• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 3
  • 2
  • 1
  • Tagged with
  • 17
  • 17
  • 17
  • 7
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A discretionary-mandatory model as applied to network centric warfare and information operations

Hestad, Daniel R. 03 1900 (has links)
Approved for public release, distribution is unlimited / The concepts of DoD information operations and network centric warfare are still in their infancy. In order to develop concepts, the right conceptual models need to be developed from which to design and implement these concepts. Information operations and network centric warfare are fundamentally based on trust decisions. However, the key to developing these concepts is for DoD to develop the organizational framework from which trust, inside and outside, of an organization may be achieved and used to its advantage. In this thesis, an organizational model is submitted for review to be applied to DoD information systems and operational organizations. / Outstanding Thesis / Lieutenant, United States Navy
2

Network centric warfare: a command and control perspective

Lim, Soon-Chia 03 1900 (has links)
Approved for public release, distribution is unlimited / This paper seeks to analyze the command and control issues arising from the advent of NCW. It aims to contribute to a practical understanding of the concept and an implementation approach for NCW by attempting to provide an analytical framework, the various options/models, and considerations across the spectrum of NCW issues. While information superiority is not a new concept, the blazing speed of advancement in information technologies has brought about dramatic changes to our lifestyles and profound changes in the conduct of modern warfare. This led to the birth of Network Centric Warfare (NCW). NCW offers great opportunities to dramatically enhance combat prowess by exploiting shared situational awareness, increased speed of command, improved systems' lethality and survivability, and greater flexibility achieved through self synchronization. However, these revolutionary changes do not depend on technology alone. In order to achieve the full promise of NCW, the entire span of elements ranging from organization, doctrine, and operational concepts to training must co-evolve. The success of NCW is dependent on aligning the organization's commitment, resources and efforts, fostering a learning and innovative culture, constructing a seamless, robust and secure infostructure, and establishing measures of effectiveness of C2. The journey to NCW is not a linear process, but rather a spiral developmental process. Continued evolution and efforts are required to shape and deliver the enhanced combat capability as the apex of maturity of the spiraling cone. / Lieutenant Colonel, Republic of Singapore Air Force
3

Comando e controle no contexto da digitalização : um estudo com base em modelagem computacional / Command and control in the context of digitization: a study based on computational modeling

Bertol, Frederico Licks January 2018 (has links)
Este trabalho propõe uma discussão em torno dos impactos da digitalização sobre sistemas militares de comando e controle. A hipótese central é que o emprego intensivo de tecnologias digitais está associado a um maior risco de sobrecarga informacional nesses sistemas. Isso se aplica em especial às forças militares que adotaram doutrinas de viés tecnocrático, como a guerra centrada em redes. No primeiro capítulo, discutimos o contexto no qual nosso tema de pesquisa se insere, fazendo uma breve retrospectiva do processo de digitalização e também definindo alguns conceitos-chave. No segundo capítulo, em formato de artigo, apresentamos o modelo computacional que foi desenvolvido para simular o funcionamento de um sistema de comando e controle sob a condição de sobrecarga informacional. O artigo também reúne uma revisão crítica das abordagens sobre comando e controle, com ênfase na literatura sobre guerra centrada em redes. O terceiro e último capítulo traz algumas conclusões sobre o emprego da modelagem computacional como metodologia de pesquisa e o estado atual do debate sobre guerra centrada e redes. / This work proposes a discussion on the impacts of digitization over military command and control systems. The central hypothesis is that the intensive deployment of digital technologies is associated to a greater risk of informational overload in those systems. This applies especially to military forces that have adopted doctrines with a technocratic bias, such as the network-centric warfare. In the first chapter, we discuss the context that encompass our research topic, making a brief retrospective of the process of digitization and defining some key concepts. In the second chapter, in form of article, we present the computational model developed for simulating the operation of a command and control system under the condition of informational overload. The article also contains a critical review on the command and control approaches, with emphasis on the literature about network-centric warfare. The third and last chapter brings out some conclusions regarding the use of computational modeling as a research method and the current state of the debate on network-centric warfare.
4

