTS products.
606

A management perspective of the Department of Defense (DOD) Internet Protocol Version 6 (IPV6) transition plan, where it is today, and where it needs to be by the year 2008

Hart, Peter W. 09 1900 (has links)
Approved for public release, distribution unlimited / This thesis focused on the management aspects of the DoD IPv6 Transition Plan. It addressed the management required to transition the DoD computer systems from IPv4 to IPv6. The study identified how computer systems will be affected by the transition from IPv4 to IPv6. The advantages, disadvantages, and risks associated with the transition were analyzed to determine potential areas of improvement. The study provided recommendations that can be used before, during and after the transition. This thesis investigated the ramifications of transitioning to IPv6. It compared the Transition Plan to the current state of preparedness by DoD agencies. It determined whether or not IPv6 can be implemented by 2008. When possible, it identified where the DoD will have to concentrate its effort to ensure the transition goes smoothly and on time.
607

Environment behavior models for real-time reactive system testing automation

Aksu, Muharrem Ugur. 09 1900 (has links)
We explored the effectiveness of using attributed event grammars (AEG) based environment behavior models as a method for testing and analyzing real-time, reactive software systems. The AEG specifies possible event traces and provides a uniform approach for automatically generating and executing test cases. We have demonstrated the approach through a case study (Paderborn Shuttle System Control Software) and performed three kinds of experiments: software correctness testing, system performance analysis and study of design alternatives.
608

An exploration of equipping a future force warrior small combat unit with non-lethal weapons

Wittwer, Larry N. 06 1900 (has links)
The U.S. military has an increasing requirement to prepare for and conduct urban operations (UO). This UO requirement spreads across the spectrum of conflict, from high intensity combat to peacekeeping and humanitarian missions (Stability and Support Operations--SASO), often simultaneously. Regardless of which portion(s) of the warfare spectrum U.S. forces are involved in, urban engagements are inevitable and present major challenges. Superior standoff weapons ranges and combined arms tactics are quickly negated in the confined terrain of a complex and usually unfamiliar urban environment. Often considerably more challenging is the ability to differentiate the enemy from noncombatants--endangering our Soldiers and their mission. Conventional forces, armed only with traditional weapons, normally have two options: the threat of a violent response (passive) or the use of deadly force (active). These two extremes have virtually no middle ground. The reluctance of military and/or peacekeeping forces to employ deadly force on unconfirmed enemy targets creates a vulnerability. This vulnerability may be mitigated by equipping a small combat unit (SCU) with a viable alternative to deadly force-- non-lethal weapons (NLWs). Using an imperfect friend or foe identification modeling framework within an agent-based simulation (ABS), an NLW is essentially used to interrogate (determine the intent of the person in order to identify friend or foe) rather than attempt to incapacitate a target. To determine the impacts of employing NLWs in an urban combat environment (with civilians on the battlefield), three factors were varied across 15 design points: the ability of U.S. military forces to positively identify a target, the range of the selected NLW, and the distribution/number of NLWs in an SCU. By replicating each design point and analyzing the resulting output data, the following insights were determined: the use of NLWs does not degrade U.S. survivability; NLWs are essential to neutralizing suicide attacks; and NLWs decrease civilian casualties.
609

Deployment of 802.15.4 sensor networks for C4ISR operations

Ngo, Damian N. 06 1900 (has links)
The applications of wireless sensor networks (WSNs) have risen in recent years both in the civilian and military sectors. While a number of WSN-based systems have been proposed and developed, vast majority of them focus on capability demonstration rather than the issues of deployment. As a result, even though the systems can serve useful purposes, they are very hard to deploy. The objective of this thesis is to focus on the deployment issues of WSNs. In addition, this thesis assesses the optimal configurations and environment that enables the sensor networks to thrive in a C4ISR environment. This thesis presents a technology review of the ZigBee and the IEEE 802.15.4 standards which form the core technology in WSNs. The thesis also discusses the IEEE 802.15.4 Physical and Media Access Control Layers that comprise the bottom two layers of WSNs. This thesis also provides a brief introduction to the hardware and software that deal with WSN technology. Lastly, this thesis evaluates the military applications of WSNs. It is hoped that the military can employ wireless sensors to increase situational awareness, attain information superiority, and improve decision-making.
610

Experimentation in a collaborative planning environment

Smith, Diane M. 06 1900 (has links)
Research Enterprise (FIRE) system at NPS has facilitated rapid advancement of TW scope and capabilities as well as delivered a significantly improved final product to NETWARCOM.

Page generated in 0.0606 seconds