• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 7
  • 3
  • 2
  • 1
  • Tagged with
  • 42
  • 42
  • 22
  • 17
  • 13
  • 10
  • 8
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

A discretionary-mandatory model as applied to network centric warfare and information operations

Hestad, Daniel R. 03 1900 (has links)
Approved for public release, distribution is unlimited / The concepts of DoD information operations and network centric warfare are still in their infancy. In order to develop concepts, the right conceptual models need to be developed from which to design and implement these concepts. Information operations and network centric warfare are fundamentally based on trust decisions. However, the key to developing these concepts is for DoD to develop the organizational framework from which trust, inside and outside, of an organization may be achieved and used to its advantage. In this thesis, an organizational model is submitted for review to be applied to DoD information systems and operational organizations. / Outstanding Thesis / Lieutenant, United States Navy
12

A framework for the management of evolving requirements in software systems supporting network-centric warfare

Reynolds, Linda K. 06 1900 (has links)
Approved for public release, distribution unlimited / Network-centric warfare (NCW) has changed the way the Department of Defense addresses technological improvements for its military forces. No longer is the emphasis on enhancing the capabilities of a single platform, but the focus is now on networking people, processes and technology to enable knowledge sharing and rapid decision-making. The capabilities required to support network-centric operations (NCO) in the NCW environment must be supported by new, innovative networked communication technologies. There are many sources of requirements for these software systems supporting NCO, which may increase in number as the Services continue to develop the capabilities necessary for the transformation to a fully networked military force. Requirements may also emerge and continue to evolve following the fielding of a NCO capability because new technology has the potential to change how warfighters work. Requirements evolution results in requirements engineering challenges associated with the acquisition and development of network-centric software systems. As such, an approach is needed to provide for consistency in elicitation, management and documentation of evolving requirements for technological capabilities supporting NCO. The purpose of this research is to address the problem of evolving requirements. The requirements engineering framework proposed by this thesis incorporates classification theory and requirements modeling principles, and is supported by the Extensible Markup Language (XML) family of technologies. Particular attention has been paid to the selection of non-proprietary, platform independent technology to ensure data can be exchanged between organizations. The framework demonstrates a means by which requirements can be classified and structured in a standardized format. The result is a set of requirements that is consistent in structure and content, and that can be easily shared among all stakeholders because it utilizes one standard, non-proprietary format. This approach captures evolving software requirements of fielded network-centric software systems for use in the development of future systems. / US Navy (USN) author.
13

Literature survey on network concepts and measures to support research in network-centric operations

Olsson, Eric J. 06 1900 (has links)
Approved for public release, distribution is unlimited / The United States Navy and its joint partners continually seek to maintain a responsive, agile, and effective fighting force well suited to combat present-day threats to national security. As a result, U.S. forces are currently undergoing force transformation to adopt an organizational structure capable of supporting this mission. This new organizational structure is known as Network-Centric Warfare. The purpose of this research is to analyze any performance metrics, measures of effectiveness, or analytical methods used by existing organizations engaged in network-centric operations that would assist the Navy and joint forces along with its transformation process. This research will be done in the form of a literature review, examining existing material written on communication, economic/business, and social/organizational networks. In addition to identifying quantitative and qualitative metrics, an emphasis will be placed on the methodologies used for network assessment. Final sections relate findings from each resource to Network-Centric Warfare and address matters relevant to the future of force transformation. / Ensign, United States Navy
14

The systems integration of autonomous behavior analysis to create a "Maritime Smart Environment" for the enhancement of maritime domain awareness

Davis, Cledo L. January 2010 (has links) (PDF)
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, June 2010. / Thesis Advisor(s): Goshorn, Rachel ; Goshorn, Deborah. "June 2010." Description based on title screen as viewed on June 24, 2010. Author(s) subject terms: Anomaly Detection, Artificial Intelligence, Automation, Behavior Analysis, Distributed Artificial Intelligence, Intelligence-Surveillance-Reconnaissance, Maritime Domain Awareness, Maritime Force Protection, Multi-agent Systems, Network-centric Operations, Network-centric Systems Engineering, Network-centric Warfare, Smart Sensor Networks, Systems Engineering, Systems Integration, System of Systems. Includes bibliographical references (p. 209-212). Also available in print.
15

