• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 4
  • 1
  • Tagged with
  • 9
  • 9
  • 9
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Feasibility Study of Cellular Communication and Control of Unmanned Aerial Vehicles

Gardner, Michael Alan 12 1900 (has links)
Consumer drones have used both standards such as Wi-Fi as well as proprietary communication protocols, such as DJI's OcuSync. While these methods are well suited to certain flying scenarios, they are limited in range to around 4.3 miles. Government and military unmanned aerial vehicles (UAVs) controlled through satellites allow for a global reach in a low-latency environment. To address the range issue of commercial UAVs, this thesis investigates using standardized cellular technologies for command and control of UAV systems. The thesis is divided into five chapters: Chapter 1 is the introduction to the thesis. Chapter 2 describes the equipment used as well as the test setup. This includes the drone used, the cellular module used, the microcontroller used, and a description of the software written to collect the data. Chapter 3 describes the data collection goals, as well as locations in the sky that were flown in order to gather experimental data. Finally, the results are presented in Chapter 4, which draws limited correlation between the collected data and flight readiness Chapter 5 wraps up the thesis with a conclusion and future areas for research are also presented.
2

The Use of Open Architecture Systems in Cost Reduced Satellite Telemetry & Control Stations

Spielman, David R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 17-20, 1994 / Town & Country Hotel and Conference Center, San Diego, California / A comprehensive examination of the market demands for cost reduced satellite telemetry & control stations will be presented. These systems are implemented using flexible, open architecture-based high performance real-time systems. The trend for combining telemetry monitoring of satellite data with closed-loop satellite command and control functions will be presented. This combined functionality opens up the possibilities for completely integrated, reduced cost satellite control systems. The market forces driving the demand for this integrated functionality include the broadening of non-military satellite applications, the widening international deployment of commercial satellites and the accompanying drive toward decentralized satellite control. The major requirements for the telemetry processing and command & control functionality of the integrated, reduced cost satellite control system will be presented. These requirements include: full real-time performance for processing telemetry data; flexible architecture for the incorporation of a wide range of I/O devices; capability of performing real-time, closed-loop control based on conditions in the telemetry data; user friendly development environments for application-specific customization of the system; and low system costs with the capability of indigenous support. The divergent requirements of performance, flexibility and price of these integrated, reduced cost satellite control systems is made possible via the use of open architecture building blocks that include standard VME boards combined with specialized real-time software drivers and user oriented, flexible Graphical User Interface (GUI) software.
3

Functional Modeling of C<sup>2</sup>

Prytz, Erik January 2009 (has links)
<p>Command and Control (C2) refers to the process or function of commanding and controlling military or civilian units. For most military context C2 is exercised in an adversarial environment where two or more forces are fighting against each other. In these situations it is desirable to constrain the adversarial forces in order to prevent them from achieving their objectives. By maintaining an accurate view of the possible dependencies and couplings within the own forces and between the own and adversarial forces, constraints can be managed and coordinated.</p><p>The purpose of this thesis is to develop a model that is capable of capturing these dependencies and couplings. This model is developed using the Functional Resonance Analysis Method (FRAM; Hollnagel, 2004). FRAM builds on the assumption that all parts of the system can be described as functional units. These functional units can then be linked together to form large systems. The links themselves are defined by how a function may affect other functions or in turn be affected by them. This enables the model to incorporate complex interactions within the system as well as between two adversarial systems.</p><p>The microworld “Dynamiskt Krigsspel för Experiment” (DKE) was used to develop the model. A scenario with two teams battling in this adversarial microworld setting was analyzed in detail for this purpose. The developed model uses three different layers, or resolutions, of functions to capture all potential couplings between functions. The lowest level of functions, called the tactical level, is the physical actions of the units in the microworld. The next level, the operational level, concerns the more overarching goals for which the tactical functions are used. Last, the strategic level consists of the C2 functions, such as data collection, sensemaking and planning.</p><p>The developed model is then applied to the scenario in DKE and shown to be able to describe and explain all actions by the two adversary systems as well as the couplings and dependencies between them.</p>
4

C&amp;C architecture : Automation of the deployment of a sophisticated infrastructure, for new malicious uses, harder to detect

