Military Dependence on Commercial Satellite Communications Systems--Strength or Vulnerability?
The military's growing dependence on commercial satellite communications systems will become a strength or vulnerability based on how well the right balance is achieved between commercial and military systems. Determining that balance is a function of clearly understanding both DoD's requirements and the vulnerabilities and risks associated with the use of, and dependence on, commercial systems. This report provides a short overview of the emerging commercial capabilities and then examines in depth the DoD process for validating requirements, the validated MILSATCOM requirements documented through that process, and the risks and vulnerabilities associated with the use of, and dependence on, commercial satellite communications systems. The main conclusion drawn is that commercial capabilities can help satisfy DoD requirements for capacity, but at a "cost" in most cases of accepting risk with respect to several key qualitative requirements, especially with respect to protection, assured access, and control. A few additional conclusions are drawn about how to achieve the best balance to satisfy DoD requirements with the least amount of risk and cost.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The All Seeing Eye
This research paper investigates the space environment in the 2030 timeframe with respect to the important space-based earth surveillance mission. It attempts to answer the question: "Can the U.S. field a persistent space-based surveillance capability in an operational domain that is increasingly challenged by adversary threats?" To answer this question, the paper looks at the nature of existing threats and the likely capability developments in the next 20 years. To counter the threats, the paper investigates a geosynchronous orbit based surveillance system. Such a system would be beyond the reach of current anti-satellite weapons. However, significant technical hurdles remain to make such a system a reality.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Adversary Use of Commercial Space
The ability to exploit space capabilities was once monopolized by a few select nations. However, the advent of the Information Era begat an increased demand for space services that inevitably drove a responding supply. Today, space-based force enablers are commercially available not just to nations, but individuals, alike. This ready accessibility of space capabilities places both US forces and her space industry at risk. Successfully addressing this risk will require the coordinated efforts of the Departments of Defense, State and Commerce. To best quantify the threat, one must not only determine what services are available, but who is providing them. Unsurprisingly, Russia, the member nations of the European Space Agency, Japan and China pose the greatest menace as adversary sources of space-based capabilities and competitors to US industry. Naturally, these states also host the largest commercial service providers such as SES Global, Arianespace, and Mitsubishi Heavy Industry. The sophistication and state backing of these entities merit close and continued scrutiny. Having identified the sources, one may then assess the services. Of the spectrum available, the greatest equalizer for the opposition to US forces is secure, two-way mobile communications. This is due to its inherent advantages as well as the capabilities such as networking that may be derived from it. Of lesser, but still significant benefit is satellite imagery. High resolution commercial imagery is not yet available on demand, but data as old as several years may still have utility when assessing non-mobile targets such as structures and runways. In contrast to these threats to US forces, the main danger to her industry stems from the limited accessibility of space. Launch segments endure excessive operating costs and high risks. Single failures can jeopardize corporate survival. Foreign companies have significantly lower stakes in this arena because many share the burden of launch expenses with tThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Ucav
Air superiority is an essential military mission, and will continue to be so for the foreseeable future. Control of the air is not an end of its own, but rather it provides the flexibility and freedom of action central to a full range of military capabilities. In the coming century the United States will confront a number of disparate and ambiguous challenges to its hegemony. The resources available to meet those challenges will undoubtedly be constrained. Extremely long lead times in the acquisition and procurement of new technologies mean that now, as the F-22 Raptor begins to replace the venerable F-15 Eagle, the next- generation air-superiority fighter is entering development. Unmanned aircraft must be considered as an alternative to manned aircraft for this critical mission. While cost has been the driving factor for advances in UCAV, technology has been the major limitation. This thesis concludes that an air-superiority UCAV should be feasible by the year 2025 and that it should provide an effective and affordable alternative to manned air-superiority fighters.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
At the Crossroads of Cyber Warfare
This thesis provides signposts to guide the Royal Australian Air Force during its journey through the development of a cyber capability. As with most journeys, there are always multiple paths; the challenge is to choose a path that will deliver an effective cyber force with the available resources. The emergence of cyberspace changed the character of war in ways Clausewitz could never have imagined. Cyber violence transcends the physical environment, creating effects on an adversary's warfighting capabilities as severe as a kinetic weapon. Uncertainty, the fog that envelopes all aspects of conflict, remains ever-present; however, cyber enables commanders greater situation awareness, shifting the shade of fog from opaque to translucent.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Methodology for Using Simulation Results for Test and Evaluation
