• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 596
  • 143
  • 34
  • 33
  • 28
  • 24
  • 12
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 6
  • 4
  • Tagged with
  • 1126
  • 252
  • 209
  • 146
  • 133
  • 119
  • 112
  • 112
  • 104
  • 101
  • 98
  • 95
  • 83
  • 82
  • 79
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

The development of an effective jam code against the conical-scan seeker

Malatji, Tsholofelo M. January 2020 (has links)
There remains a wide proliferation of second-generation frequency-modulated conical-scan seekers in the hands of irregular forces, while the understanding of what makes a jam signal effective remains unclear. It is generally known that the jam-to-signal (J/S) ratio, the jam signal frequency, and the duty cycle are the parameters that need consideration when developing an effective jam code, but the effect of using different jammer waveforms is not generally known. The general consensus in the literature seems to indicate that the effective jam signal parameters should be close to those of the target signal. It is known that the jam signal that matches the target signal will only beacon the target and not provide protection, therefore the jam signal should not perfectly match the target signal for effective jamming. However it is not clear which parameters should be close to and which should differ with the target signal. The literature also generally uses the low frequency type of jam signal and the effect of other types of waveforms is not known. Due to the sensitive nature of this topic, a simulation model and a hardware model of the conical scan seeker was not available to the author and as a result a representative simulation model was designed for conducting the experiments. The simulation model was extensively tested and validated to ensure representative behaviour. This study investigated the effect of the critical jam signal parameters against different jammer waveforms namely: the fixed carrier, low frequency, amplitude modulation (AM), frequency-modulation (FM) and the AM-FM jam codes. The study tested the effect of the critical parameters across the different jam waveforms and a comparison of the tested waveforms was conducted. The parameters used to compare the jam signals were the maximum achieved seeker error, the minimum J/S ratio required to achieve a significant effect, the range of effective frequencies or modulation indices and the lowest effective duty cycle. The AM jam signal achieved the greatest seeker error when compared to the other jam waveforms with a maximum error of 1.1°. The AM jam signal however achieves this error, with a J/S ratio of 50. The AM-FM jam signal achieved an error of 0.97° at a J/S ratio of 20 which is less than half of the required J/S ratio with the AM jam signal. The AM-FM hybrid jam signal was found to be the most robust in a wide range of modulation indices. This jam waveform was found to be the least sensitive against changes in the modulation index. The jam signal was found to be less power intensive when compared with other waveforms since significant jam effect was achieved at low J/S ratios. The best parameter combination for this jam signal was a J/S ratio of 20, a modulation index of 2.5, a modulation frequency of 100 Hz and a duty cycle of 50%. The maximum seeker error induced by this parameter combination is 0.97°. With the stated advantages, the AM-FM hybrid jam signal was found to be the most effective jam signal against the conical-scan seeker. Contrary to the general guide provided in the literature, the most effective jam signal does not contain parameters that are similar to the target induced parameters. The conclusion of this work was therefore that the most effective jam signal does not necessarily have to be similar to the target signal to be effective against the conical-scan seeker. The unique result found in this study is attributed to the wide range of jam signal waveforms that were tested. The results show that the effects of the critical parameters (J/S ratio, frequency and duty cycle) vary with the change in jam waveform. / Dissertation (MEng)--University of Pretoria, 2020. / Electrical, Electronic and Computer Engineering / MEng / Unrestricted
102

Ruská Hybridní Válka na Ukrajině: Komparativní Analýza Dvou Případů a Identifikace Kritických Prvků v Úspěšné Aplikaci Hybridní Taktiky / Russian Hybrid Warfare in Ukraine: Comparative Analysis of Two Cases and Identification of Critical Elements in the Successful Application of Hybrid Tactics

Starodubtseva, Albina January 2021 (has links)
After the military intervention in Ukraine in 2014, and the swift, bloodless annexation of Crimea, the international community recognized Russia as an expert on hybrid warfare. However, the ongoing conflict in Donbas unleashed by Moscow during the second less successful hybrid campaign remains a sore point not only for Ukraine but also for Russia which has to cope with costly consequences in order not to lose in the East of Ukraine and more importantly in its undeclared war on the West. This thesis conducts a comparative analysis of two Russian hybrid warfare models: (1) in Crimea; (2) in Eastern Ukraine, and focuses on the following research questions: Why was the Russian hybrid warfare in Crimea more successful than in Donbas? What measures can the state take to improve its ability to face hybrid attacks? The findings reveal that despite the presence of a set of common factors, the different degrees of success and outcomes of both cases are attributable to the fact that successfully employing the full spectrum of hybrid warfare, is actually bound not only to a number of prerequisites but also with specific favorable features of the conflict zone and several critical elements. While hybrid tactics vary depending on country and region, it is built on exploiting the enemy's vulnerabilities, the...
103

Legal aspects of the use of force in space

Gleeson, Patrick K. January 2005 (has links)
No description available.
104

Application of dynamic programming to select tactics for air-to-ground attack under uncertainty /

Fawcett, Clifford Don January 1969 (has links)
No description available.
105

Reformed Demonology: The Theology and Practice of Spiritual Warfare in English Puritanism

Sweeney, Thomas January 2011 (has links)
The Puritan theology and practice of spiritual warfare differed in significant ways from that of their medieval precursors and their Roman Catholic contemporaries. These differences are primarily attributable to the Puritan doctrines of divine sovereignty and human depravity. Puritan theology and practice is categorized under four systematic headings of demonology: the origin and nature of Satan and his demons; demonic operations in history; how Satan assaults believers today; and how Christians can defend themselves from those assaults. Each chapter draws together the teaching found in Puritan spiritual warfare literature about that heading and demonstrates how the doctrines of divine sovereignty and human depravity undergird that teaching. The thesis concludes by proposing some historically responsible applications for modern-day spiritual warfare practitioners from the Puritans. / Thesis / Master of Arts (MA)
106