Glasser, Timon January 2021 (has links)
Today cybersecurity is becoming a major concern for all of society. Companies can lose billions of dollars because of cyberattacks. States need to keep the vital infrastructure of the country running and must prepare for cyberwar against cyberterrorism and other states. And finally, everyone can also suffer a cyberattack, like credit card stealing, ransomware asking for money, etc. In this tensed context, botnets and Remote Access Trojan are emerging as one of the major threats against cybersecurity.  In this master thesis we will focus on Command &amp; Control (C&amp;C) architectures, which can be used as a first step on a network, to compromise it entirely afterwards. To do so, the malware used to put in place the C&amp;C architecture must first bypass all antivirus protections, and then establish a connection with a C&amp;C server. This master thesis will be about the automation of the deployment of such architecture, which should be stealth enough to bypass the common protections.  This master thesis took part at Wavestone company, which performs cybersecurity audits. After a brief presentation of Wavestone, we will first explain why a C&amp;C architecture is very useful for auditors (and consequently for cybercriminals as well), and what steps will be taken to achieve this project. Then, we will focus on the history and the functioning of botnets: botnets are indeed the most common use of C&amp;C architecture. Afterwards, we will focus on the detection of a C&amp;C architecture, to understand what challenges the implementation will have to meet. Finally, we will present an implementation that was made during the thesis of an end-to-end C&amp;C scenario, based on an open software called SilentTrinity, and corresponding to the needs of the auditors. / I dag är cybersäkerhet en viktig fråga för hela samhället. Företag kan förlora miljarder dollar på grund av cyberattacker. Stater måste hålla landets vitala infrastruktur igång och måste förbereda sig för cyberkrig mot cyberterrorism och andra stater. Och slutligen kan alla också drabbas av en cyberattack, som t.ex. kreditkortsstöld, utpressningstrojaner som ber om pengar osv. I detta spända sammanhang framstår botnät och Remote Access Trojan som ett av de största hoten mot cybersäkerheten.  I denna masteruppsats kommer vi att fokusera på Command &amp; Control-arkitekturer, som kan användas som ett första steg i ett nätverk för att sedan kompromettera det helt och hållet. För att göra detta måste den skadliga kod som används för att sätta C&amp;C-arkitekturen på plats först kringgå alla antivirusskydd och sedan upprätta en anslutning till en C&amp;C-server. Denna masteruppsats kommer att handla om automatiseringen av införandet av en sådan arkitektur, som ska vara tillräckligt smygande för att kringgå de vanligaste skydden.  Denna masteruppsats deltog vid företaget Wavestone, som utför cybersäkerhetsrevisioner. Efter en kort presentation av Wavestone kommer vi först att förklara varför en C&amp;C-arkitektur är mycket användbar för revisorer (och följaktligen även för cyberkriminella), och vilka steg som kommer att tas för att genomföra detta projekt. Därefter kommer vi att fokusera på botnets historia och funktion: botnets är faktiskt den vanligaste användningen av C&amp;C-arkitektur. Därefter kommer vi att fokusera på upptäckten av en C&amp;C-arkitektur för att förstå vilka utmaningar som genomförandet måste möta. Slutligen kommer vi att presentera ett genomförande som gjordes under avhandlingen av ett C&amp;C-scenario från början till slut, baserat på en öppen programvara som heter SilentTrinity, och som motsvarar revisorernas behov.
5

Functional Modeling of C2

Prytz, Erik January 2009 (has links)
Command and Control (C2) refers to the process or function of commanding and controlling military or civilian units. For most military context C2 is exercised in an adversarial environment where two or more forces are fighting against each other. In these situations it is desirable to constrain the adversarial forces in order to prevent them from achieving their objectives. By maintaining an accurate view of the possible dependencies and couplings within the own forces and between the own and adversarial forces, constraints can be managed and coordinated. The purpose of this thesis is to develop a model that is capable of capturing these dependencies and couplings. This model is developed using the Functional Resonance Analysis Method (FRAM; Hollnagel, 2004). FRAM builds on the assumption that all parts of the system can be described as functional units. These functional units can then be linked together to form large systems. The links themselves are defined by how a function may affect other functions or in turn be affected by them. This enables the model to incorporate complex interactions within the system as well as between two adversarial systems. The microworld “Dynamiskt Krigsspel för Experiment” (DKE) was used to develop the model. A scenario with two teams battling in this adversarial microworld setting was analyzed in detail for this purpose. The developed model uses three different layers, or resolutions, of functions to capture all potential couplings between functions. The lowest level of functions, called the tactical level, is the physical actions of the units in the microworld. The next level, the operational level, concerns the more overarching goals for which the tactical functions are used. Last, the strategic level consists of the C2 functions, such as data collection, sensemaking and planning. The developed model is then applied to the scenario in DKE and shown to be able to describe and explain all actions by the two adversary systems as well as the couplings and dependencies between them.
6

Alternativa metoder för att kontrollera ett användargränsnitt i en browser för teknisk dokumentation / Alternative methods for controlling the user interface in a browser for technical documentation

Svensson, Cecilia January 2003 (has links)
<p>When searching for better and more practical interfaces between users and their computers, additional or alternative modes of communication between the two parties would be of great use. This thesis handles the possibilities of using eye and head movements as well as voice input as these alternative modes of communication. </p><p>One part of this project is devoted to find possible interaction techniques when navigating in a computer interface with movements of the eye or the head. The result of this part is four different controls of an interface, adapted to suit this kind of navigation, combined together in a demo application. </p><p>Another part of the project is devoted to the development of an application, with voice control as primary input method. The application developed is a simplified version of the application ActiViewer., developed by AerotechTelub Information&Media AB.</p>
7