Each year the Air Force spends billions of dollars on Test and Evaluation to ensure acquisition programs roll out the best possible products. In 1997, the National Research Council assembled to evaluate the overall procedure used in procuring various platforms with system planning, research, development and engineering (SPRDE) and program management (PM) processes. In their final report, they claimed that the full advantages of statistical practices, simulation, model-test-models, and incorporation of prior test information into current test practices have not been fully utilized. To examine one of the report's recommendations, this thesis defines and explores a methodology using simulation to augment or replace test data in lieu of operational testing. Specifically, a validated simulation model employs non-critical factor data from preliminary small sample operational testing.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cooperative Engagement
Air superiority has been a near given for the US in every conflict since the Korean War. We are, however, at the cusp of time in history where this could be challenged. An explosion in unmanned aerial vehicle technology and proliferation combine with an unpredictable asymmetric threat at the same time that the USAF inventory of air superiority fighter aircraft is decreasing rapidly. It is very plausible that we could enter a period where the air superiority requirements outstrip our capabilities. In this paper, the author presents a possible solution for this dilemma by combining manned fighter aircraft with unmanned launch platforms in a concept called cooperative engagement. The paper examines the argument for development of an unmanned airborne air-to-air capability in the USAF by exploring the mission of air superiority, followed by a presentation of potential threats to US air superiority. A gap analysis of USAF capability in this arena is examined, and arguments are made for making any added air-to-air capability unmanned through exploration of the concept of "cooperative engagement" between manned fighter aircraft and unmanned launch platforms.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Placing US Air Force Information Technology Investment Under the "Nanoscope" - A Clear Vision of Nanotechnology's Impact on Computing in 2030
The United States Air Force's Center for Strategy and Technology was established atthe Air War College in 1996. Its purpose is to engage in long-term strategic thinkingabout technology and its implications for United States national security. The Center(CSAT) focuses on education, research, and publications that support the integrationof technology into national strategy and policy. This document is one of thesepublications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Advanced Photochemical Oxidation Processes Handbook
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Benign Weather Modification
Weather modification is a technology once embraced by the U.S. military as a tool to help both wartime and peacetime missions. However, interest in the ability to modify weather has waned over recent years and is now nearly non-existent. This study examines one aspect of weather modification, benign weather modification, for possible use in assisting military operations. After briefly reviewing the history and science of weather modification, this study bounds the aspects of weather modification being addressed. The study then describes barriers to benign weather modification (BWM), showing how they affect current weather modification policy in the military. Then examples are shown of current civilian BWM techniques, their possible use by the military, and some military-unique needs for weather modification. After examining current weather modification and projected future BWM technology, this study concludes that military BWM use deserves another look. Increased reliance on precision guided munitions makes BWM a possible new tool in ensuring accurate targeting with minimal collateral damage. In addition, BWM offers the warplanner a means to dictate battlespace elements at a critical point in a conflict. At a minimum, the U.S. military should conduct a more in-depth review of weather modification to see if technological advances offer opportunities for more "bang for the buck."This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Higher Eyes in the Sky
During the past few years, Air Force leaders have begun to emphasize space operations. Global Engagement states that we will eventually transition from an Air and Space Force into a Space and Air Force and various leaders have opined that that air and space are "seamless." Air Force Chief-of-Staff General Fogleman introduced the concept that in the future, we will be able to "find, fix, target, track, and engage (F2T2E)" any target, anywhere on the earth. In order to actually accomplish F2T2E, the functions currently performed by the E-3 Airborne Warning and Control System (AWACS) and the E-8 Joint Surveillance Target Attack Radar System (JSTARS) will need to migrate to space-based platforms. This thesis explores how such a migration would occur. Before examining space operations, the historical military need for moving target indicators (MTI) is examined, tracing the evolution from hot air balloons to our current AWACS and JSTARS aircraft.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Costs to Convert Coal to Methanol
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Combined Arm Battalion and AirLand Battle