Aircraft Trajectory Optimization with Tactical Constraints

Norsell, Martin January 2004 (has links)
Aircrafttrajectory optimization is traditionally used forminimizing fuel consumption or time when going from one flightstate to another. This thesis presents a possible approach toincorporate tactical constraints in aircraft trajectoryoptimization. The stealth technology of today focuses on making thetactics already in use more effective. Since tactics andstealth are closely interrelated, new and better results may beobtained if both aspects are considered simultaneously. Simplyreducing the radar cross section area in some directionswithout considering tactical aspects may result in little, ifany, improvement. Flight tests have been performed in cooperation withEricsson Microwave Systems and the Swedish Air Force FlightAcademy. The aircraft used was the subsonic jet trainer Saab105, designated SK60 by the Swedish Air Force. The results showa decrease of 40% in the time interval between the instant theaircraft was first detected until it could pass above the radarstation. This corresponds to a reduced radar cross section(RCS) in the direction from the aircraft to the radar of almost90%, if classical RCS reduction techniques would have beenapplied. If a modern aircraft with stealth properties would be used,the proposed methodology is believed to increase the possibleimprovements further. This is because the variation of themagnitude of RCS in different directions is greater for a shapeoptimized aircraft, which is the property exploited by thedeveloped method. The methods presented are indeed an approach utilizing theideas of the network centric warfare (NCW) concept. Themethodology presented depends on accurate information about theadversary, while also providing up-to-date information to theother users in the information network. The thesis focuses on aircraft but the methods are generaland may be adapted for missiles, shipsor land vehicles. Theproposed methods are also economically viable since they areuseful for existing platforms without costly modifications. Themethods presented are not limited to radar threats only. Thereasons for using radar in this thesis are the availablenon-classified data and that radar is known to pose a majorthreat against aircraft.
5

Aircraft Trajectory Optimization with Tactical Constraints

Norsell, Martin January 2004 (has links)
<p>Aircrafttrajectory optimization is traditionally used forminimizing fuel consumption or time when going from one flightstate to another. This thesis presents a possible approach toincorporate tactical constraints in aircraft trajectoryoptimization.</p><p>The stealth technology of today focuses on making thetactics already in use more effective. Since tactics andstealth are closely interrelated, new and better results may beobtained if both aspects are considered simultaneously. Simplyreducing the radar cross section area in some directionswithout considering tactical aspects may result in little, ifany, improvement.</p><p>Flight tests have been performed in cooperation withEricsson Microwave Systems and the Swedish Air Force FlightAcademy. The aircraft used was the subsonic jet trainer Saab105, designated SK60 by the Swedish Air Force. The results showa decrease of 40% in the time interval between the instant theaircraft was first detected until it could pass above the radarstation. This corresponds to a reduced radar cross section(RCS) in the direction from the aircraft to the radar of almost90%, if classical RCS reduction techniques would have beenapplied.</p><p>If a modern aircraft with stealth properties would be used,the proposed methodology is believed to increase the possibleimprovements further. This is because the variation of themagnitude of RCS in different directions is greater for a shapeoptimized aircraft, which is the property exploited by thedeveloped method.</p><p>The methods presented are indeed an approach utilizing theideas of the network centric warfare (NCW) concept. Themethodology presented depends on accurate information about theadversary, while also providing up-to-date information to theother users in the information network.</p><p>The thesis focuses on aircraft but the methods are generaland may be adapted for missiles, shipsor land vehicles. Theproposed methods are also economically viable since they areuseful for existing platforms without costly modifications. Themethods presented are not limited to radar threats only. Thereasons for using radar in this thesis are the availablenon-classified data and that radar is known to pose a majorthreat against aircraft.</p>
6

Comando e controle no contexto da digitalização : um estudo com base em modelagem computacional / Command and control in the context of digitization: a study based on computational modeling