Alternativa metoder för att kontrollera ett användargränsnitt i en browser för teknisk dokumentation / Alternative methods for controlling the user interface in a browser for technical documentation

Svensson, Cecilia January 2003 (has links)
When searching for better and more practical interfaces between users and their computers, additional or alternative modes of communication between the two parties would be of great use. This thesis handles the possibilities of using eye and head movements as well as voice input as these alternative modes of communication. One part of this project is devoted to find possible interaction techniques when navigating in a computer interface with movements of the eye or the head. The result of this part is four different controls of an interface, adapted to suit this kind of navigation, combined together in a demo application. Another part of the project is devoted to the development of an application, with voice control as primary input method. The application developed is a simplified version of the application ActiViewer., developed by AerotechTelub Information&amp;Media AB.
8

Den smarta kartan : En teoretisk diskussion om geografiskt informationssystem i ledningssystem

Brorson, Johan January 2011 (has links)
Den pågående utvecklingen med informationssystem och den ökade tillgången till information via dessa system ökar kraven på den militära personalen att hantera denna stora mängd information. Information om aktörer i ett stridsområde samt den terräng aktörerna befinner sig i är en förutsättning för att genomföra militära operationer. Som följd av denna informationsmängd behöver informationssystemen utvecklas för att kunna ge bättre beslutsunderlag. Syftet med uppsatsen är att undersöka vilken militär nytta man skulle kunna uppnå med ett geografiskt informationssystem (GIS) för beslutsfattarna i en militär insats. Dessutom skall uppsatsen undersöka hur ett GIS bör vara utformat för att stödja personalen med beslutsfattande. Undersökningen sker genom både komparativ litteraturstudie och beskrivning av teorier och metoder. Resultatet pekar på att GIS bör kunna bidra till den militära nyttan med att möjliggöra ett informationsöverläge gentemot en motståndare. Vidare pekar resultaten på att rätt design på GIS underlättar för användaren men att det ändå krävs utbildning för att nyttja GIS fullt ut. / The ongoing development of information systems and the increased availability of information through these systems increase the demands on the military personnel to handle this large amount of information. Information on participants in a battle area and the terrain actors find themselves is a prerequisite to conduct military operations. As a result of all this increased informa-tion the information systems needs to developed to provide a better basis for deci-sions. The purpose of this paper is to examine which military benefit could be achieved with a geographic information system (GIS) for decision makers in a military opera-tion. In addition, the paper will investigate how a GIS should be designed to support staff with decision making. The survey is done by both comparative literature and description of theories and methods. The results indicate that GIS should be able to contribute to the military benefit to enable information superiority over an adversary. Furthermore, the results show that the correct design of GIS makes it easier for the user but it still requires training to use GIS in full.
9

Beslutsfattande och maktdistans i Nato / Decision-Making and Power Distance in NATO

Palme, Linnéa January 2024 (has links)
Denna kvalitativa studie syftar till att undersöka hur anställda inom Nato upplever att maktdistans påverkar beslutsfattandet. För att svara på min frågeställning har jag använt mig av en kvalitativ metod med inkäter, där sex deltagare från fyra olika länder svarade. Resultatet analyserades med en tematisk analys där fem teman framträdde, beslutsfattande, hierarki, kultur, maktdistans och språk. Resultatet är att maktdistans i viss utsträckning påverkar beslutsfattande inom Nato beroende på vilket land som representanterna kommer ifrån. Länders indirekta makt varierar beroende på storlek, befolkningsmängd och hur länge de varit medlemmar av Nato. Studien visar på att maktdistans existerar och påverkar beslut i viss utsträckning men att frågan är komplex då de tillfrågade inte alltid vet vad begreppet maktdistans är även om svaren tyder på det. Sammanfattningsvis påverkas maktdistans av hur länge ett land varit medlemmar i alliansen, hur många personer med hög grad landet har i alliansen och hur bra dessa personer är på språk, att tolka orden i rum och tid och vikta orden rätt. Kunskap i engelska och förhandlingsvana har här betydelse. / This qualitative study aims to investigate how NATO employees experience the impact of power distance on decision-making. To answer that question, I have relied on a qualitative method consisting of a hybrid of questionnaires and interviews that were sent out. Six participants from four countries participated. When the results were examined through thematic analysis, five different themes emerged: decision-making, hierarchy, culture, power distance and language. The results indicate that power distance does affect decision-making within NATO to some extent; depending on which country the representatives come from. The indirect power wielded by the member states varies according to their respective geographical size, the size of their population and their annuity as a member of NATO. The study shows that power distance exists and to some extent affects decision-making within the organization. It also shows that the issue is complex, as not all participants are aware of the concept of power distance, although their responses indicate that they are aware of its existence within the organization. In conclusion, power distance is influenced by how long the nation has been a member of the Alliance, how many high-ranking people the nation has in the various offices of the Alliance, and how well these representatives are able to master language skills, to interpret what is said in a spatial and temporal context, and to weight words accurately; here English and negotiation skills are of great importance.

Page generated in 0.0664 seconds