This monograph addresses how combined arms organizations should be formed in our Army today. Specifically, it focuses on the question, "what arms, if any, should be combined organically at battalion level?" This issue is important because our AirLand Battle doctrine considers combined arms to be essential to winning on the modern battlefield. Therefore, we should investigate the best means by which to maximize the potential of the organizations. The monograph first examines the theoretical foundation for combined arms. Next, both historical and contemporary evidence are examined to derive a set of criteria that can be used to analyze the four selected arms: infantry, armor, artillery, and engineer in terms of the AirLand battlefield environment. The five selected criteria are frequency of interaction, competence of commander to synchronize the effects of weapon systems, scarcity of resources, cope of tactical missions, and similarity in range and mobility. These criteria are key factors that should be used whenever determining how an organization should be structured organically. Conclusions concerning the structure of a combined arms battalion are drawn from an analysis of these dominant criteria. This monograph concludes that infantry and armor are the only two arms that should be combined organically at battalion level. By combining these two arms permanently, it is almost certain that the combat potential of the organizations will increase.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Moderate Course for USAF UAV Development
USAF unmanned aerial vehicle (UAV) advocacy from 1980 to date has swung from an apparent disinterest in UAV systems to an aggressive acceptance of UAVs to solve mission needs. However, continued UAV programmatic setbacks indicate an appropriate UAV course for the Air Force remains to be charted. Tactical UAV programs between 1980 and the early 1990s conspicuously lacked USAF involvement and demonstrated a sub-par evolution of UAV capabilities, technology, and development. However, spurred by concern over mission loss to sister services, USAF demonstrated a mid-1990s new found interest in UAVs despite the less-than-proven performance of previous UAV systems. USAF UAV acceptance was embodied in four UAV end states and two High Altitude Endurance (HAE) UAVs. However, continued setbacks with HAE UAV programs soon impacted USAF's ability to meet UAV end state timelines as well as USAF commitment to UAV funding. HAE UAV miscues indicate the USAF UAV course charted after its mid-1990s UAV acceptance was founded on unproven technology. Consequently, this paper recommends a moderate USAF UAV course founded on proven technology and conservative investment. This moderate UAV course is enabled by a `wait and see' approach with the ongoing HAE UAV Advanced Concept Technology Demonstration (ACTD). The `wait and see' approach commits minimal USAF funds to HAE UAVs pending successful HAE UAV technology demonstration.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Automated Civil Engineer Planning and Execution System
Air Force Civil Engineers have long supported the employment of airpower during contingency operations by planning, building, and maintaining platforms to launch and recover aircraft. In the cold war era, these launch platforms were usually collocated operating bases, supported by a robust infrastructure that was well known to CE planners. Unfortunately, drastic changes in our national security environment, and reduced infrastructure overseas, have meant that today's launch platforms are often unfamiliar runways and airstrips scattered throughout the world. CE planners, still tasked to beddown a variety of operational missions, are now faced with a much more difficult challenge. Specifically, they must plan beddowns at more remote locations, with less planning time and less preplanning information. The objective of this study was to find ways to improve the Civil Engineer contingency planning process through the use of automation technology. This study recommends an automation strategy based on a thorough examination of the air base planning process, existing automation initiatives and products, and future automation technologies. To support this research, the team conducted an extensive literature review and made numerous personal contacts with government agencies and commercial enterprises specializing in automation technology. Our research revealed that despite much effort in this area over the past ten years, a single tool to automate planning, execution, sustainment, and recovery of air base operations in a contingency environment does not exist but is readily attainable. This study found there are a variety of government and commercial software products and information databases currently available which can be used to build the foundation of an automated CE beddown planning tool.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Logging the JSF
Within the US Air Force, acquisition, operations, and logistics communities collectively face a perplexing question: What is the best way to plan the acquisition and life-cycle sustainment of a fighter aircraft fleet? To find the answer to this question the following thesis attempts to derive lessons learned from case study analysis to develop a new methodology for future use. Aircraft fleet size, in an acquisition program, is determined by assessing the capabilities necessary to meet current and future operational readiness demands. Aircraft sustainment, although equally important, is typically not considered during early procurement planning due to the difficulty in forecasting the sustainment infrastructure necessary to mitigate effects caused by aging and changing operational requirements. At best a nebulous endeavor, sustainment forecasting is affected by the myriad of dynamic organizational, technological, and budgetary influences caused by rigid DoD acquisition processes and inflexible Congressional appropriations cycles.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Fighter Pilot Inventory and Requirements Model
