• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 2
  • 1
  • Tagged with
  • 8
  • 8
  • 8
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Flexible role-handling in command and control systems

Landberg, Fredrik January 2006 (has links)
<p>In organizations the permissions a member has is not decided by their person, but by their functions within the organization. This is also the approach taken within military command and control systems. Military operations are often characterized by frictions and uncontrollable factors. People being absent when needed are one such problem.</p><p>This thesis has examined how roles are handled in three Swedish command and control systems. The result is a model for handling vacant roles with the possibility, in some situations, to override ordinary rules.</p>
2

Flexible role-handling in command and control systems

Landberg, Fredrik January 2006 (has links)
In organizations the permissions a member has is not decided by their person, but by their functions within the organization. This is also the approach taken within military command and control systems. Military operations are often characterized by frictions and uncontrollable factors. People being absent when needed are one such problem. This thesis has examined how roles are handled in three Swedish command and control systems. The result is a model for handling vacant roles with the possibility, in some situations, to override ordinary rules.
3

De Grundläggande Förmågorna vs Cyberterrorism : De grundläggande förmågornas tillämpning vid en cyberattack mot Försvarsmakten / The Fundamental Abilities vs Cyberterrorism : The application of the fundamental abilities in a cyber attack against the Armed Forces

Kits, Linda January 2010 (has links)
<p>Cyberterrorism kan ses som ett relativt nytt, komplicerat och diffust hot som uppenbarat sig till följd av en snabb IT-utveckling. För Försvarsmakten kan detta hot innebära en ny utmaning eftersom doktrinen som skall fungera som vägledning i verksamheten börjar bli inaktuell. De grundläggande förmågorna, som är en viktig del av doktrinen, ses som tankemässiga hjälpmedel för att Försvarsmakten skall kunna analysera, samordna och beskriva verksamheten. Syftet med denna uppsats är att utreda hur pass användbara de grundläggande förmågorna är som tankemässiga hjälpmedel när Försvarsmakten ställs mot ett hot som cyberterrorism. Detta görs genom en analys utifrån ett scenario där Försvarsmaktens ledningssystem utsätts för en cyberattack med ett efterföljande resonemang om tillämpningen av förmågorna. Resultatet utvisar att förmågorna är ett stort stöd i kontexten men att resonemanget kring tillämpningen kompliceras av att hotet äger rum i det virtuella rummet.</p> / <p>Cyber Terrorism can be seen as a relatively new, complex and diffuse threat that appeared due to rapid IT development. For the Armed Forces this threat can be a new challenge because the doctrine to serve as guidance in the work is becoming obsolete. The fundamental abilities, which are an important part of the doctrine, should be seen as thinking tools for the Armed Forces to analyze, coordinate and describe the business. The purpose of this paper is to investigate how useful the fundamental abilities are thinking as tools in the Armed Forces, against a threat like cyberterrorism. This is done through an analysis based on a scenario in which the Armed Forces command and control system is exposed to a cyber attack followed by a discussion on the application of the fundamental abilities. The result shows that the fundamental abilities are a great support in the context but that the reasoning regarding the application is complicated because the threat takes place in the virtual space.</p>
4

De Grundläggande Förmågorna vs Cyberterrorism : De grundläggande förmågornas tillämpning vid en cyberattack mot Försvarsmakten / The Fundamental Abilities vs Cyberterrorism : The application of the fundamental abilities in a cyber attack against the Armed Forces

Kits, Linda January 2010 (has links)
Cyberterrorism kan ses som ett relativt nytt, komplicerat och diffust hot som uppenbarat sig till följd av en snabb IT-utveckling. För Försvarsmakten kan detta hot innebära en ny utmaning eftersom doktrinen som skall fungera som vägledning i verksamheten börjar bli inaktuell. De grundläggande förmågorna, som är en viktig del av doktrinen, ses som tankemässiga hjälpmedel för att Försvarsmakten skall kunna analysera, samordna och beskriva verksamheten. Syftet med denna uppsats är att utreda hur pass användbara de grundläggande förmågorna är som tankemässiga hjälpmedel när Försvarsmakten ställs mot ett hot som cyberterrorism. Detta görs genom en analys utifrån ett scenario där Försvarsmaktens ledningssystem utsätts för en cyberattack med ett efterföljande resonemang om tillämpningen av förmågorna. Resultatet utvisar att förmågorna är ett stort stöd i kontexten men att resonemanget kring tillämpningen kompliceras av att hotet äger rum i det virtuella rummet. / Cyber Terrorism can be seen as a relatively new, complex and diffuse threat that appeared due to rapid IT development. For the Armed Forces this threat can be a new challenge because the doctrine to serve as guidance in the work is becoming obsolete. The fundamental abilities, which are an important part of the doctrine, should be seen as thinking tools for the Armed Forces to analyze, coordinate and describe the business. The purpose of this paper is to investigate how useful the fundamental abilities are thinking as tools in the Armed Forces, against a threat like cyberterrorism. This is done through an analysis based on a scenario in which the Armed Forces command and control system is exposed to a cyber attack followed by a discussion on the application of the fundamental abilities. The result shows that the fundamental abilities are a great support in the context but that the reasoning regarding the application is complicated because the threat takes place in the virtual space.
5

