• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 144
  • 21
  • 11
  • 8
  • 3
  • 3
  • 1
  • 1
  • Tagged with
  • 228
  • 228
  • 129
  • 57
  • 36
  • 31
  • 30
  • 29
  • 25
  • 24
  • 24
  • 23
  • 20
  • 20
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Testing and fault detection in a Fault-Tolerant Multiprocessor

Mantz, Michael Roy January 1981 (has links)
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Aeronautics and Astronautics, 1981. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND AERO / Bibliography: leaves B1-B6. / by Michael Roy Mantz. / M.S.
122

Integrating Cognitive Science into Software Systems Development: Developing a User Interface for Fighter Control

Blom, Örjan January 2004 (has links)
<p>The purpose of this thesis was to integrate cognitive science into an existing organization of software systems development, and to display the benefits and importance of applying the theory and methodology of this interdisciplinary field onto this type of research. This was to be accomplished through participating in a project at ISD Datasystem AB, with the objective to investigate and develop new principles of man - machine interaction for fighter control, and build an appropriate workstation prototype. The participation spanned across the first iteration of the project’s development cycle, specified in accordance to the Rational Unified Process. A field study was conducted and several LoFi-prototypes of the graphical and physical man - machine interface (MMI) were made, as well as an evaluation of the developed prototype. The evaluation was performed with the help of end-users, who valuated the prototype in an inquiry and an interview after having performed a scenario interacting with it. The results showed that the prototype’s usability was highly valuated by the users.Data collected during the evaluation could also be used to guide further development of the prototype. The theoretical research and the empirical work in the project both showed that cognitive science is a valuable, and perhaps, an indispensable asset to software systems development, and that the knowledge and tools of cognitive science can be used in order to develop computer systems that are to be integrated in distributed man -machine systems of high complexity.</p>
123

Coordination and Logistic Aspects in Computer Based Training for Emergency Situations

Nadeem, Hassam, Dastgeer, Usman January 2009 (has links)
<p>This report presents research study conducted at Linkoping University on coordination and logistics training design in simulation based environment.This study is based on C3Fire simulation environment for designing scenarios and simulations to train people for coordination and logistics handling under emergency situations. Related existing literature and theories about decision making, teamwork and situation awareness are studied and consulted to design new scenarios. Several scenarios were developed and initial experiments were conducted on these scenarios to check whether they meet intended behavior or not. Result of experiments proved success of scenario‟ design and these scenarios along their training goals, player and manager instructions are documented in report. It can be used to train and test team‟s ability for coordination and logistics aspects in emergency situations. Exhaustive testing of scenarios on large experiment base is left as future work.</p>
124

Proceedings of the 5th MIT/ONR Workshop on C[3] Systems, held at Naval Postgraduate School, Monterey, California, August 23 to 27, 1982

January 1982 (has links)
edited by Michael Athans ... [et al.]. / "December 1982." / Includes bibliographies and index. / Office of Naval Research Contract no. ONR/N00014-77-C-0532 NR041-519
125

Proceedings of the 8th MIT/ONR Workshop on C[3] Systems, held at Massachusetts Institute of Technology, Cambridge, Massachusetts, June 24 to 28, 1985

January 1985 (has links)
edited by Michael Athans and Alexander H. Levis. / "December 1985." / Includes bibliographies and index. / Office of Naval Research Contract no. ONR/N00014-77-C-0532 NR-041-519
126

The expert team of experts approach to command-and-control (C2) organizations

January 1981 (has links)
by Michael Athans. / Bibliography: p. 18. / "November 1981." / Supported by the Office of Naval Research Contract ONR/N00014-77-C-0532 (NR041-519) AFOSR Contract 80-0229 Naval Electronic Systems Command Contract N00039-80-C-0390 Naval Electronic Systems Command Contract N00039-81-C-0243
127

De Grundläggande Förmågorna vs Cyberterrorism : De grundläggande förmågornas tillämpning vid en cyberattack mot Försvarsmakten / The Fundamental Abilities vs Cyberterrorism : The application of the fundamental abilities in a cyber attack against the Armed Forces

Kits, Linda January 2010 (has links)
<p>Cyberterrorism kan ses som ett relativt nytt, komplicerat och diffust hot som uppenbarat sig till följd av en snabb IT-utveckling. För Försvarsmakten kan detta hot innebära en ny utmaning eftersom doktrinen som skall fungera som vägledning i verksamheten börjar bli inaktuell. De grundläggande förmågorna, som är en viktig del av doktrinen, ses som tankemässiga hjälpmedel för att Försvarsmakten skall kunna analysera, samordna och beskriva verksamheten. Syftet med denna uppsats är att utreda hur pass användbara de grundläggande förmågorna är som tankemässiga hjälpmedel när Försvarsmakten ställs mot ett hot som cyberterrorism. Detta görs genom en analys utifrån ett scenario där Försvarsmaktens ledningssystem utsätts för en cyberattack med ett efterföljande resonemang om tillämpningen av förmågorna. Resultatet utvisar att förmågorna är ett stort stöd i kontexten men att resonemanget kring tillämpningen kompliceras av att hotet äger rum i det virtuella rummet.</p> / <p>Cyber Terrorism can be seen as a relatively new, complex and diffuse threat that appeared due to rapid IT development. For the Armed Forces this threat can be a new challenge because the doctrine to serve as guidance in the work is becoming obsolete. The fundamental abilities, which are an important part of the doctrine, should be seen as thinking tools for the Armed Forces to analyze, coordinate and describe the business. The purpose of this paper is to investigate how useful the fundamental abilities are thinking as tools in the Armed Forces, against a threat like cyberterrorism. This is done through an analysis based on a scenario in which the Armed Forces command and control system is exposed to a cyber attack followed by a discussion on the application of the fundamental abilities. The result shows that the fundamental abilities are a great support in the context but that the reasoning regarding the application is complicated because the threat takes place in the virtual space.</p>
128