Bertol, Frederico Licks January 2018 (has links)
Este trabalho propõe uma discussão em torno dos impactos da digitalização sobre sistemas militares de comando e controle. A hipótese central é que o emprego intensivo de tecnologias digitais está associado a um maior risco de sobrecarga informacional nesses sistemas. Isso se aplica em especial às forças militares que adotaram doutrinas de viés tecnocrático, como a guerra centrada em redes. No primeiro capítulo, discutimos o contexto no qual nosso tema de pesquisa se insere, fazendo uma breve retrospectiva do processo de digitalização e também definindo alguns conceitos-chave. No segundo capítulo, em formato de artigo, apresentamos o modelo computacional que foi desenvolvido para simular o funcionamento de um sistema de comando e controle sob a condição de sobrecarga informacional. O artigo também reúne uma revisão crítica das abordagens sobre comando e controle, com ênfase na literatura sobre guerra centrada em redes. O terceiro e último capítulo traz algumas conclusões sobre o emprego da modelagem computacional como metodologia de pesquisa e o estado atual do debate sobre guerra centrada e redes. / This work proposes a discussion on the impacts of digitization over military command and control systems. The central hypothesis is that the intensive deployment of digital technologies is associated to a greater risk of informational overload in those systems. This applies especially to military forces that have adopted doctrines with a technocratic bias, such as the network-centric warfare. In the first chapter, we discuss the context that encompass our research topic, making a brief retrospective of the process of digitization and defining some key concepts. In the second chapter, in form of article, we present the computational model developed for simulating the operation of a command and control system under the condition of informational overload. The article also contains a critical review on the command and control approaches, with emphasis on the literature about network-centric warfare. The third and last chapter brings out some conclusions regarding the use of computational modeling as a research method and the current state of the debate on network-centric warfare.
7

MINUSMA a příklon OSN k proti-povstaleckým a proti-teroristickým operacím / MINUSMA and the United Nation's Turn to Counter-terrorism and Counter-insurgency

van Oppen Ardanaz, Gabriel January 2019 (has links)
This Master's thesis will focus on the newest trends in the field of United Nations (UN) peacekeeping operations that are moving the organization to unknown territory by deploying in theatres where missions are faced with asymmetric threats. In this regard, the United Nations Multidimensional Integrated Stabilization Mission in Mali (MINUSMA), constituted as a groundbreaking and innovative peacekeeping operation, is spearheading a realignment in peacekeeping that can potentially shape future operations to come, as mandates increasingly reflect roles in areas such as counter-insurgency and counter-terrorism. The core objective of this study will be to analyze why MINUSMA is being forced to go green while studying how it is doing so, reflecting on past experiences from other operations such as the International Stabilization Assistance Force (ISAF) in Afghanistan and the Multi-National Force in Iraq (MNF-I), that have guided changes in MINUSMA's doctrines and capabilities. Gabriel van Oppen Ardanaz
8

En framtida resurs eller ett arv från det förflutna? : en teoriprövande enfallsstudie om nätverksbaserat försvar i Irak

Samor, Adam January 2020 (has links)
The theory of network centric warfare has since its introduction in the early 2000s experienced both a substantial hype and spectacular collapse. Various studies have focused on the theory’s ability to increase mission effectiveness, predominantly within sea and air operations, whilst the domain of land warfare remains largely uncharted. This single case study assesses the theory’s ability to deliver mission effectiveness in ground combat. The case chosen for the study was the U.S. army 3rd Infantry Division and their offensive during the invasion of Iraq 2003. It is concluded that, while a digitalized force, the interoperability within the division was low, effectively excluding definite claims of network centric warfare’s ability to produce mission effectiveness in the land warfare domain. Being one of a few studies on this complex domain, these results warrant for further research. In addition to its findings the study provides an additional tool for how the effects and workings of network centric warfare may be understood and studied in the future.
9

A computational approach to achieve situational awareness from limited observations of a complex system

