Dissertations |
 | APPLICATION OF UWB AND MIMO WIRELESS TECHNOLOGIES TO TACTICAL NETWORKS IN
This thesis explores the utilization of several different types of wireless penetration technologies as an effective means to counter the extreme RF propagation conditions in austere environments. By extending the range and enhancing the available bandwidth at the edge of a tactical network, the warfighters technological capabilities become enhanced to
meet the demand of the information ...Read more > | 119 Pages 1.43 MB |
|
|
|
|
|
 | NETT WARRIOR C3CONFLICT EXPERIMENT : MEASURING THE EFFECT OF BATTLEFIELD AWARENESS IN SMALL UNITS
This report discusses the findings of the Nett Warrior (NW) C3Conflict experiment and its implications for the NW Basis of Issue (BOI). The experiment used the C3Conflict war game to elicit and contrast measures of leader performance across two conditions that simulated alternative BOI for NW. C3Conflict is a distributed, computer based, multiplayer, small unit war game designed to elicit measures of leader performance focusing on command, control and ...Read more > | 91 Pages 1.38 MB |
|
 | THE IMPACT OF RECHARGEABLE BATTERIES QUANTIFYING THE COST AND WEIGHT FOR A MARINE INFANTRY BATTALI
Since the implementation of distributed operations with a higher density of tactical field radios, optics and electrical tactical equipment, the demand for batteries has increased significantly. While advances in technology have increased the lethality of Department of Defense (DoD) forces, sustainment and increased resupply convoys have increased the risk of logistical support and costs. This thesis examines the viability, cost savings and operational weight associated with the use of ...Read more > | 77 Pages 1.37 MB |
|
 | OPTIMIZING SECURITY OF CLOUD COMPUTING WITHIN THE DOD
What countermeasures best strengthen the confidentiality, integrity and availability of the implementation of cloud computing within the DoD This question will be answered by analyzing threats and countermeasures within the context of the ten domains comprising the Certified information System Security Professional Common Body of ...Read more > | 107 Pages 380.10 KB |
|
|
 | TERRORIST NETWORKS, MONEY LAUNDERING SCHEMES AND NATION STABILITY
The purpose of this thesis is to provide the audience with a point of view perspective regarding the evolution of circumstances that lead to the formation of terrorist networks, organized crime, illicit activities, (etc.) and to present how these criminals utilize money laundering schemes to further their respective positions in society from a socioeconomic ...Read more > | 65 Pages 225.63 KB |
|
 | COMMUNICATION BREAKDOWN : DHS OPERATIONS DURING A CYBER ATTACK
The Department of Homeland Security (DHS) leverages information technology to increase the effectiveness of first responders during disaster recovery. At the same time, cyber attacks against these information technologies have
significantly increased. Unfortunately, cyber attacks have grown faster than the technologies used to defend ...Read more > | 93 Pages 413.65 KB |
|
 | EXPLAINING SUCCESS AND FAILURE : COUNTERINSURGENCY IN MALAYA AND INDIA
The Maoist insurgency in India, also called Naxalism, has become a threat to internal security with ever-growing violence and attacks on security forces and civilians. With the increased numbers of cadres, improved weaponry and guerilla tactics, the Maoists’ challenge to the state stretches across 16 of Indias 28 states, affecting its economic ...Read more > | 179 Pages 874.57 KB |
|
|
 | MIND GAMES : SETTING CONDITIONS FOR SUCCESSFUL COUNTERINSURGENCY MILITARY INFORMATION SUPPORT OPERATIONS
The purpose of this study is to determine what actions can be taken by American military forces to set conditions for conducting effective Military Information Support Operations (MISO) campaigns in ounterinsurgency (COIN) conflicts. To find these actions, hypotheses built upon tenets found in American
military Psychological Operations (PSYOP) doctrine were compared to empirical observations of PSYOP
conducted in three COIN case studies from the 1950s and ...Read more > | 109 Pages 2.28 MB |
|
 | IPV6 TACTICAL NETWORK MANAGEMENT
Current and emerging technologies and equipment, such as unmanned aerial
vehicles, ground sensors, networked radios, operator-worn sensor vests and nanotechnology applications offer warfighters unprecedented command and control and information detection capabilities, yet the use of this technology has not been fully ...Read more > | 223 Pages 3.06 MB |
|