Stridsledningssystem Bataljon (SLB) i nationell konflikt : en systemutvärdering / Stridsledningssystem Bataljon (SLB) in a national conflict : a system evaluation

Quist, Hampus January 2014 (has links)
Idag använder Försvarsmakten högteknologiska ledningssystem för att underlätta ledning på stridsfältet. Några av dessa system är idag utvecklade för internationella insatser mot en lågteknologisk motståndare, men vad skulle hända i en nationell konflikt mot en högteknologisk motståndare? I denna uppsats utvärderas SLB utifrån ett fiktivt framtidsscenario för att komma fram till tekniska eller taktiska anpassningar för att öka den militära nyttan med systemet. Studien bygger på för och nackdelar med SLB utifrån Försvarsmaktens sex grundläggande förmågor som sedan analyseras för att komma fram till anpassningsmöjligheter för SLB. En av de slutsatser som studien visar är vikten av realistiska övningar med systemet för att öva personalen mot en högteknologisk motståndare. / The Swedish armed forces use high tech command and control systems to increase combat leadership on the battlefield. Some of these systems are designed for international missions against a low tech enemy, but what would happen if the systems where facing a high tech enemy in a national conflict? In this essay SLB is being evaluated from a fictional future scenario to determine technical or tactical adjustments to increase the military use of the system. The essay is based on pros and cons with SLB from the Swedish armed forces six basic ability’s that later are being analyzed to come up with suitable adjustments for SLB. One of the conclusions from the essay shows the importance of realistic exercises with the system to practice the crew against a high tech enemy.
6

Development of a model predictive controller for a milling circuit

Muller, Bernard 07 May 2008 (has links)
Please read the abstract (Synopsis) in the section, 00front, of this document / Dissertation (M Eng (Control Engineering))--University of Pretoria, 2008. / Chemical Engineering / MEng / unrestricted
7

PROPOSTA DE FILOSOFIA DE INSPEÇÃO PREDITIVA NOS CENTROS DE OPERAÇÃO PARA INSTALAÇÕES TELEASSISTIDAS / PROPOSAL OF INSPECTION PHILOSOPHY PREDICTIVE IN OPERATING CENTERS FOR TELEASSISTED INSTALLATIONS

SANTOS, Mauro Luis Aquino dos 14 February 2017 (has links)
Submitted by Maria Aparecida (cidazen@gmail.com) on 2017-04-19T14:40:10Z No. of bitstreams: 1 Mauro Luis Aquino.pdf: 3035613 bytes, checksum: fa5d18d391298888d25a933b6d6747fa (MD5) / Made available in DSpace on 2017-04-19T14:40:10Z (GMT). No. of bitstreams: 1 Mauro Luis Aquino.pdf: 3035613 bytes, checksum: fa5d18d391298888d25a933b6d6747fa (MD5) Previous issue date: 2017-02-14 / This work addresses the predictive maintenance problem in operation centers of a transmission utility. Therefore, the primordial aspects are identified for the definition of a predictive inspection routine, which allows a check of points that guarantee periodic evaluations of the power system, so that the problems that occur can be detected in advance, allowing the maintenance crew to be activated before the occurrence of failures that actually affects the operation of the system. As part of the work, a survey was carried out with some Operation Centers of power system utilities in Brazil to give an idea of the application of maintenance and inspection concepts in the current national reality. Based on the results, it is shown to what extent the inspections adopted today in the Operational Centers of the various utilities have predictive characteristics, and an evaluation is made to identify if there are improvement points or not in this area. From the inspection philosophy proposed in this research, computational developments were carried out with the aim of developing a predictive inspection methodology to be adopted by the operators in a real time environment. The tool developed was applied at the Operation Center of the São Luís, using data from São Luís III Substation of Eletrobras Eletronorte and the results are discussed in order to highlight the advantages and disadvantages of the proposed tool and if it is able to meet the proposed objectives. / Este trabalho trata o problema de manutenção preditiva em centros de operação de uma concessionária de transmissão. São, portanto, identificados os aspectos primordiais para a definição de uma rotina de inspeção preditiva, que permita uma verificação de pontos que garantam avaliações periódicas do sistema elétrico, de modo que os problemas que vierem a ocorrer possam ser detectados de maneira antecipada e com isso, permitir que a equipe de manutenção possa ser acionada antes da incidência de falhas que realmente comprometam a operação do sistema. Como parte do trabalho foi realizada uma pesquisa junto a alguns centros de operação de empresas concessionárias de energia no Brasil, para que se possa ter uma ideia da aplicação dos conceitos de manutenção e inspeção na realidade nacional atual. Com base nos resultados demonstra-se até que ponto as inspeções hoje adotadas nos Centros de Operação das diversas empresas têm características preditivas e é feita uma avaliação para identificar se há pontos de melhoria ou não nesta área. A partir da filosofia de inspeção proposta nesta pesquisa foram realizados desenvolvimentos computacionais com o intuito de desenvolver uma metodologia de inspeção preditiva a ser adotada pelos operadores em ambiente de tempo real. A ferramenta desenvolvida foi aplicada no Centro de Operação de São Luís com base nos dados da Subestação de São Luís III da Eletrobras Eletronorte e os resultados são discutidos de forma a ressaltar as vantagens e desvantagens da ferramenta proposta e se esta tem condições de atender aos objetivos a que se propôs.
8