Sherwin, Jason 06 April 2010 (has links)
At the start of the 21st century, the topic of complexity remains a formidable challenge in engineering, science and other aspects of our world. It seems that when disaster strikes it is because some complex and unforeseen interaction causes the unfortunate outcome. Why did the financial system of the world meltdown in 2008-2009? Why are global temperatures on the rise? These questions and other ones like them are difficult to answer because they pertain to contexts that require lengthy descriptions. In other words, these contexts are complex. But we as human beings are able to observe and recognize this thing we call 'complexity'. Furthermore, we recognize that there are certain elements of a context that form a system of complex interactions - i.e., a complex system. Many researchers have even noted similarities between seemingly disparate complex systems. Do sub-atomic systems bear resemblance to weather patterns? Or do human-based economic systems bear resemblance to macroscopic flows? Where do we draw the line in their resemblance? These are the kinds of questions that are asked in complex systems research. And the ability to recognize complexity is not only limited to analytic research. Rather, there are many known examples of humans who, not only observe and recognize but also, operate complex systems. How do they do it? Is there something superhuman about these people or is there something common to human anatomy that makes it possible to fly a plane? - Or to drive a bus? Or to operate a nuclear power plant? Or to play Chopin's etudes on the piano? In each of these examples, a human being operates a complex system of machinery, whether it is a plane, a bus, a nuclear power plant or a piano. What is the common thread running through these abilities? The study of situational awareness (SA) examines how people do these types of remarkable feats. It is not a bottom-up science though because it relies on finding general principles running through a host of varied human activities. Nevertheless, since it is not constrained by computational details, the study of situational awareness provides a unique opportunity to approach complex tasks of operation from an analytical perspective. In other words, with SA, we get to see how humans observe, recognize and react to complex systems on which they exert some control. Reconciling this perspective on complexity with complex systems research, it might be possible to further our understanding of complex phenomena if we can probe the anatomical mechanisms by which we, as humans, do it naturally. At this unique intersection of two disciplines, a hybrid approach is needed. So in this work, we propose just such an approach. In particular, this research proposes a computational approach to the situational awareness (SA) of complex systems. Here we propose to implement certain aspects of situational awareness via a biologically-inspired machine-learning technique called Hierarchical Temporal Memory (HTM). In doing so, we will use either simulated or actual data to create and to test computational implementations of situational awareness. This will be tested in two example contexts, one being more complex than the other. The ultimate goal of this research is to demonstrate a possible approach to analyzing and understanding complex systems. By using HTM and carefully developing techniques to analyze the SA formed from data, it is believed that this goal can be obtained.
10

Ship Anti Ballistic Missile Response (SABR)

Johnson, Allen P., Breeden, Bryan, Duff, Willard Earl, Fishcer, Paul F., Hornback, Nathan, Leiker, David C., Carlisle, Parker, Diersing, Michael, Devlin, Ryan, Glenn, Christopher, Hoffmeister, Chris, Chong, Tay Boon, Sing, Phang Nyit, Meng, Low Wee, Meng, Fann Chee, Wah, Yeo Jiunn, Kelly, John, Chye, Yap Kwee, Keng-Ern, Ang, Berman, Ohad, Kian, Chin Chee 06 1900 (has links)
Includes supplemental material. / Based on public law and Presidential mandate, ballistic missile defense development is a front-burner issue for homeland defense and the defense of U.S. and coalition forces abroad. Spearheaded by the Missile Defense Agency, an integrated ballistic missile defense system was initiated to create a layered defense composed of land-, air-, sea-, and space-based assets. The Ship Anti-Ballistic Response (SABR) Project is a systems engineering approach that suggests a conceptualized system solution to meet the needs of the sea portion of ballistic missile defense in the 2025-2030 timeframe. The system is a unique solution to the sea-based ballistic missile defense issue, combining the use of a railgun interceptor and a conformable aperture skin-of-the-ship radar system.

Page generated in 0.1132 seconds