"Historically, managing fighter pilot requirements has been a continual challenge for the Air Force Personnel Center. In recent years, Unmanned Aerial Vehicles have become a highly sought after commodity, and the number of UAV billets have increased, with more increases expected in the near future. Currently 45% of UAV squadrons are manned by combat aircrew. Fighter pilots fills the majority of these slots. This dramatic increase in UAV requirements demands analysis for the impact on fighter pilot requirements. An increase in UAV fighter pilot billets represents a direct increase in force requirements, however, there may be an indirect effect on training and man year requirements."--Abstract from web site.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Geolocation of an Audio Source in a Multipath Environment Using Time-of-Arrival
The Air Force and the Department of Defense (DoD) are continually searching for ways to protect U.S. forces, both stateside and abroad. One continuing threat, especially in the current world environment, is gunfire from an unseen sniper. Designated areas, such as a forward deployed base or motorcade route, need to be continuously monitored for sniper fire. Once detected, these gunmen need to be located in real time. One possible method for accomplishing this task is to geolocate the audio signals generated using time-of-arrival (TOA) algorithms. These algorithms rely on direct-path measurements for accuracy. Multipath environments therefore pose a problem when measuring signals from the audio spectrum. The errors induced by a multipath environment can be reduced by introducing additional audio receivers to the detection system. By sampling all possible combinations of a minimum set of receivers (four), a more accurate location can be calculated. An accuracy of six meters can be achieved roughly 69 percent of the time, though most of the error occurs in the vertical component. An accuracy of six meters in the X/Y plane can be achieved approximately 97 percent of the time.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cca
Top military leadership has identified problems with the timeliness and effectiveness of DoD contingency construction support. Qualitative data was in order to gain clarity on the problem space and lay a foundation for solution generation and selection. Interviews were conducted with agents with experience within the Iraq and Afghanistan theater of operation as well as support functions for the Pentagon. Commanders, Engineers, Lawyers, Acquisition Attorneys, Staff Officers and Program Managers have been interview. The interviews have been analyzed using open coding to answer research question and identify to emergent themes and concepts. The data collected has confirmed the hypothesis that the project programming regulatory structure is not meeting its intent, or the needs of our war fighters. Furthermore, because it is not meeting the war fighter's need the system is being manipulated in order to, "accomplish the mission" which is creating unintended consequences with regard to cost, health, safety, force protection, ADA violations, mission support and safety. Significant negative consequences were found to be attributed to the interpretation of "temporary construction" and the time required to process CCA projects. Additionally, a value stream map was created in order to map the contingency construction approval and funding process. This research effort has provided clarity of the problem space of contingency construction and prepared a foundation for future research to address the problem.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Improving Air Mobility Command's Aircraft Maintenance Recovery Team Process
Given the significance of Air Mobility Command's role in rapid global mobility, not just for the Air Force but for the entire DoD, the U.S. cannot afford to lose any of its strategic airlift capability. For research purposes this paper narrowly defines lost strategic airlift capability as any of the two aircraft comprising AMC's strategic airlift fleet - namely the C-5 Galaxy and the C-17 Globemaster III - broken away from their station of assignment. To repair these aircraft when broken in'the system', AMC currently utilizes a dedicated system of command and control, people, parts, and equipment, some of which is pre-positioned and some available on an as-needed basis. Known broadly as the Maintenance Recovery Team (MRT) process, the system emphasizes identifying, troubleshooting, and fixing broken aircraft as quickly as possible to maximize strategic airlift availability to DoD and other airlift customers. With this in mind, this paper will discuss AMC's strategic airlift role, identify AMC's MRT process, analyze AMC's historical MRT data for specific improvement opportunities, and, where possible, recommend improvements leading to an increase in the efficiency of AMC's MRT process.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Da Pam 750璽"1
The United States Army Publishing Directorate is the Army's leader in publishing and delivering informational products worldwide. Their main mission is to supply official authenticated information to enhance the readiness of the total force. Some product topics include: Army Regulations, Engineering Technical Manuals, Administrative Publications, Circulars and Pamphlets. This is one of their documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Enhancing Battlespace Awareness for Tactical Ground Forces
