• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 144
  • 21
  • 11
  • 8
  • 3
  • 3
  • 1
  • 1
  • Tagged with
  • 228
  • 228
  • 129
  • 57
  • 36
  • 31
  • 30
  • 29
  • 25
  • 24
  • 24
  • 23
  • 20
  • 20
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

Modeling the use of the AJCN in a tactical environment / Modeling the use of the Adaptive Joint C4ISR Node in a tactical environment

Watts, Krista L. 06 1900 (has links)
The Adaptive Joint Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) Node (AJCN) is a new C4ISR system with four functional capabilities: communications, signal intelligence (SIGINT), electronic warfare (EW) and Information Operations. This thesis evaluates the first three capabilities of the AJCN: communications, SIGINT and EW. Simulation is used as a time- and cost-effective way to model the AJCN's capabilities. Eleven communications and combat effectiveness MOE are used to evaluate the AJCN's performance. Point of Attack 2, a tactical simulation with an extensive database is used to replicate the AJCN and UA operations. Results of the analysis include: 1) the AJCN significantly increased friendly detection of enemy forces; 2) the AJCN significantly decreased average message transmittal time and the number of failed messages; 3) the AJCN increased the friendly force's capability to jam and intercept enemy messages.
112

Integration of mini-UAVs at the tactical operations level implications of operations, implementation, and information sharing / Integration of mini-unmanned aerial vehicles at the tactical operations level

Crouch, Collier Craig. 06 1900 (has links)
Small units maneuvering on the battlefield have little time to establish data links and interface with the Global Information Grid (GIG) while trying to achieve an objective. The bandwidth and interface requirements necessary to receive live data from current strategic level systems limit the small unit operational user's ability to receive and act upon data and intelligence. Without the ability to interface with current strategic-level UAV assets, these small units are left without a comprehensive operational picture. Mini-UAVs offer the capability for the tactical user, in a variety of missions, to have direct control over the aerial asset without intervention from higher authority. Organic UAV assets can be used to collect data relevant to small units without the need for connecting to intelligence systems. This offers increased mobility and a dedicated collection platform; however, there are still drawbacks to this capability. This thesis examines mini-UAVs, and their integration into the Coalition Operating Area Surveillance and Targeting System (COASTS) network.
113

Border monitoring based on a novel PIR detection model

Dikmen, Iskender 03 1900 (has links)
Approved for public release, distribution unlimited / Improvements in technology have enabled the development of cost-effective, low-power, multifunctional wireless sensor nodes, which are used in various applications including surveillance and intrusion detection. We have made experiments in order to discover the detection probability of the Crossbow MSP410 mote sensor nodes. We have developed a new PIR detection model, which has a high probability detection region and a low probability detection region, for MSP410 mote sensor nodes based on the observed probabilities. The PIR model is used in the proposed sensor placement strategy for MSP410 mote sensor nodes intended for a border monitoring scenario. The detection probability of the low probability region of the new PIR detection model is increased by overlapping with the low probability region of the neighboring sensor nodes in the proposed sensor placement strategy.
114

Generic support for decision-making in effects-based management of operations

Wallenius, Klas January 2005 (has links)
This thesis investigates computer-based support tools to facilitate decision-making in civilian and military operations. As flexibility is essential when preparing for unknown threats to society, this support has to be general. Further motivations for flexible and general solutions include reduced costs for technical development and training, as well as faster and better informed decision-making. We use the term Effects-Based Management of Operations to denote the accomplishment of desired effects beyond traditional military goals by the deployment of all types of available capabilities. Supporting this work, DISCCO (Decision Support for Command and Control) is a set of network-based services including Command Support, helping commanders in the human, collaborative and continuous process of evolving, evaluating, and executing solutions to their tasks, Decision Support, improving the human process by integrating automatic and semi-automatic generation and evaluation of plans, and a Common Situation Model, capturing the hierarchical structure of the situation regarding own, allied, neutral, and hostile resources. The use of the DISCCO has been investigated in three different applications: planning for establishing surveillance of an operation area, planning for NBC defense, and executing a riot control operation. Together, these studies indicate that DISCCO is applicable in many different classes of Effects-Based Management of Operations. Hence, this generic concept will contribute to the work of both the civilian and military defense in dealing with a broad range of current and future threats to the society.
115

