• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 142
  • 20
  • 11
  • 8
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 224
  • 224
  • 127
  • 57
  • 35
  • 31
  • 30
  • 29
  • 24
  • 23
  • 23
  • 22
  • 20
  • 20
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Network centric warfare: a command and control perspective

Lim, Soon-Chia 03 1900 (has links)
Approved for public release, distribution is unlimited / This paper seeks to analyze the command and control issues arising from the advent of NCW. It aims to contribute to a practical understanding of the concept and an implementation approach for NCW by attempting to provide an analytical framework, the various options/models, and considerations across the spectrum of NCW issues. While information superiority is not a new concept, the blazing speed of advancement in information technologies has brought about dramatic changes to our lifestyles and profound changes in the conduct of modern warfare. This led to the birth of Network Centric Warfare (NCW). NCW offers great opportunities to dramatically enhance combat prowess by exploiting shared situational awareness, increased speed of command, improved systems' lethality and survivability, and greater flexibility achieved through self synchronization. However, these revolutionary changes do not depend on technology alone. In order to achieve the full promise of NCW, the entire span of elements ranging from organization, doctrine, and operational concepts to training must co-evolve. The success of NCW is dependent on aligning the organization's commitment, resources and efforts, fostering a learning and innovative culture, constructing a seamless, robust and secure infostructure, and establishing measures of effectiveness of C2. The journey to NCW is not a linear process, but rather a spiral developmental process. Continued evolution and efforts are required to shape and deliver the enhanced combat capability as the apex of maturity of the spiraling cone. / Lieutenant Colonel, Republic of Singapore Air Force
42

Interacting with command and control systems : Tools for operators and designers

Albinsson, Pär-Anders January 2004 (has links)
<p>Command and control is central in all distributed tactical operations such as rescue operations and military operations. It takes place in a complex system of humans and artefacts, striving to reach common goals. The command and control complexity springs from several sources, including dynamism, uncertainty, risk, time pressure, feedback delays and interdependencies. Stemming from this complexity, the thesis approaches two important and related problem areas in command and control research. On a general level, the thesis seeks to approach the problems facing the command and control operators and the problems facing the designers in the associated systems development process.</p><p>We investigate the specific problem of operators losing sight of the overall perspective when working with large maps in geographical information systems with limited screen area. To approach this problem, we propose high-precision input techniques that reduce the need for zooming and panning in touch-screen systems, and informative unit representations that make better use of the screen area available. The results from an experimental study show that the proposed input techniques are as fast and accurate as state-of-the-art techniques without the need to resort to zooming. Furthermore, results from a prototype design show that the proposed unit representation reduces on-screen clutter and makes use of off-screen units to better exploit the valuable screen area.</p><p>Developing command and control systems is a complex task with several pitfalls, including getting stuck in exhaustive analyses and overrated reliance on rational methods. In this thesis, we employ a design-oriented research framework that acknowledges creative and pragmatic ingredients to handle the pitfalls. Our approach adopts the method of reconstruction and exploration of mission histories from distributed tactical operations as a means for command and control analysis. To support explorative analysis of mission histories within our framework, we propose tools for communication analysis and tools for managing metadata such as reflections, questions, hypotheses and expert comments. By using these tools together with real data from live tactical operations, we show that they can manage large amounts of data, preserve contextual data, support navigation within data, make original data easily accessible, and strengthen the link between metadata and supporting raw data. Furthermore, we show that by using these tools, multiple analysts, experts, and researchers can exchange comments on both data and metadata in a collaborative and explorative investigation of a complex scenario.</p> / Report code: LiU-Tek-Lic-2004:61.
43

