21 |
Words by iron wire: construction of the military telegraph in Arizona Territory, 1873-1877Rue, Norman L. January 1967 (has links)
No description available.
|
22 |
Countermeasure Dispenser System Network ControllerDiPirro-Beard, William David, 1954- January 1989 (has links)
Presented in this thesis is the Airborne Countermeasures Ejection and/or Release (ALE)-XX Cockpit Control Unit (CCU) Countermeasures Dispensing System Network Controller (CMDSNC) design. ALE-XX CCU CMDSNC was designed as part of the total ALE-XX system to replace the problematic ALE-40. Fiber optic technology is incorporated into ALE-XX as the communication medium to eliminate Electromagnetic Interference (EMI). ALE-XX CMDSNC uses a star network to solve system operation failures from the existing daisy-chain topology. A comprehensive Built-In-Test (BIT) allows fault diagnose and isolation of hardware problems reported on the CCU Visual Display. Digital electronics replace the electro-mechanical devices, lowers the number of Line Replaceable Units (LRUs), and raises the Mean-Time-Between-Failures (MTBF). The information contained herein could be used as a design aid for future CMDSNCs or other related instrumentation.
|
23 |
Designing a common interchange format for unit data using the Command and Control information exchange data model (C2IEDM) and XSLTHodges, Glenn A. 09 1900 (has links)
Approved for public release, distribution unlimited / Approved for public release; distribution is unlimited. / A common problem between Military applications and operators is the consistent and meaningful exchange of data. Currently, several models and simulations exist for the purposes of training and analyzing military data. Due to the absence of an agreed-upon standard with which to represent unit data, much is lost during interchange and applications are not maximized. This thesis is a step towards a solution. Extensible Markup Language (XML) technology has been widely accepted as a standard for representing information in such a way that it is self-documenting, self-validating and platform independent. By using the Command and Control Information Exchange Data Model (C2IEDM), formerly known as Generic Hub, and XML it is possible to develop a representation of unit data that is extensible and broadly useable by tactical systems and human operators alike. This thesis approaches the problem exploring the Model Driven Architecture (MDA) and the Extensible Modeling Simulation Framework (XMSF) as possible overarching architectural concepts for a global solution. The C2IEDM is used as the core data interchange model for this research and applies XML technologies, schema and the Extensible Stylesheet Language for Transformations (XSLT) to derive a formatted data representation that is acceptable within the Flexible Asymmetric Simulation Technologies (FAST) Toolbox. The transformation example serves as template for other simulation programs to follow for interchange through the common base model. This thesis shows that by using a common data representation like C2IEDM coupled with the power of XML and XSLT, unit information can be transformed and interchanged between applications. In order to accomplish this, an extensive analysis is done on recently performed and ongoing research as well as the development of exemplars to show how the proposed process is completed. The result of this work is a transformation of unit data extracted from an example C2IEDM instance file that is compliant with the schema for an actual unit order of battle tool used for modeling and simulation. / Major, United States Army
|
24 |
IEEE 802.16 Commercial Off The Shelf (COTS) technologies as a compliment to Ship To Objective Maneuver (STOM) communicationsMunoz, Ramon J., Guice, Robert J. 09 1900 (has links)
Approved for public release; distribution is unlimited. / This research evaluates the IEEE 802.16 standards and technologies that are currently being developed in the commercial sector. The robust capability of this standard lends itself potentially to numerous military applications. This research explores how this technology might address the shortcomings of existing military radio and data systems; specifically, with respect to the issues surrounding the Ship to Objective Maneuver (STOM) communications. The intent of this research is to provide recommendations on the necessary 'adapt from COTS' changes for this technology to address STOM networking requirements. This research includes discussions on the military requirements for an IEEE 802.16 adapted waveform. The requirements are for the IEEE 802.16 'adapt from COTS' are derived from researched on the Concept of Employment for STOM operations and the specification of the Joint Tactical Radio Systems (JTRS) Wideband Networking Waveform (WNW). These discussions offer an illustration of the complex networking demands the COTS adapted systems would need to address. Through detailed exploration of the current IEEE 802.16 standards and implementation testing with pre-standard IEEE 802.16a equipment, we were able to make recommendations on the COTS adaptations necessary to make IEEE 802.16 suitable as a complimentary technology within the STOM scenario. / Captain, United States Marine Corps
|
25 |
Detection of frequency-hopped signals embedded in interference waveformsBrown, Christopher K. 06 1900 (has links)
Many military communications systems utilize frequency-hopped spread spectrum waveforms to protect against jamming and enemy detection. These waveforms may be subjected not only to intentional jamming but may also be unintentionally jammed by other communications signals. While some systems can overcome inband interference with more signal power, covert systems may be limited to small amounts of transmitted power. The objective of this thesis was to investigate a method for resolving a frequency-hopped signal embedded in interference waveforms. With exponential averaging in the frequency domain, the spectra of the interfering signals can be estimated as long as they are present over a period longer than that of the frequency-hopped signal. Certain FFT sizes and weights are more beneficial to achieving this estimate than others. The interference estimate can be used to extract the desired frequency-hopped signal through spectral division of the received signal with the estimate. This technique is designated as noise-normalization. Simulations in MATLAB demonstrate the use of the technique and show how the desired signal can be resolved.