Distributed situation awareness : advances in theory, measurement and application to team work

Salmon, Paul January 2008 (has links)
Situation Awareness (SA) is critical commodity for teams working in complex sociotechnical systems and is thus a fundamental consideration in collaborative system design and evaluation. Despite this, SA remains predominantly an individual construct, with the majority of models and measures focused on SA from an individual perspective. In comparison, team SA has received much less attention and this thesis argues that further work is required in the area both in relation to the development of theoretical perspectives and of valid measures, and to the development of guidelines for system, training and procedure design. This thesis advances team SA theory and measurement by further investigating a recently proposed model of SA in complex collaborative environments, the Distributed Situation Awareness (DSA) approach, and by testing a new methodology for representing and analysing DSA during real world collaborative activities. A review of SA theory and SA measurement approaches is presented. Following this, the DSA theory and propositional network assessment methodology are outlined and a series of case studies on DSA during real world collaborative activities in the military and civil domains are presented. The findings are subsequently used to explore the concept of DSA and the sub-concepts of compatible and transactive SA. In conclusion, a model of DSA in complex collaborative systems is presented, and a series of system design guidelines for supporting DSA are outlined.
116

Information security requirements for a coalition wide area network

McGovern, Susan C. 06 1900 (has links)
To achieve information superiority in a coalition environment the U. S. has to seamlessly integrate coalition members, both NATO and Non-NATO, into its command and control processes along all echelons of military operations. In a coalition environment, it is extremely challenging to fuse multinational information systems to achieve seamless integration. This thesis focuses on the security issues that are involved in establishing coalition network interoperability. The coalition environment is defined in terms of purpose, command structure, mission area, and control functions. Network and information protection are discussed in terms of minimizing the threats to information systems security. Coalition information system user requirements are defined and some of the security mechanisms required to meet those requirements are discussed. Current solutions to secure coalition network interoperability are surveyed, followed by conclusions, recommendations and areas for further study. / US Navy (USN) author
117

Mot nätverkssjukvård i komplex miljö : - behov av en vetenskaplig syn på ledning för säker vård och effektiv resursanvändning / Towards networked healthcare in complex environment : – need for a developed scientific view on management for safe care and efficient use of resources

Lagerstedt, Marianne January 2016 (has links)
Since 2008 advanced home healthcare agencies (ASiH) in a larger Swedish county council has underwent a transformation, to become part of a coming concept: networked healthcare (NVS). NVS means that intermediate multi-organizational healthcare (IMV) will be produced often in the home, and from 2013 to an increasing number of patients in different age groups with different diagnoses and medical conditions - in large variability of needs. At the same time IMV has proved to be not simply practical to implement in a resource-efficient and patientsafe way. Based on theories from Command and Control Science the safetyproblem that arise in connection with IMV is a sign of the less known increasing need of the direction and coordination support that IMV requires. With a casestudy based research approach with interactive elements, different qualitative methods has been used in two phases between 2008 - 2013. The first phase is characterized by a phenomenological approach, while the second phase has a critical hermeneutic approach. Research methods includes fieldvisits with informal discussions, in-depth interviews, validation with respondents and two different methodologies for textanalysis. The main result shows that practical aggravating circumstances for safe care consists of lesser known and from 2013 increasing problems with direction and coordination, through expanded advanced IMV in the home as a part of NVS concept. This also as a result of inadequate and inappropriate direction and coordination support for IMV. The thesis concludes that the NVS represents a resource intensive health care concept, which requires a new view on the management issue and a network-related methodology for direction and coordination. This is to promote ethical, equitable, patientsafe and dignified advanced IMV so an optimized use of resources can be implemented, through shared responsibility and coordination in patientuniquely designed networkconstellations as a given work model. / <p>QC 20160926</p>
118