De Grundläggande Förmågorna vs Cyberterrorism : De grundläggande förmågornas tillämpning vid en cyberattack mot Försvarsmakten / The Fundamental Abilities vs Cyberterrorism : The application of the fundamental abilities in a cyber attack against the Armed Forces

Kits, Linda January 2010 (has links)
Cyberterrorism kan ses som ett relativt nytt, komplicerat och diffust hot som uppenbarat sig till följd av en snabb IT-utveckling. För Försvarsmakten kan detta hot innebära en ny utmaning eftersom doktrinen som skall fungera som vägledning i verksamheten börjar bli inaktuell. De grundläggande förmågorna, som är en viktig del av doktrinen, ses som tankemässiga hjälpmedel för att Försvarsmakten skall kunna analysera, samordna och beskriva verksamheten. Syftet med denna uppsats är att utreda hur pass användbara de grundläggande förmågorna är som tankemässiga hjälpmedel när Försvarsmakten ställs mot ett hot som cyberterrorism. Detta görs genom en analys utifrån ett scenario där Försvarsmaktens ledningssystem utsätts för en cyberattack med ett efterföljande resonemang om tillämpningen av förmågorna. Resultatet utvisar att förmågorna är ett stort stöd i kontexten men att resonemanget kring tillämpningen kompliceras av att hotet äger rum i det virtuella rummet. / Cyber Terrorism can be seen as a relatively new, complex and diffuse threat that appeared due to rapid IT development. For the Armed Forces this threat can be a new challenge because the doctrine to serve as guidance in the work is becoming obsolete. The fundamental abilities, which are an important part of the doctrine, should be seen as thinking tools for the Armed Forces to analyze, coordinate and describe the business. The purpose of this paper is to investigate how useful the fundamental abilities are thinking as tools in the Armed Forces, against a threat like cyberterrorism. This is done through an analysis based on a scenario in which the Armed Forces command and control system is exposed to a cyber attack followed by a discussion on the application of the fundamental abilities. The result shows that the fundamental abilities are a great support in the context but that the reasoning regarding the application is complicated because the threat takes place in the virtual space.
129

Joint control in dynamic situations

Johansson, Björn January 2005 (has links)
This thesis focuses on the cooperative and communicative aspects of control over dynamic situations such as emergency management and military operations. Taking a stance in Cognitive Systems Engineering, Decision making and Communication studies, the role of information systems as tools for communication in dynamic situations is examined. Three research questions are examined; 1 ) How new forms of information technology affects joint control tasks in dynamic situations, and how/if microworld simulations can be used to investigate this. 2 ) What the characteristics of actual use of information systems for joint control are in dynamic situations? 3 ) What the pre-requisites are for efficient communication in joint control tasks and especially in dynamic, high-risk situations? Four papers are included. A study performed with a microworld simulation involving military officers as participants is presented, and the method of using microworlds for investigating the effects of new technology is discussed. Field observations from an emergency call centre are used to exemplify how information systems actually are used in a cooperative task. An interview study with military officers from a UN-mission describes the social aspects of human-human communication in a dynamic, high risk environment. Finally, an elaborated perspective on the role of information systems as tools for communication, and especially the relation between the social, organisational and technical layers of a joint control activity is presented.
130

Disaster medicine- performance indicators, information support and documentation : A study of an evaluation tool

Rüter, Anders January 2006 (has links)
The science of disaster medicine is more a descriptive than analytical type. Research, in most instances, has not employed quantitative methods and there is very sparse knowledge based on analytical statistics. One consequence of this is that similar mistakes are repeated over and over. Lessons that should be learned are merely observed. Moreover, there are almost no practical or ethical ways in which randomised controlled studies can be performed. The management, command and control of situations on different levels of hierarchy has eldom been evaluated and there have been no standards against which performance can be evaluated. Furthermore, the documentation of decisions and staff work is rarely sufficient enough to evaluate command and control functions. Setting standards that may be used as templates for evaluation and research is an issue that is constantly being addressed by leading experts in the field of disaster medicine and this is also an important issue that is expressed in the Utstein Template. Swedish National Board of Health and Welfare, templates of performance indicators were developed. These were tested on reports available from incidents, and our conclusion was that documentation in this form was not adequate enough for use in this method of evaluation. Documentation must be improved and data probably need to be captured and stored with the help of information systems. A template developed for the evaluation of medical command and control at the scene was tested in standardised examinations. When using this template in this setting it was possible to obtain specific information on those aspects of command and control that need to be improved. An information system using on-line Internet technique was studied twice. The first study concluded that in spite of technical disturbances the system was acceptable to the organisation but could not yet be recommended for use during major incidents. The second study concluded that the retrieval of information was, in all respects not as good as the control system, a conventional ambulance file system. In a study of staff procedure skills during training of management staffs in command and control it was concluded that documentation during training sessions was not adequate and this lack of staff procedure skills could possibly be a contributing factor to the fact that lessons in command and control are not learned from incidents. Conclusions in thesis are that measurable performance indicators can be used in the training of command and control. If performance indicators are to be used in real incidents and disasters, functioning information systems have to be developed. This may lead to a better knowledge of command and control and could possibly contribute to a process where lessons are learned and mistakes are not repeated.

Page generated in 0.1391 seconds