|
26 |
Validating a method for enhanced communications and situational awareness at the incident command levelGraham, James H. 03 1900 (has links)
CHDS State/Local / The availability and interoperability of communications at an incident scene have long been recognized as high-priority problems that need to be addressed to improve our nation's Homeland Security and preparedness. This thesis describes a proposed methodology to address these issues at the Incident Command level while enhancing situational awareness and information sharing. The thesis analyzes the results of a research project funded by the Department of Homeland Security at the University of Louisville's IT Research Center for Homeland Security. The problem being addressed is that the decision-maker with the boots on the ground, the Incident Commander, needs relevant information in the early stages of the emergency at the incident scene and an efficient way to communicate with other resources. The research project fielded a prototype solution based on readily available commercial off-the-shelf components integrated in a man-portable configuration to provide maximum flexibility, lower costs, and ease of operations. A proposed concept of operations in various prevention and response environments was also recommended in the thesis after analyzing the results of several field exercises and interviews with users. / Director, Information Technology Resource Center, University of Louisville
|
27 |
Feasibility of automating FIWC website noncompliance monitoring and enforcement activitiesGalante, Victoria Josephine 06 1900 (has links)
Approved for public release, distribution is unlimited / For written word to reach the public in hardcopy form, a manuscript is submitted to a publisher. After numerous review and modification cycles, the document is printed and distributed, often through intermediaries. Finally, it reaches the hands and eyes of perhaps thousands. This contrasts dramatically with the Internet where, within minutes of completion, text can be seen by millions. The Internet offers enormous research power. With a PC and a phone line, one can locate a recipe for delicious meringue or deadly ricin; can research a thesis or the step-by-step fabrication of a thermonuclear device. Recognizing the potential for misuse as well as for informing the public, the Department of Defense charged each of its agencies with the responsibility of policing content and form of that agency's publicly accessible websites. As the United States Navy command responsible for this daunting assignment, FIWC faces a job that grows in complexity and size by the day. Taking on this problem manually would result, at best, in unitary growth of dedicated resources and a similar increase in potential for error, both of oversight and of inappropriate action. This thesis provides one approach to automating FIWC's website monitoring and enforcement activities. The approach it advocates is focused on reducing manpower and increasing accuracy. This architecture - a generic model with a GUI database frontend - is presented, not as an ultimate solution, but rather as a solid first step. / Civilian, Department of Defense
|
28 |
Military interactive symbol design packageBallou, Justin Guy January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
29 |
Problems of organizational structure in C3 systemsJanuary 1982 (has links)
by Alexander H. Levis. / Bibliography: p. 54. / With: On modeling teams of interacting decisionmakers with bounded rationality / Alexander H. Levis, Kevin L. Boettcher. Cambridge, Mass. : Laboratory for Information and Decision Systems, Massachusetts Institute of Technology, [1982] / "March, 1982." / NASA Grant No. NAG1-2
|
30 |
"MacArthur's Eyes" reassessing military intelligence operations in the forgotten war, June 1950 - April 1951 /Knight, Peter G., January 2006 (has links)
Thesis (Ph. D.)--Ohio State University, 2006. / Full text release at OhioLINK's ETD Center delayed at author's request
|
Page generated in 0.148 seconds