Interacting with command and control systems : Tools for operators and designers

Albinsson, Pär-Anders January 2004 (has links)
Command and control is central in all distributed tactical operations such as rescue operations and military operations. It takes place in a complex system of humans and artefacts, striving to reach common goals. The command and control complexity springs from several sources, including dynamism, uncertainty, risk, time pressure, feedback delays and interdependencies. Stemming from this complexity, the thesis approaches two important and related problem areas in command and control research. On a general level, the thesis seeks to approach the problems facing the command and control operators and the problems facing the designers in the associated systems development process. We investigate the specific problem of operators losing sight of the overall perspective when working with large maps in geographical information systems with limited screen area. To approach this problem, we propose high-precision input techniques that reduce the need for zooming and panning in touch-screen systems, and informative unit representations that make better use of the screen area available. The results from an experimental study show that the proposed input techniques are as fast and accurate as state-of-the-art techniques without the need to resort to zooming. Furthermore, results from a prototype design show that the proposed unit representation reduces on-screen clutter and makes use of off-screen units to better exploit the valuable screen area. Developing command and control systems is a complex task with several pitfalls, including getting stuck in exhaustive analyses and overrated reliance on rational methods. In this thesis, we employ a design-oriented research framework that acknowledges creative and pragmatic ingredients to handle the pitfalls. Our approach adopts the method of reconstruction and exploration of mission histories from distributed tactical operations as a means for command and control analysis. To support explorative analysis of mission histories within our framework, we propose tools for communication analysis and tools for managing metadata such as reflections, questions, hypotheses and expert comments. By using these tools together with real data from live tactical operations, we show that they can manage large amounts of data, preserve contextual data, support navigation within data, make original data easily accessible, and strengthen the link between metadata and supporting raw data. Furthermore, we show that by using these tools, multiple analysts, experts, and researchers can exchange comments on both data and metadata in a collaborative and explorative investigation of a complex scenario. / <p>Report code: LiU-Tek-Lic-2004:61.</p>
44

A FEASIBLE ARCHITECTURE FOR LARGE AREA OTH C^2 AND DATA COLLECTION, LEVERAGING DEVELOPED COMMERCIAL TECHNOLOGIES

Power, Emilio J. 10 1900 (has links)
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California / Reliable System Services Corporation (RSS Corp.) presents the feasibility of a low cost, low power, high capacity, robust RF Communications Network using SATCOM and UAV relays. The developed architecture will be suitable for OTH Large Area Test and Training exercises as well as applications for OTH Digital Battlefield scenarios. A specific application is shown for the planned Littoral Combat Ship (LCS) missions, although the developed architecture will have broader applications for any surface combatant requiring an Over-the-Horizon (OTH) data link to distributed players and sensors. A conceptual design for the IP network radio system will implement RSS Corp. developed secure IRIDIUM global full duplex data links and Harris Corp. developed long range high bandwidth 802.11 full duplex data links. The results will be significant, and the developed system could be a cornerstone of the future digital battlefield combat communications architecture. The developed technology will also have significant use in any application for Test, Evaluation and Training Ranges requiring net centric, command/control and wide bandwidth TLM data collection from distributed remote players and sensors.
45

COMMAND AND CONTROL OF A CLUSTER OF SATELLITES

Zetocha, Paul 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / There is an increasing desire in many organizations, including NASA and the DoD, to use constellations or fleets of autonomous spacecraft working together to accomplish complex mission objectives. At the Air Force Research Laboratory’s (AFRL) Space Vehicles Directorate we are investigating and developing architectures for commanding and controlling a cluster of cooperating satellites. For many space missions, large monolithic satellites are required to meet mission requirements. In many cases this results in costly satellites which are more complex, more susceptible to failure, and which have performance characteristics that are less than optimal due to realistic physical size limitations. Recently various organizations have begun to explore how distributed clusters of cooperating satellites can replace their larger monolithic counterparts resulting in an overall cost reduction, enhanced mission performance, and increased system fault tolerance. Large clusters of satellites flying in formation are required to have some level of on-board autonomy in order to: fly within specified tolerance levels; perform collision avoidance; address fault detection, isolation, and resolution (FDIR); share knowledge; and plan and schedule activities. In addition, from an operations standpoint, commanding and controlling a large cluster of satellites can be very burdensome for ground operators. At AFRL we are addressing these issues by development of an on-board Cluster Management system which will, in essence, provide the capability to treat a cluster of satellites as a single virtual satellite. A systems level approach is being taken, therefore from a ground perspective the ground control station must also be able to treat the cluster as a virtual satellite. [1] This paper will describe our Cluster Management system, which is the intelligent entity that is responsible for making cluster level decisions and which enables the satellite cluster to function as a virtual satellite. The cluster manager functionality can be broken down into the following five areas: • Command and control • Cluster data management • Formation flying • Fault management • On-board Planning This paper will contain a detailed description of the Cluster Manager architecture along with its various modules.
46