Considerations for Deploying IEEE 1588 V2 in Network-Centric Data Acquisition and Telemetry Systems

Newton, Todd, Grim, Evan, Moodie, Myron 10 1900 (has links)
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California / Network-centric architectures continue to gain acceptance in data acquisition and telemetry systems. Though networks by nature impose non-deterministic transit time of data through a given link, the IEEE 1588 standard provides a means to remove this jitter by distributing time messages to the data acquisition units themselves. But like all standards, they evolve over time. The same is true with IEEE 1588, which is releasing its second version later this year. This paper discusses the challenges of the first version of the IEEE 1588 standard that Version 2 set out to address, potential challenges with Version 2, and interoperability issues that may arise when incorporating a mixture of Version 1 and Version 2 devices.
16

DEVELOPMENT OF A NETWORK-CENTRIC DATA ACQUISITION, RECORDING, AND TELEMETRY SYSTEM

Moodie, Myron, Newton, Todd, Abbott, Ben 10 1900 (has links)
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada / The growth of the Internet and the resulting increasing speeds and decreasing prices of network equipment have spurred much interest in applying networks to flight test applications. However, the best-effort, variable-latency nature of network transport causes challenges that must be addressed to provide reliable data acquisition and timing performance. This paper describes the major issues that must be addressed when designing and implementing real-time networking applications. An overview of a recently implemented large-scale, network-centric data acquisition, recording, and telemetry system for commercial flight test applications provides a real-world example of what is currently achievable.
17

Network centric warfare: a command and control perspective

Lim, Soon-Chia 03 1900 (has links)
Approved for public release, distribution is unlimited / This paper seeks to analyze the command and control issues arising from the advent of NCW. It aims to contribute to a practical understanding of the concept and an implementation approach for NCW by attempting to provide an analytical framework, the various options/models, and considerations across the spectrum of NCW issues. While information superiority is not a new concept, the blazing speed of advancement in information technologies has brought about dramatic changes to our lifestyles and profound changes in the conduct of modern warfare. This led to the birth of Network Centric Warfare (NCW). NCW offers great opportunities to dramatically enhance combat prowess by exploiting shared situational awareness, increased speed of command, improved systems' lethality and survivability, and greater flexibility achieved through self synchronization. However, these revolutionary changes do not depend on technology alone. In order to achieve the full promise of NCW, the entire span of elements ranging from organization, doctrine, and operational concepts to training must co-evolve. The success of NCW is dependent on aligning the organization's commitment, resources and efforts, fostering a learning and innovative culture, constructing a seamless, robust and secure infostructure, and establishing measures of effectiveness of C2. The journey to NCW is not a linear process, but rather a spiral developmental process. Continued evolution and efforts are required to shape and deliver the enhanced combat capability as the apex of maturity of the spiraling cone. / Lieutenant Colonel, Republic of Singapore Air Force
18

Communication aspects in urban terrain

Pfeiffer, Volker 12 1900 (has links)
The nature of warfare has changed dramatically during the last decade. Western armies are increasingly required to conduct complex operations in urban terrain against asymmetric threats. These opponents use cities and their inhabitants for cover and concealment. In such situations, modern equipped armies often cannot fully utilize many of their most powerful weapons. To overcome this situation, modern communication systems are being acquired and deployed to provide real-time reconnaissance; thereby, attempting to neutralize the threat through enhanced situational awareness. This research addresses the potential impacts of communication from airborne sensors on assisting a convoy in finding its way through a hostile city quarter (based on Mazar-E-Sharif, Afghanistan) in which militia forces try to interdict them via street blockades and ambushes. The implementation is done in the agent-based simulation Map Aware Non-Uniform Automata (MANA). The results show that the current MANA version is not sufficiently capable to handle routing problems in urban terrain. Specifically, the movement algorithm is â locally greedyâ and not flexible enough to project into the futureâ as real human decision makers do. Many workarounds were developed to mitigate this limitation. The analysis shows that the number of blockades is the single most important factor in determining the convoyâ s success. Of the communication factors, network latency has the most impact. For the convoy to effectively use the information, it needs to get from the sensor to the convoy in 11 seconds.
19

