Filters








8,339 Hits in 9.0 sec

Model-based tool support for Tactical Data Links: an experience report from the defence domain

Suraj Ajit, Chris Holmes, Julian Johnson, Dimitrios S. Kolovos, Richard F. Paige
2015 Journal of Software and Systems Modeling  
The Tactical Data Link (TDL) allows the exchange of information between cooperating platforms as part of an integrated Command and Control (C 2 ) system.  ...  It is checkable by a machine and, by virtue of an MDA-like approach to the separation of domains and model transformation between domains, is open to integration with other models to support more complex  ...  An Introduction to Tactical Data Links The TDL provides one of the backbone technologies underpinning the defence community's goal of Network Enabled Capability (NEC)/Network Centric Warfare (NCW) across  ... 
doi:10.1007/s10270-015-0480-2 fatcat:bomwyp4zm5bzbjrjtthqapw7s4

Linking cyber strategy with grand strategy: the case of the United States

Valentin Weber
2018 Journal of Cyber Policy  
The lack of grand strategy in cyberspace is also visible in U.S. tactical behaviour.  ...  The three chosen case studies show that the various U.S. military, economic and political actions taking place under the Obama administration were isolated from each other.  ...  An early version of this article was presented at ISSS-ISAC Annual Convention, Washington, DC (2017).  ... 
doi:10.1080/23738871.2018.1511741 fatcat:ro7qtiaebrahvpa7q2e74gxdii

Page 1838 of Psychological Abstracts Vol. 77, Issue 7 [page]

1990 Psychological Abstracts  
Differ- ences in downward, lateral, and upward influence attempts were replicated more for data from agents than for data from targets.  ...  The frame- work described is based on the view that decision support pro- vided by the KBS is not restricted to the easy access, processing, and management of models and data but includes expertise, which  ... 

Catalogue of available and emerging CD&E tools in the European Union [article]

Nikolay
2021 Zenodo  
CDE4Peace Deliverable 4.1: Catalogue of available and emerging CD&E tools in the European Union  ...  The game is both an innovative tool for delivering training and a new model in curriculum development as the base curriculum, informed by the state of the art in soft skills relevant for conflict prevention  ...  KORA has a wide range of different sub-models from all areas of military operations, such as: combat model, artillery model, engineer model, helicopter model, air defence model, reconnaissance model (including  ... 
doi:10.5281/zenodo.5780130 fatcat:bzwj3ai2abdfzgzotr6svkpate

Tactical Command and Control Systems and Network Centric Warfare

Çağatayhan ÇOLAKOĞLU
2014 Journal of Military and Information Science  
Depending on the configuration and mission requirements, following equipment could be mounted on the soldier for various C2 applications:  Portable radio for voice and data communication  Portable computer  ...  In this paper, information is given on current and near term air defence, fire support and battle management C2 systems.  ...  (DoD, 2007) By taking into consideration the objectives of Network Centric Warfare and experience from the C2 applications, NATO and US DoD foresee that the future data exchange technology for the applications  ... 
doi:10.17858/jmisci.24025 fatcat:lmqrr2ftrrfwdmgpalgaq26fmm

Legal Linked Data Ecosystems and the Rule of Law [chapter]

Marta Poblet, Pompeu Casanovas, Víctor Rodríguez-Doncel
2019 SpringerBriefs in Law  
This chapter introduces the notions of meta-rule of law and socio-legal ecosystems to both foster and regulate linked democracy.  ...  It explores the way of stimulating innovative regulations and building a regulatory quadrant for the rule of law.  ...  The rule of law constitutes an ideal yet to be developed for the web of linked data.  ... 
doi:10.1007/978-3-030-13363-4_5 fatcat:wyfojp6owzb4jhegj6vuyvtr24

Battlespace awareness and the Australian Army battlefield command support system

Paul S. Gaertner, Mark Slade, Fred Bowden, Bradley Stagg, Samuel Huf, Raja Suresh, Homer H. Pien
2000 Digitization of the Battlespace V and Battlefield Biomedical Technologies II  
The intent of this paper is to first examine the digitisation effort under way in Australia and describe the Army Battlefield Command Support System (BCSS) being developed for use in the tactical arena  ...  Effective battlespace awareness is essential for any defence operation; this is especially true in the increasingly complex and dynamic land component of the military environment.  ...  The authors would also like to acknowledge Mr Ian Heron and Dr Robert Seymour from Land Operations Division and Dr Michael Davies from Information Technology Division for their support.  ... 
doi:10.1117/12.395054 fatcat:l54iodnh4fgxzdptsifrv4jumq

From open source communications to knowledge

Alun Preece, Colin Roberts, David Rogers, Will Webberley, Martin Innes, Dave Braines, Barbara D. Broome, Timothy P. Hanratty, David L. Hall, James Llinas
2016 Next-Generation Analyst IV  
media data, (2) how information from open sources can be combined with reports from trusted observers, for corroboration or to identify conflicting information; and (3) how the approach supports users  ...  The approach is supported by bespoke software tools for social media analytics and knowledge management.  ...  , the US Government, the UK Ministry of Defence or the UK Government.  ... 
doi:10.1117/12.2224533 fatcat:vqhfq4xkmzbt5pow2ohruvatki