The COMPASS Paradigm For The Systematic Evaluation Of U.S. Army Command And Control Systems Using Neural Network And Discrete Event Computer Simulation

Middlebrooks, Sam E. 15 April 2003 (has links)
In today's technology based society the rapid proliferation of new machines and systems that would have been undreamed of only a few short years ago has become a way of life. Developments and advances especially in the areas of digital electronics and micro-circuitry have spawned subsequent technology based improvements in transportation, communications, entertainment, automation, the armed forces, and many other areas that would not have been possible otherwise. This rapid "explosion" of new capabilities and ways of performing tasks has been motivated as often as not by the philosophy that if it is possible to make something better or work faster or be more cost effective or operate over greater distances then it must inherently be good for the human operator. Taken further, these improvements typically are envisioned to consequently produce a more efficient operating system where the human operator is an integral component. The formal concept of human-system interface design has only emerged this century as a recognized academic discipline, however, the practice of developing ideas and concepts for systems containing human operators has been in existence since humans started experiencing cognitive thought. An example of a human system interface technology for communication and dissemination of written information that has evolved over centuries of trial and error development, is the book. It is no accident that the form and shape of the book of today is as it is. This is because it is a shape and form readily usable by human physiology whose optimal configuration was determined by centuries of effort and revision. This slow evolution was mirrored by a rate of technical evolution in printing and elsewhere that allowed new advances to be experimented with as part of the overall use requirement and need for the existence of the printed word and some way to contain it. Today, however, technology is advancing at such a rapid rate that evolutionary use requirements have no chance to develop along side the fast pace of technical progress. One result of this recognition is the establishment of disciplines like human factors engineering that have stated purposes and goals of systematic determination of good and bad human system interface designs. However, other results of this phenomenon are systems that get developed and placed into public use simply because new technology allowed them to be made. This development can proceed without a full appreciation of how the system might be used and, perhaps even more significantly, what impact the use of this new system might have on the operator within it. The U.S. Army has a term for this type of activity. It is called "stove-piped development". The implication of this term is that a system gets developed in isolation where the developers are only looking "up" and not "around". They are thus concerned only with how this system may work or be used for its own singular purposes as opposed to how it might be used in the larger community of existing systems and interfaces or, even more importantly, in the larger community of other new systems in concurrent development. Some of the impacts for the Army from this mode of system development are communication systems that work exactly as designed but are unable to interface to other communications systems in other domains for battlefield wide communications capabilities. Having communications systems that cannot communicate with each other is a distinct problem in its own right. However, when developments in one industry produce products that humans use or attempt to use with products from totally separate developments or industries, the Army concept of product development resulting from stove-piped design visions can have significant implication on the operation of each system and the human operator attempting to use it. There are many examples that would illustrate the above concept, however, one that will be explored here is the Army effort to study, understand, and optimize its command and control (C2) operations. This effort is at the heart of a change in the operational paradigm in C2 Tactical Operations Centers (TOCs) that the Army is now undergoing. For the 50 years since World War II the nature, organization, and mode of the operation of command organizations within the Army has remained virtually unchanged. Staffs have been organized on a basic four section structure and TOCs generally only operate in a totally static mode with the amount of time required to move them to keep up with a mobile battlefield going up almost exponentially from lower to higher command levels. However, current initiatives are changing all that and while new vehicles and hardware systems address individual components of the command structures to improve their operations, these initiatives do not necessarily provide the environment in which the human operator component of the overall system can function in a more effective manner. This dissertation examines C2 from a system level viewpoint using a new paradigm for systematically examining the way TOCs operate and then translating those observations into validated computer simulations using a methodological framework. This paradigm is called COmputer Modeling Paradigm And Simulation of Systems (COMPASS). COMPASS provides the ability to model TOC operations in a way that not only includes the individuals, work groups and teams in it, but also all of the other hardware and software systems and subsystems and human-system interfaces that comprise it as well as the facilities and environmental conditions that surround it. Most of the current literature and research in this area focuses on the concept of C2 itself and its