EYE IN THE SKY: AIRSHIP SURVEILLANCE

Sullivan, Arthur, Turner, William C. 11 1900 (has links)
International Telemetering Conference Proceedings / October 30-November 02, 1995 / Riviera Hotel, Las Vegas, Nevada / The first airship was invented and designed in 1852 by Henri Giffard, a French engineer. Airships were used by both the Allied and German military for surveillance and bomb dropping in WWI. There was a steady increase in airship use up until the Hindenburg exploded while docking in 1937 at Lakehurst, New Jersey. This tragedy almost ended the use of airships. Significant use of airships next occurred during WWII for submarine surveillance and depth charging. Airships for advertising, surveillance, and command control came of age in the late 1980s and early 1990s. Airships can be fitted with several telemetry options or instrumented with sensor systems for surveillance purposes. The telemetry or sensor data can be relayed, real-time, to a remote station as much as 150 km from the airship either encrypted or plain when cruising at 3000 feet altitude. Small vehicles (3 meters long) can be detected at 50 km using radar; 12 km using FLIRs; and, depending on weather conditions and real-time imaging processing, up to 20 km using video cameras. Cooperating airborne targets can be tracked out to 150 km. The major advantages of the airship over conventional aircraft are: • ENDURANCE Up to 20 hours without refueling. • LOW OPERATING COST Less than the cost of a helicopter. • SHOCK-FREE ENVIRONMENT Allows commercial electric equipment usage. • VIBRATION-FREE ENVIRONMENT Yields personnel comfort and endurance. • SAFETY Safer than any aircraft, automobile, or bicycle.
47

Generic support for decision-making in management and command and control

Wallenius, Klas January 2004 (has links)
<p>Flexibility is the keyword when preparing for the uncertainfuture tasks for the civilian and military defence. Supporttools relying on general principles will greatlyfacilitateflexible co-ordination and co-operation between differentcivilian and military organizations, and also between differentcommand levels. Further motivations for general solutionsinclude reduced costs for technical development and training,as well as faster and more informed decisionmaking. Mosttechnical systems that support military activities are howeverdesigned with specific work tasks in mind, and are consequentlyrather inflexible. There are large differences between forinstance fire fighting, disaster relief, calculating missiletrajectories, and navigating large battle-ships. Still, thereought to be much in common in the work of managing thesevarious tasks. We use the term<i>Command and Control</i>(C2) to capture these commonfeatures in management of civilian and military, rescue anddefence operations.</p><p>Consequently, this thesis describes a top-down approach tosupport systems for decision-making in the context of C2, as acomplement to the prevailing bottom-up approaches. DISCCO(Decision Support for Command and Control) is a set ofnetwork-based services including<i>Command Support</i>helping commanders in the human,cooperative and continuous process of evolving, evaluating, andexecuting solutions to their tasks. The command tools providethe means to formulate and visualize tasks, plans, andassessments, but also the means to visualize decisions on thedynamic design of organization. Also included in DISCCO is<i>Decision Support</i>, which, based on AI and simulationtechniques, improve the human process by integrating automaticand semiautomatic generation and evaluation of plans. The toolsprovided by DISCCO interact with a<i>Common Situation Model</i>capturing the recursive structureof the situation, including the status, the dynamicorganization, and the intentions, of own, allied, neutral, andhostile resources. Hence, DISCCOprovides a more comprehensivesituation description than has previously been possible toachieve.</p><p>DISCCO shows generic features since it is designed tosupport a decisionmaking process abstracted from the actualkinds and details of the tasks that are solved. Thus it will beuseful through all phases of the operation, through all commandlevels, and through all the different organizations andactivities that are involved.</p><p><b>Keywords:</b>Command and Control, Management, DecisionSupport, Data Fusion, Information Fusion, Situation Awareness,Network-Based Defence, Ontology.</p>
48