Models for the digital transformation

Jeff Gray, Bernhard Rumpe
2017 Journal of Software and Systems Modeling  
Hill, Tanumoy Pati, and Sowmya Kolli • "Using Contexts to Extract Models from Code" by Lucio Duarte, Jeff Kramer, and Sebastian Uchitel • "Model-based Tool Support for Tactical Data Links: An Experience  ...  Report from the Defence Domain" by Dimitrios Kolovos, Suraj Ajit, Chris Holmes, Julian Johnson, and Richard Paige • "Contract-based Modeling and Verification of Timed Safety Requirements within SysML"  ... 
doi:10.1007/s10270-017-0596-7 fatcat:kg4uvzek7bchlb6qzsvkuppicq

Managing Vulnerabilities of Tactical Wireless RF Network Systems: A Case Study

Philip Chan, David Nowicki, Hong Man, Mo Mansouri
2011 International Journal of Engineering Business Management  
We propose a methodology based on the systematic resolution of complex issues to manage the vulnerabilities of tactical wireless RF systems.  ...  Systems engineering thinking supports design decisions and enables decision-makers to manage and assess the support for each solution.  ...  For example, from military or DoD point of view, it is defined for a given tactical wireless RF communication systems which have a defence vulnerability after experiencing an external EW high power electronic  ... 
doi:10.5772/10692 fatcat:vffffckqbzfaphkqvgky2f5cie

The use of constructive and virtual simulation technologies for skills training in military education

Georgi Borisov Penchev
2020 Scientific Journal of the Military University of Land Forces  
Simulation systems constitute an excellent tool for the creation of a number of scenarios.  ...  The report describes how simulation technologies are embedded in military education in Vasil Levski National Military University.  ...  Acknowledgement No acknowledgement and potential founding was reported by the author. The use of constructive and virtual simulation technologies for skills training in military education  ... 
doi:10.5604/01.3001.0014.2541 fatcat:ycfyruwdizgklopexye7t5aoxm

Increasing Military Capability Through Information And Communication

Marco Marsili
2016 Zenodo  
The success of communication, both indoor and outdoor, is essential for achieving goals.  ...  Online availability through user-friendly and intuitive interface, enabling a positive user experience, is strongly recommended.  ...  Abstract: Service-based data curation is a prerequisite for the generation of authoritative data-driven decision support tools.  ... 
doi:10.5281/zenodo.834756 fatcat:z4tzvqdg5jedzhf4fj6b4l6kkm

THE CYBER DIMENSION OF MODERN HYBRID WARFARE AND ITS RELEVANCE FOR NATO

Sorin DUCARU
2016 Europolity: Continuity and Change in European Governance  
NATO's strategy on countering hybrid warfare is based on the triad: prepare-deter-defend, which also applies to cyber. Nations represent the first line of defence in countering hybrid strategies.  ...  The technological development and the instant communication possibilities advanced not only economic and social developments, but also evolving threats from those who exploit the vulnerabilities of communication  ...  These aspects that are defining the qualitative evaluations of the evolving cyber threat landscape are supported by some notable insights from data collected by industry and reported recently.  ... 
doaj:85bacad436c74f7d938bffb0a4908b9d fatcat:iwsa5zthf5bujhsdcch4ghkwl4

Introducing the CYSAS-S3 Dataset for Operationalizing a Mission-Oriented Cyber Situational Awareness

Roumen Daton Medenou Choumanof, Salvador Llopis Sanchez, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido, Alvaro Luis Martinez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, Gerardo Ramis Pasqual de Riquelme, Marco Antonio Sotelo Monge (+4 others)
2022 Sensors  
, tactical and technical domains.  ...  The digital transformation of the defence sector is not exempt from innovative requirements and challenges, with the lack of availability of reliable, unbiased and consistent data for training automatisms  ...  guidelines for the evaluation methodology able to support the whole evaluation process of cyber defence tools.  ... 
doi:10.3390/s22145104 pmid:35890786 pmcid:PMC9318677 fatcat:lsq7u7fbrvc57onkmptwgdmziu

Artificial intelligence applications in aircraft systems

1997 Expert systems with applications  
applications related to the operation and support of aircraft systems.  ...  Air Operations Division at the DSTO Aeronautical and Maritime Research Laboratory is developing a capability in the use of Artificial Intelligence (AI), including knowledge based systems technology, in  ...  The domain expert for the aircraft performance estimation was the late Michael Howlett.  ... 
doi:10.1016/s0957-4174(97)86756-5 fatcat:h5ixe5i2zbghba5yq3rwzp6d3m
« Previous Showing results 1 — 15 out of 8,339 results