Comando e controle no contexto da digitalização : um estudo com base em modelagem computacional / Command and control in the context of digitization: a study based on computational modeling

Bertol, Frederico Licks January 2018 (has links)
Este trabalho propõe uma discussão em torno dos impactos da digitalização sobre sistemas militares de comando e controle. A hipótese central é que o emprego intensivo de tecnologias digitais está associado a um maior risco de sobrecarga informacional nesses sistemas. Isso se aplica em especial às forças militares que adotaram doutrinas de viés tecnocrático, como a guerra centrada em redes. No primeiro capítulo, discutimos o contexto no qual nosso tema de pesquisa se insere, fazendo uma breve retrospectiva do processo de digitalização e também definindo alguns conceitos-chave. No segundo capítulo, em formato de artigo, apresentamos o modelo computacional que foi desenvolvido para simular o funcionamento de um sistema de comando e controle sob a condição de sobrecarga informacional. O artigo também reúne uma revisão crítica das abordagens sobre comando e controle, com ênfase na literatura sobre guerra centrada em redes. O terceiro e último capítulo traz algumas conclusões sobre o emprego da modelagem computacional como metodologia de pesquisa e o estado atual do debate sobre guerra centrada e redes. / This work proposes a discussion on the impacts of digitization over military command and control systems. The central hypothesis is that the intensive deployment of digital technologies is associated to a greater risk of informational overload in those systems. This applies especially to military forces that have adopted doctrines with a technocratic bias, such as the network-centric warfare. In the first chapter, we discuss the context that encompass our research topic, making a brief retrospective of the process of digitization and defining some key concepts. In the second chapter, in form of article, we present the computational model developed for simulating the operation of a command and control system under the condition of informational overload. The article also contains a critical review on the command and control approaches, with emphasis on the literature about network-centric warfare. The third and last chapter brings out some conclusions regarding the use of computational modeling as a research method and the current state of the debate on network-centric warfare.
20

Aircraft Trajectory Optimization with Tactical Constraints

Norsell, Martin January 2004 (has links)
Aircrafttrajectory optimization is traditionally used forminimizing fuel consumption or time when going from one flightstate to another. This thesis presents a possible approach toincorporate tactical constraints in aircraft trajectoryoptimization. The stealth technology of today focuses on making thetactics already in use more effective. Since tactics andstealth are closely interrelated, new and better results may beobtained if both aspects are considered simultaneously. Simplyreducing the radar cross section area in some directionswithout considering tactical aspects may result in little, ifany, improvement. Flight tests have been performed in cooperation withEricsson Microwave Systems and the Swedish Air Force FlightAcademy. The aircraft used was the subsonic jet trainer Saab105, designated SK60 by the Swedish Air Force. The results showa decrease of 40% in the time interval between the instant theaircraft was first detected until it could pass above the radarstation. This corresponds to a reduced radar cross section(RCS) in the direction from the aircraft to the radar of almost90%, if classical RCS reduction techniques would have beenapplied. If a modern aircraft with stealth properties would be used,the proposed methodology is believed to increase the possibleimprovements further. This is because the variation of themagnitude of RCS in different directions is greater for a shapeoptimized aircraft, which is the property exploited by thedeveloped method. The methods presented are indeed an approach utilizing theideas of the network centric warfare (NCW) concept. Themethodology presented depends on accurate information about theadversary, while also providing up-to-date information to theother users in the information network. The thesis focuses on aircraft but the methods are generaland may be adapted for missiles, shipsor land vehicles. Theproposed methods are also economically viable since they areuseful for existing platforms without costly modifications. Themethods presented are not limited to radar threats only. Thereasons for using radar in this thesis are the availablenon-classified data and that radar is known to pose a majorthreat against aircraft.

Page generated in 0.0913 seconds