Implementing the Endeavor Space Dimensions : Towards an understanding of perceived complexity in C2 operations

Bjurling, Oscar, Weilandt, Jacob January 2019 (has links)
The challenge of operating and managing complex and dynamic environments, known as complex endeavors, has become a central issue in the C2 research community. NATO research groups have studied how to combat the negative effects of endeavor complexity on performance. Essential to these efforts is the study of C2 Agility, which is the ability of an entity to cope with change and employ different C2 approaches based on the requirements imposed by—and changes in—the current operational environment. An important aspect in accomplishing this research goal is to study how operational environments are constituted, as this would enable research into how the effectiveness of different C2 approaches is affected by different endeavors. The Endeavor Space model, which represents endeavor complexity in three dimensions, was developed for this purpose. In an effort to continue research on the Endeavor Space, the current study set out to implement the dimensions in a C2 research platform called ELICIT. Three ELICIT scenarios were created to represent different regions of the Endeavor Space. Additionally, the study designed, developed, and tested a prototype self-assessment instrument—the ESSAI—to capture how the Endeavor Space dimensions—Tractability, Dynamics, and Dependencies—were experienced by operators. Eight teams completed the scenarios and rated their complexity using the ESSAI. No significant differences in perceived complexity could be found between the scenarios. However, all Endeavor Space dimensions indicated correlational relationships with perceived difficulty, and most of them correlated with ELICIT performance. This is indicative of underlying patterns that were not thoroughly revealed in the current study. Implications and improvements for future research are discussed.
119

Comando e controle no contexto da digitalização : um estudo com base em modelagem computacional / Command and control in the context of digitization: a study based on computational modeling

Bertol, Frederico Licks January 2018 (has links)
Este trabalho propõe uma discussão em torno dos impactos da digitalização sobre sistemas militares de comando e controle. A hipótese central é que o emprego intensivo de tecnologias digitais está associado a um maior risco de sobrecarga informacional nesses sistemas. Isso se aplica em especial às forças militares que adotaram doutrinas de viés tecnocrático, como a guerra centrada em redes. No primeiro capítulo, discutimos o contexto no qual nosso tema de pesquisa se insere, fazendo uma breve retrospectiva do processo de digitalização e também definindo alguns conceitos-chave. No segundo capítulo, em formato de artigo, apresentamos o modelo computacional que foi desenvolvido para simular o funcionamento de um sistema de comando e controle sob a condição de sobrecarga informacional. O artigo também reúne uma revisão crítica das abordagens sobre comando e controle, com ênfase na literatura sobre guerra centrada em redes. O terceiro e último capítulo traz algumas conclusões sobre o emprego da modelagem computacional como metodologia de pesquisa e o estado atual do debate sobre guerra centrada e redes. / This work proposes a discussion on the impacts of digitization over military command and control systems. The central hypothesis is that the intensive deployment of digital technologies is associated to a greater risk of informational overload in those systems. This applies especially to military forces that have adopted doctrines with a technocratic bias, such as the network-centric warfare. In the first chapter, we discuss the context that encompass our research topic, making a brief retrospective of the process of digitization and defining some key concepts. In the second chapter, in form of article, we present the computational model developed for simulating the operation of a command and control system under the condition of informational overload. The article also contains a critical review on the command and control approaches, with emphasis on the literature about network-centric warfare. The third and last chapter brings out some conclusions regarding the use of computational modeling as a research method and the current state of the debate on network-centric warfare.
120

System effectiveness analysis for command and control

Bouthonnier, Vincent January 1982 (has links)
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 1982. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING / Bibliography: leaves 89-90. / by Vincent Bouthonnier. / M.S.

Page generated in 0.1079 seconds