Spelling suggestions: "subject:"eomputer barograms"" "subject:"eomputer _programs""
611 |
Historical analysis of the Battle of Little Bighorn utilizing the Joint Conflict and Tactical Simulation (JCATS)Pecha, Keith E., Charlebois, Michael A. 06 1900 (has links)
Approved for public release; distribution is unlimited / The purpose of this thesis is to determine which of three competing theories of what occurred at the Battle of Little Bighorn is the most plausible by utilizing the Joint Conflict and Tactical Simulation (JCATS) program developed by Lawrence Livermore National Laboratory. There are many practical gains that JCATS can provide today's military with regard to training and educating soldiers for future conflicts. JCATS can be used to train soldiers in planning and executing missions in ways not feasible with conventional field training exercises utilizing live bodies and real vehicles. It is also increasingly being used for actual mission planning. However, very little has been done using JCATS to war-game past operations. There are two points to be gained by using JCATS to model a historical battle such as the Battle of Little Bighorn. First, it validates the ability of JCATS to accurately model actual historical scenarios while identifying many of the specific limitations of the program. If the military is going to use computer simulations such as JCATS in lieu of field training exercises to train soldiers, it must first be determined if the program produces realistic results. Modeling an actual battle and comparing the results of the program with what actually occurred is one means of doing so. Second, modeling historical battles, particularly defeats, may assist in discovering lessons learned. In a field training exercise, a defeated force can be brought back to life and given another opportunity to apply the lessons learned from its previous defeat. Real battles afford no such opportunity. Computer modeling of past battles would allow military planners to isolate individual events and decisions and study their impact on the outcome. / Major, United States Army
|
612 |
A vibration analysis system using spectral estimation techniquesVerser, Brick Andrew. January 1986 (has links)
Call number: LD2668 .T4 1986 V475 / Master of Science / Electrical and Computer Engineering
|
613 |
A data dictionary for the INGRES data base management systemWilson, Loren. January 1986 (has links)
Call number: LD2668 .T4 1986 W546 / Master of Science / Computing and Information Sciences
|
614 |
ERP: a computerized geo-information data bank for environmental resource planningKuntz, Thomas Michael. January 1975 (has links)
Call number: LD2668 .P7 1975 K85
|
615 |
A concurrency method: an implementation on a 3B2 networkMorrell, John E. January 1986 (has links)
Call number: LD2668 .T4 1986 M67 / Master of Science / Computing and Information Sciences
|
616 |
A Prolog prototype of a module development systemPeak, Marita E. January 1986 (has links)
Call number: LD2668 .T4 1986 P42 / Master of Science / Computing and Information Sciences
|
617 |
Design of a seismic data acquisition system and automatic triggering softwareCole, Robert, Sidney John January 1991 (has links)
A dissertation submitted to the Faculty of Science, University of the Witwatersrand, Johannesburg, for the degree Master of Science / The recording of seismic signals in remote areas requires a portable, low
power recording system that can be left in the field for a few weeks at a time.
Three components of ground motion are generally measured, and some form
of event recording, rather than continuous recording should be available. [Abbreviated abstract. Open document to view full version] / AC2017
|
618 |
A report on a C-E technical translation project using Google TranslateMai, Guan Hui, Jennifer January 2018 (has links)
University of Macau / Faculty of Arts and Humanities. / Department of English
|
619 |
Fault tolerance and reliability patternsUnknown Date (has links)
The need to achieve dependability in critical infrastructures has become indispensable for government and commercial enterprises. This need has become more necessary with the proliferation of malicious attacks on critical systems, such as healthcare, aerospace and airline applications. Additionally, due to the widespread use of web services in critical systems, the need to ensure their reliability is paramount. We believe that patterns can be used to achieve dependability. We conducted a survey of fault tolerance, reliability and web service products and patterns to better understand them. One objective of our survey is to evaluate the state of these patterns, and to investigate which standards are being used in products and their tool support. Our survey found that these patterns are insufficient, and many web services products do not use them. In light of this, we wrote some fault tolerance and web services reliability patterns and present an analysis of them. / by Ingrid A. Buckley. / Thesis (M.S.C.S.)--Florida Atlantic University, 2008. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2008. Mode of access: World Wide Web.
|
620 |
Towards a methodology for building reliable systemsUnknown Date (has links)
Reliability is a key system characteristic that is an increasing concern for current systems. Greater reliability is necessary due to the new ways in which services are delivered to the public. Services are used by many industries, including health care, government, telecommunications, tools, and products. We have defined an approach to incorporate reliability along the stages of system development. We first did a survey of existing dependability patterns to evaluate their possible use in this methodology. We have defined a systematic methodology that helps the designer apply reliability in all steps of the development life cycle in the form of patterns. A systematic failure enumeration process to define corresponding countermeasures was proposed as a guideline to define where reliability is needed. We introduced the idea of failure patterns which show how failures manifest and propagate in a system. We also looked at how to combine reliability and security. Finally, we defined an approach to certify the level of reliability of an implemented web service. All these steps lead towards a complete methodology. / by Ingrid A. Buckley. / Thesis (Ph.D.)--Florida Atlantic University, 2012. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2012. Mode of access: World Wide Web.
|
Page generated in 0.0661 seconds