The Use of Open Architecture Systems in Cost Reduced Satellite Telemetry & Control Stations

Spielman, David R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 17-20, 1994 / Town & Country Hotel and Conference Center, San Diego, California / A comprehensive examination of the market demands for cost reduced satellite telemetry & control stations will be presented. These systems are implemented using flexible, open architecture-based high performance real-time systems. The trend for combining telemetry monitoring of satellite data with closed-loop satellite command and control functions will be presented. This combined functionality opens up the possibilities for completely integrated, reduced cost satellite control systems. The market forces driving the demand for this integrated functionality include the broadening of non-military satellite applications, the widening international deployment of commercial satellites and the accompanying drive toward decentralized satellite control. The major requirements for the telemetry processing and command & control functionality of the integrated, reduced cost satellite control system will be presented. These requirements include: full real-time performance for processing telemetry data; flexible architecture for the incorporation of a wide range of I/O devices; capability of performing real-time, closed-loop control based on conditions in the telemetry data; user friendly development environments for application-specific customization of the system; and low system costs with the capability of indigenous support. The divergent requirements of performance, flexibility and price of these integrated, reduced cost satellite control systems is made possible via the use of open architecture building blocks that include standard VME boards combined with specialized real-time software drivers and user oriented, flexible Graphical User Interface (GUI) software.
49

Designing a common interchange format for unit data using the Command and Control information exchange data model (C2IEDM) and XSLT

Hodges, Glenn A. 09 1900 (has links)
Approved for public release, distribution unlimited / Approved for public release; distribution is unlimited. / A common problem between Military applications and operators is the consistent and meaningful exchange of data. Currently, several models and simulations exist for the purposes of training and analyzing military data. Due to the absence of an agreed-upon standard with which to represent unit data, much is lost during interchange and applications are not maximized. This thesis is a step towards a solution. Extensible Markup Language (XML) technology has been widely accepted as a standard for representing information in such a way that it is self-documenting, self-validating and platform independent. By using the Command and Control Information Exchange Data Model (C2IEDM), formerly known as Generic Hub, and XML it is possible to develop a representation of unit data that is extensible and broadly useable by tactical systems and human operators alike. This thesis approaches the problem exploring the Model Driven Architecture (MDA) and the Extensible Modeling Simulation Framework (XMSF) as possible overarching architectural concepts for a global solution. The C2IEDM is used as the core data interchange model for this research and applies XML technologies, schema and the Extensible Stylesheet Language for Transformations (XSLT) to derive a formatted data representation that is acceptable within the Flexible Asymmetric Simulation Technologies (FAST) Toolbox. The transformation example serves as template for other simulation programs to follow for interchange through the common base model. This thesis shows that by using a common data representation like C2IEDM coupled with the power of XML and XSLT, unit information can be transformed and interchanged between applications. In order to accomplish this, an extensive analysis is done on recently performed and ongoing research as well as the development of exemplars to show how the proposed process is completed. The result of this work is a transformation of unit data extracted from an example C2IEDM instance file that is compliant with the schema for an actual unit order of battle tool used for modeling and simulation. / Major, United States Army
50

Comparisons of attacks on honeypots with those on real networks

Duong, Binh T. 03 1900 (has links)
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyber-attacks and attacker behavior. When implemented as part of a security posture, honeypots also protect real networks by acting as a decoy, deliberately confusing potential attackers as to the real data. The objective of this research is to compare attack patterns against a honeypot to those against a real network, the network of the Naval Postgraduate School. Collection of suspicious-event data required the implementation and setup of a honeypot, in addition to the installation and use of an intrusion-detection system. A statistical analysis was conducted across suspicious-event data recorded from a honeypot and from a real network. Metrics used in our study were applied to the alerts generated from Snort 2.4.3, an open-source intrusion detection system. Results showed differences between the honeypot and the real network data which need further experiments to understand. Both the honeypot and the real network data showed much variability at the start of the experiment period and then a decrease in the number of alerts in the later period of the experiment. We conclude that after the initial probing and reconnaissance is complete, the vulnerabilities of the network are learned and therefore fewer alerts occur; but more specific signatures are then aimed at exploiting the network.

Page generated in 0.1109 seconds