follow-on activities of command, control, communications (C3), command, control, communications, and computers (C4), and command, control, communications, computers and intelligence (C4I). This focus tends to address the activities involved with the human processes within the overall system such as individual and team performance and the commander's decision-making process. While the literature acknowledges the existence of the command and control system (C2S), little effort has been expended to quantify and analyze C2Ss from a systemic viewpoint. A C2S is defined as the facilities, equipment, communications, procedures, and personnel necessary to support the commander (i.e., the primary decision maker within the system) for conducting the activities of planning, directing, and controlling the battlefield within the sector of operations applicable to the system. The research in this dissertation is in two phases. The overall project incorporates sequential experimentation procedures that build on successive TOC observation events to generate an evolving data store that supports the two phases of the project. Phase I consists of the observation of heavy maneuver battalion and brigade TOCs during peacetime exercises. The term "heavy maneuver" is used to connotate main battle forces such as armored and mechanized infantry units supported by artillery, air defense, close air, engineer, and other so called combat support elements. This type of unit comprises the main battle forces on the battlefield. It is used to refer to what is called the conventional force structure. These observations are conducted using naturalistic observation techniques of the visible functioning of activities within the TOC and are augmented by automatic data collection of such things as analog and digital message traffic, combat reports generated by the computer simulations supporting the wargame exercise, and video and audio recordings where appropriate and available. Visible activities within the TOC include primarily the human operator functions such as message handling activities, decision-making processes and timing, coordination activities, and span of control over the battlefield. They also include environmental conditions, functional status of computer and communications systems, and levels of message traffic flows. These observations are further augmented by observer estimations of such indicators as perceived level of stress, excitement, and level of attention to the mission of the TOC personnel. In other words, every visible and available component of the C2S within the TOC is recorded for analysis. No a priori attempt is made to evaluate the potential significance of each of the activities as their contribution may be so subtle as to only be ascertainable through statistical analysis. Each of these performance activities becomes an independent variable (IV) within the data that is compared against dependent variables (DV) identified according to the mission functions of the TOC. The DVs for the C2S are performance measures that are critical combat tasks performed by the system. Examples of critical combat tasks are "attacking to seize an objective", "seizure of key terrain", and "river crossings'. A list of expected critical combat tasks has been prepared from the literature and subject matter expert (SME) input. After the exercise is over, the success of these critical tasks attempted by the C2S during the wargame are established through evaluator assessments, if available, and/or TOC staff self analysis and reporting as presented during after action reviews. The second part of Phase I includes datamining procedures, including neural networks, used in a constrained format to analyze the data. The term constrained means that the identification of the outputs/DV is known. The process was to identify those IV that significantly contribute to the constrained DV. A neural network is then constructed where each IV forms an input node and each DV forms an output node. One layer of hidden nodes is used to complete the network. The number of hidden nodes and layers is determined through iterative analysis of the network. The completed network is then trained to replicate the output conditions through iterative epoch executions. The network is then pruned to remove input nodes that do not contribute significantly to the output condition. Once the neural network tree is pruned through iterative executions of the neural network, the resulting branches are used to develop algorithmic descriptors of the system in the form of regression like expressions. For Phase II these algorithmic expressions are incorporated into the CoHOST discrete event computer simulation model of the C2S. The programming environment is the commercial programming language Micro Saintä running on a PC microcomputer. An interrogation approach was developed to query these algorithms within the computer simulation to determine if they allow the simulation to reflect the activities observed in the real TOC to within an acceptable degree of accuracy. The purpose of this dissertation is to introduce the COMPASS concept that is a paradigm for developing techniques and procedures to translate as much of the performance of the entire TOC system as possible to an existing computer simulation that would be suitable for analyses of future system configurations. The approach consists of the following steps: • Naturalistic observation of the real system using ethnographic techniques. • Data analysis using datamining techniques such as neural networks. • Development of mathematical models of TOC performance activities. • Integration of the mathematical into the CoHOST computer simulation. • Interrogation of the computer simulation. • Assessment of the level of accuracy of the computer simulation. • Validation of the process as a viable system simulation approach. / Ph. D.

Page generated in 0.1113 seconds