• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 5
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 49
  • 49
  • 20
  • 12
  • 9
  • 9
  • 9
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • 7
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Center of gravity in the asymmetric environment applicable or not?

Kelly, Rodney D. 06 1900 (has links)
The military concept of a Center of Gravity (COG) in conflicts, introduced by Carl von Clausewitz in the 1820s, is now an element of numerous military doctrines that planners draw on in designing strategies for winning wars. Over the last twenty-five years, the concept has become increasingly central to U.S. warfare doctrine. The world has changed a great deal since the introduction of COG. And in today's asymmetric environment, in which non-state actors use unconventional tactics, it is becoming extremely difficult to apply the COG concept. The primary reason for this difficulty is that non-state actors do not operate as a unitary body, which makes it difficult to target a COG that would lead to a decisive victory. The purpose of this thesis is to analyze both conflicts in which state-sanctioned militaries' applied the COG concept and conflicts in which non-state actors used asymmetric tactics. The thesis attempts to determine the applicability of COG in an asymmetric environment. If the Center of Gravity concept is determined inapplicable, then the U.S. military must either redefine it or create a new means to deal with this new type or warfare. / US Navy (USN) author.
2

Aerially deployed real-time targeting sensor net

Diamond, Scott M. 06 1900 (has links)
This thesis focuses on developing and analyzing a model for an aerially deployed real-time targeting sensor net to close the current gap that exists between the potential technological-doctrinal capability within society and that of the military. It outlines current real-time targeting need due to the decomposition of warfare after the fall of the Soviet Union, and portrays the targeting discrepancies in the Global War on Terror. From end-user surveys requirements are layed out for a system of systems to meet targeting needs. A feasible solution consisting of a system architecture anchored in existing commercial off the shelf technology is proposed to meet the discrete deliverables necessary to accomplish targeting goals to deal with asymmetric threats in opaque environments. / US Navy (USN) author.
3

Frigate defense effectiveness in asymmetrical green water engagements

Abel, Heiko. January 2009 (has links) (PDF)
Thesis (M.S. in Modeling, Virtual Environments and Simulation (MOVES))--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Sanchez, Paul J. ; Second Reader: Kline, Jeffrey E. "September 2009." Author(s) subject terms: Agent Based Simulation, Asymmetric Warfare, Data Farming, Design of Experiments, Evolving Design, MANA, Modeling and Simulation, Naval Swarm Defense, Robust Design, Regression Analysis, Simulation Experiments and Efficient Design Center, Taguchi Method Description based on title screen as viewed on November 03, 2009. DTIC Descriptor (s): Frigates, Theater Level Operations, Defense Systems, Experimental Design, Confined Environments, Asymmetry, Statistical Analysis, Sea Water, Small Ships, Threats, Survivability, Weapons, Theses DTIC Identifier (s): SSTR (Stability Security Transition and Reconstruction), Asymmetric Warfare, Mana Includes bibliographical references (p. 125-132). Also available in print.
4

Implementation of a modular Fly away Kits (FLAK) for C4ISR in order to counter asymmetric threats in the coalition riverine and maritime theatres

Hochstedler, Robert A. 06 1900 (has links)
This research analyzes the design and implementation of a Maritime Command, Control, Computer, and Communications for Intelligence, Surveillance, and Reconnaissance (C4ISR) fly away kit (FLAK) in order to combat asymmetric threats in the coalition maritime environment. This FLAK will be modular, adaptable, scalable, and secure end to end, composed of routable networks, and built entirely from commercial off the shelf technologies (COTS). Basing measures of effectiveness (MOE) on the recently published Quadrennial Defense Report (QDR) and the Numbered Fleet Commanders Communication Message, these kits will be tested with the goal of fulfilling thirteen of the fifteen high priority short-falls in the modern United States CIV-MIL and Coalition Forces' abilities to conduct multiple missions in the current brown (riverine), green (littoral), and blue (deep water) operational theatres. The Maritime FLAK will be designed with the intent of increasing the US forward presence and extending the C4ISR into restricted maritime theatres. Since US forces cannot intervene directly into regions like the Straits of Malacca, but can support coalition forces through advisors and technological adaptations, modular solutions to extend C4ISR into these maritime territories are needed. Furthermore, due to the adaptability and scalability of the technologies to be implemented into the maritime FLAK, these completed kits will be able to be used by the recently formed Naval Expeditionary Combat Command (NECC) in current operations in the Global War on Terrorism. / US Navy (USN) author.
5

Why the weak win wars a study of the factors that drive strategy in asymmetric conflict /

Hartigan, Jake. January 2009 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Rothstein, Hy. Second Reader: Blanken, Leo. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: Strategy, asymmetric warfare, unconventional warfare, Arreguin-Toft, probability of victory, institutional predisposition, Afghanistan. Includes bibliographical references (p. 77-82). Also available in print.
6

Center of gravity in the asymmetric environment : applicable or not? /

Kelly, Rodney D. January 2006 (has links)
Thesis (M.A. in National Security Affairs) -- Naval Postgraduate School, June 2006. / Thesis advisor : Richard Grahlman. "June 2006." Includes bibliographical references (p. 61-63). Full text available on Public Stinet.
7

An analysis of China's information technology strategies and their implications for US national security / An analysis of China's information technology strategies and their implications for US national security Republic of China

Tsai, Wen-Hsiang. 06 1900 (has links)
In the past decades, China's military modernization and economy fast development has increasingly attracted international attention, especially the United States. In addition, the PLA has begun to study the revolution in the military affairs (RMA) by focusing on asymmetric warfare capabilities under high-tech conditions. China definitely believes that asymmetric warfare operations have the advantage of creating a more smart attack style to avoid directly facing U.S. powerful military strength. In summary, asymmetric warfare operations are considered by the PLA as a kind of warfare that combined both the thinking of China's classic military strategist Sun Tzu "using the inferior to defeat the superior" and the demand of the modern information technology such as IW applications. In face of China's development of asymmetric warfare capabilities, the United States must deeply think about how to deal with the threat from China's asymmetric warfare operations, which is gradually becoming the superpower in the world.
8

Optimization-based allocation of force protection resources in an asymmetric environment

DeGregory, Keith W. January 1900 (has links) (PDF)
Thesis (S.M.)--Massachusetts Institute of Technology, 2007. / Title from title screen (viewed Apr. 16, 2008). "June 2007." Includes bibliographical references (p. 137-138). Also issued in paper format.
9

The rationality of nonconformity the United States decision to refuse ratification of Protocol I Additional to the Geneva Conventions of 1949 /

Childers, Rex A. January 2008 (has links)
Thesis (M.A.)--Bowling Green State University, 2008. / Document formatted into pages; contains vi, 117 p. Includes bibliographical references.
10

China's development of asymmetric warfare and the security of Taiwan, Republic of China /

Jinn, Guo-Woei. January 2004 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, Dec. 2004. / Thesis Advisor(s): Lyman Miller. Includes bibliographical references (p. 79-85). Also available online.

Page generated in 0.0788 seconds