PREV
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
NEXT
Dissertations
APPLICATION OF UWB AND MIMO WIRELESS TECHNOLOGIES TO TACTICAL NETWORKS IN  

This thesis explores the utilization of several different types of wireless penetration technologies as an effective means to counter the extreme RF propagation conditions in austere environments. By extending the range and enhancing the available bandwidth at the edge of a tactical network, the warfighters technological capabilities become enhanced to meet the demand of the information ...Read more >

119 Pages
1.43 MB
INTEGRATION OF VIRTUAL MACHINE TECHNOLOGIES INTO HASTILY FORMED NETWORKS IN SUPPORT OF HUMANITARIAN RELIEF AND DISASTER RECOVERY MISSIONS  

The exploration of the applicability of virtualization technologies, particularly the Virtual Desktop Infrastructure (VDI) as developed by VMware incorporated and virtualized applications in support of humanitarian relief and disaster recovery efforts will be the focus of this ...Read more >

127 Pages
1.34 MB
ANALYSIS, DESIGN AND PROTOTYPING OF ACCOUNTING SOFTWARE FOR NAVY SIGNAL INTELLIGENCE COLLECTION SYSTEMS RETURN ON INVESTMENT REPORTING  

Prior research studies demonstrated a practical methodology for quantifying the return on investment (ROI) of Navy Cryptologic Carry On Program (CCOP) signals intelligence (SIGINT) collection systems and a practical pathway for implementing a performance accounting system that generates these ...Read more >

107 Pages
485.98 KB
LEVERAGING SOCIAL NETWORKING TECHNOLOGIES : AN ANALYSIS OF THE KNOWLEDGE FLOWS FACILITATED BY SOCIAL MEDIA AND THE POTENTIAL IMPROVEMENTS IN SITUATIONAL AWARENESS, READINESS AND PRODUCTIVITY  

The efficient transfer of explicit and tacit knowledge within an organization can yield a distinct competitive advantage in both military and private sector operations. An organization that can adapt faster and operates more efficiently has a winning advantage over its adversary or ...Read more >

113 Pages
1.10 MB
INSTITUTIONAL CHALLENGES TO DEVELOPING METRICS OF SUCCESS IN IRREGULAR WARFARE   

In irregular warfare (IW) conflicts, where winning the support of the population is often key, the United States military historically has demonstrated consistent difficulty in developing metrics that describe the effectiveness of its operations. We identify previously neglected aspects of the ...Read more >

123 Pages
917.58 KB
NETT WARRIOR C3CONFLICT EXPERIMENT : MEASURING THE EFFECT OF BATTLEFIELD AWARENESS IN SMALL UNITS  

This report discusses the findings of the Nett Warrior (NW) C3Conflict experiment and its implications for the NW Basis of Issue (BOI). The experiment used the C3Conflict war game to elicit and contrast measures of leader performance across two conditions that simulated alternative BOI for NW. C3Conflict is a distributed, computer based, multiplayer, small unit war game designed to elicit measures of leader performance focusing on command, control and ...Read more >

91 Pages
1.38 MB
THE IMPACT OF RECHARGEABLE BATTERIES QUANTIFYING THE COST AND WEIGHT FOR A MARINE INFANTRY BATTALI   

Since the implementation of distributed operations with a higher density of tactical field radios, optics and electrical tactical equipment, the demand for batteries has increased significantly. While advances in technology have increased the lethality of Department of Defense (DoD) forces, sustainment and increased resupply convoys have increased the risk of logistical support and costs. This thesis examines the viability, cost savings and operational weight associated with the use of ...Read more >

77 Pages
1.37 MB
OPTIMIZING SECURITY OF CLOUD COMPUTING WITHIN THE DOD  

What countermeasures best strengthen the confidentiality, integrity and availability of the implementation of cloud computing within the DoD This question will be answered by analyzing threats and countermeasures within the context of the ten domains comprising the Certified information System Security Professional Common Body of ...Read more >

107 Pages
380.10 KB
GENERAL USE OF UAS IN EW ENVIRONMEN EW CONCEPTS AND TACTICS FOR SINGLE OR MULTIPLE UAS OVER THE NET CENTRIC BATTLEFIELD  

With the development of technology, Electronic Warfare has been increasing for decades its importance in modern battles. It can even be referred to as the heart of today’s net-centric battlefield. Unmanned Aerial Systems are gaining more importance every single day. Nations are working on more complex and more effective UAS in order to accomplish missions that are very difficult, or even impossible for manned ...Read more >

245 Pages
5.57 MB
TERRORIST NETWORKS, MONEY LAUNDERING SCHEMES AND NATION STABILITY  

The purpose of this thesis is to provide the audience with a point of view perspective regarding the evolution of circumstances that lead to the formation of terrorist networks, organized crime, illicit activities, (etc.) and to present how these criminals utilize money laundering schemes to further their respective positions in society from a socioeconomic ...Read more >

65 Pages
225.63 KB
COMMUNICATION BREAKDOWN : DHS OPERATIONS DURING A CYBER ATTACK  

The Department of Homeland Security (DHS) leverages information technology to increase the effectiveness of first responders during disaster recovery. At the same time, cyber attacks against these information technologies have significantly increased. Unfortunately, cyber attacks have grown faster than the technologies used to defend ...Read more >

93 Pages
413.65 KB
EXPLAINING SUCCESS AND FAILURE : COUNTERINSURGENCY IN MALAYA AND INDIA  

The Maoist insurgency in India, also called Naxalism, has become a threat to internal security with ever-growing violence and attacks on security forces and civilians. With the increased numbers of cadres, improved weaponry and guerilla tactics, the Maoists’ challenge to the state stretches across 16 of Indias 28 states, affecting its economic ...Read more >

179 Pages
874.57 KB
YOU HAVE BEEN FRIENDED BY THE U.S. MILITARY : USING SOCIAL NETWORKING SERVICES FOR IO MESSAGING  

Social Networking Services (SNS) have achieved a salience in todays society. Facebook has over 500 million active users worldwide. SNS has been used by companies to advertise and communicate with their customers. Politicians and government officials have created Facebook and Twitter accounts to keep in touch with ...Read more >

85 Pages
394.92 KB
MIND GAMES : SETTING CONDITIONS FOR SUCCESSFUL COUNTERINSURGENCY MILITARY INFORMATION SUPPORT OPERATIONS  

The purpose of this study is to determine what actions can be taken by American military forces to set conditions for conducting effective Military Information Support Operations (MISO) campaigns in ounterinsurgency (COIN) conflicts. To find these actions, hypotheses built upon tenets found in American military Psychological Operations (PSYOP) doctrine were compared to empirical observations of PSYOP conducted in three COIN case studies from the 1950s and ...Read more >

109 Pages
2.28 MB
IPV6 TACTICAL NETWORK MANAGEMENT  

Current and emerging technologies and equipment, such as unmanned aerial vehicles, ground sensors, networked radios, operator-worn sensor vests and nanotechnology applications offer warfighters unprecedented command and control and information detection capabilities, yet the use of this technology has not been fully ...Read more >

223 Pages
3.06 MB
PREV
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
NEXT