Evidence for Warfare on Crete during the Early and Middle Bronze Age

McCreery, Allyson Marie January 2010 (has links)
This thesis analyzes the role of warfare on Crete during the Early and Middle Minoan periods (EM and MM). Defensive architecture and weaponry production, utilization and representation are used as evidence for warfare during these periods. Furthermore, this thesis builds upon the scholarship of Minoan warfare in order to define the limitations of the defensive capabilities of Minoan Crete. The EM and MM periods on Crete show a slow advancement towards more sophisticated warfare practices. This is demonstrated by the intensification of defensive architectural programs and advanced weaponry technology of the early MM period. At the same time, population increase and social complexity may have caused extensive tension within communities, perhaps causing an increase in small-scale warfare or violence. Additionally, trade with settlements in the Aegean and the Levant may have inspired and initialized new practices in defensive mechanisms. Thus, the archaeological record of EM and MM Crete provides enough evidence to suggest warfare not only existed, but continually advanced in strategy and tactics. / Art History
107

Airmen first shaping the expeditionary air force for counterinsurgency

Kostelnik, Edward A. 09 1900 (has links)
This thesis attempts to convince Air Force leadership to shift its approach to expeditionary airpower in counterinsurgency (COIN) from one that emphasizes advanced technology for striking targets to one which focuses on airmen to influence indigenous populations. Judging history, airpower will certainly play a supporting role in any effort to quell insurgency through reconnaissance, airlift, and close air support. Thus, wherever the American military deploys for COIN, the Air Force will not only operate, but will also deploy substantial numbers of expeditionary airmen. This forward presence of American airmen at expeditionary airbases enables the Air Force to participate in pacification where it most counts on the ground, in the surrounding community, and among the indigenous population. To contribute more fully, airmen must comprehend the nature of insurgency to reveal the unique challenges it poses for airpower. To meet these challenges, airmen must develop an appropriate strategic framework for waging COIN so as to correctly shape the expeditionary Air Force by exploiting its own human capital to solve human problems. By bolstering its aviation advisors and security forces, and creating its own cadre of civil affairs airmen, the Air Force can most significantly improve its effectiveness in COIN.
108

An exploration of equipping a future force warrior small combat unit with non-lethal weapons

Wittwer, Larry N. 06 1900 (has links)
The U.S. military has an increasing requirement to prepare for and conduct urban operations (UO). This UO requirement spreads across the spectrum of conflict, from high intensity combat to peacekeeping and humanitarian missions (Stability and Support Operations--SASO), often simultaneously. Regardless of which portion(s) of the warfare spectrum U.S. forces are involved in, urban engagements are inevitable and present major challenges. Superior standoff weapons ranges and combined arms tactics are quickly negated in the confined terrain of a complex and usually unfamiliar urban environment. Often considerably more challenging is the ability to differentiate the enemy from noncombatants--endangering our Soldiers and their mission. Conventional forces, armed only with traditional weapons, normally have two options: the threat of a violent response (passive) or the use of deadly force (active). These two extremes have virtually no middle ground. The reluctance of military and/or peacekeeping forces to employ deadly force on unconfirmed enemy targets creates a vulnerability. This vulnerability may be mitigated by equipping a small combat unit (SCU) with a viable alternative to deadly force-- non-lethal weapons (NLWs). Using an imperfect friend or foe identification modeling framework within an agent-based simulation (ABS), an NLW is essentially used to interrogate (determine the intent of the person in order to identify friend or foe) rather than attempt to incapacitate a target. To determine the impacts of employing NLWs in an urban combat environment (with civilians on the battlefield), three factors were varied across 15 design points: the ability of U.S. military forces to positively identify a target, the range of the selected NLW, and the distribution/number of NLWs in an SCU. By replicating each design point and analyzing the resulting output data, the following insights were determined: the use of NLWs does not degrade U.S. survivability; NLWs are essential to neutralizing suicide attacks; and NLWs decrease civilian casualties.
109

Biothreat and policy pathways : influences upon current bioterrorism policies in the UK

Ilchmann, Kai-Bastian January 2012 (has links)
The threat of terrorism, and in particular the threat of terrorists using biological weapons, has grown since the early 1990s, over the decade the assessment and perception of threat escalated despite an absence of biological weapons use. This research explores policy responses to the threat from bioterrorism in the UK between 1990 and 2005. A case study approach is used to examine the emergence and rise of the bioterrorism threat, and the institutional arrangement in place to confront that threat. The dissertation further investigates the construction of the threat narrative. The policy area of bioterrorism is obscured by secrecy. Therefore, this dissertation looks towards policy responses to pandemic influenza, and uses responses to pandemic influenza as a heuristic device to illustrate the difficulties of risk assessment and the accompanying institutional complexity. The study posits that traditional, academic risk assessment methodologies do not appear to have as large an influence as the narratives. Furthermore, the prevailing conceptualisation of the bioterrorism threat is the product of the confluence of three threat narratives. These narratives have become entangled and subsequently embedded in the institutional response. Moreover, a number of events have influenced and shaped the threat narrative of bioterrorism. First, a change in perception (sarin, 1995); then a jolt to the political and institutional structures (September 11, 2001); and finally, further bombings and plots have augmented the threat narrative (Madrid & London). This study is positioned at the intersection of policy studies and risk assessment, contributing to an understanding of the formation of institutional threat perceptions.
110

none

Tang, Tien-fu 30 August 2009 (has links)
none

Page generated in 0.042 seconds