There are many needs for enhanced battlespace awareness (BA) starting with the current ground warfighters' need for enhanced BA in the tactical environment and next from higher headquarters guidance and doctrine. Ground forces need improved BA to answer many tactical questions on the battlefield. Guidance from the President of the United States, the Office of the Secretary of Defense, and Joint Staff direct unified command responsibilities for military space, force transformation, and the evolution to more net-centric operations within military forces. In response to these needs, the Air Force is investing in new and transformational space-based intelligence, surveillance, and reconnaissance (ISR) capabilities. It is following a Command and amp; Control, Communications, Computers, Intelligence, Surveillance, and amp; Reconnaissance (C4ISR) Flight Plan to build greater connectivity with Department of Defense networks. It is also following the path to greater net-centric warfare capabilities through the development of an initial ISR common relevant operational picture (CROP). However, as the Air Force makes these changes and investments in enhancing BA, AFSPC should take a more active role and increase its focus on the entire process of delivering space-based ISR capabilities to the warfighter. This includes championing military space-based ISR issues and increasing Air Force and Army cooperation and integration for the ground warfighter. In addition, the Air Force should take the initiative to use existing, demonstrated technologies to build a better ISR CROP that starts the evolution within the entire intelligence community to the next generation of the tasking, processing, exploiting, and disseminating (TPED) process.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Extending USAF F-16 Force Structure
By fiscal year 2008, the Air Force will have a 108-fighter deficit based on a 20 Fighter Wing Equivalent requirement. That number grows to 311 by fiscal year 2021. These numbers are based on the today's programmed F-16 attrition rate of 3.6%, an estimated 8,000-hour F-16 service life, and fielding of the Joint Strike Fighter beginning in fiscal year 2009. This research study will attempt to answer the question, Will there be sufficient combat-capable F-16 aircraft available to meet USAF force structure requirements prior to fielding of the JSF? The study attempts to answer the question by looking at the current state of the USAF F-16 fleet and then by looking at the Joint Strike Fighter Program as the replacement for the F-16, it's forecast schedule, funding, and associated risk.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
F-16 Uninhabited Air Combat Vehicles
The U.S. Air Force is actively pursuing unmanned aerial vehicle (UAV) programs for surveillance and reconnaissance missions. However, the Air Force has not funded any substantial research into bomb or missile carrying "lethal" UAVs, also called uninhabited combat air vehicles (UCAVs), despite the recommendations of the USAF scientific board's New World Vistas, DARPA, and the Air Force 2025 project. With budget constraints and a reluctance to transition to an unmanned combat force, new advanced technology UCAVs are decades from operational status.In the meantime, the U.S. needs to quickly field an interim UCAV program for political, economic and military reasons. An interim UCAV will provide another unmanned military option for U.S. leadership that currently relies on cruise missiles to deal with conflicts where the loss of American lives is politically unacceptable.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Non-Lethal Technologies
The United States Air Force's Center for Strategy and Technology was established atthe Air War College in 1996. Its purpose is to engage in long-term strategic thinkingabout technology and its implications for United States national security. The Center(CSAT) focuses on education, research, and publications that support the integrationof technology into national strategy and policy. This document is one of thesepublications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Understanding the Emergence of Disruptive Innovation in Air Force Science and Technology Organizations
Although innovation is widely discussed in both military and industry venues, many organizations continue to struggle with whatit means to be creative as well as maintain a competitive advantage. The United States Air Force has specifically struggled with thebalance between improving existing technologies and employing revolutionary technologies. The purpose of this thesis research was tostudy the motivation, focus, barriers, and culture needed to foster disruptive innovation in Air Force Science and Technology (S and T) and toinvestigate how industry innovation strategies could improve breakthrough Air Force technology emergence. The Air Force ResearchLaboratory (AFRL), the primary organization responsible for planning and executing all aspects of the Air Force science and technologyprogram, is the ideal study subject to represent the Air Force S and T community at large. Two previous industry research studies, nowreplicated in an AFRL organizational environment, provided quantitative and qualitative comparisons between the industry and Air ForceS and T communities.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Going Deep
Finding deeply buried facilities stands out as one of the toughest technical challenges in the Air Force's efforts to find, fix, target, track, engage and assess targets of interest anywhere on earth. Nations have located potential high-value, high-interest targets such as weapons of mass destruction (WMD), WMD manufacturing plants and storage areas, missile garrisons, fuel storage areas and command and control nodes underground. This paper will focus on the development and application of gravity field sensors for deeply buried target detection. It will begin with an explanation of what deeply buried facilities are and how their construction and use has evolved over the years. Next, the discussion will look at the weapons available today to counter deeply buried facilities and the intelligence information needed to make these weapons effective. The information needed to properly target these weapons will directly influence the capability of the sensors needed to detect and characterize deeply buried facilities. The focus of the paper will then shift to intelligence sources, starting with the intelligence capabilities available today and the ability of a potential enemy to counter those intelligence assets, then shift to exploring intelligence sources not in use today and their potential application in the hunt for deeply buried facilities. Finally, this paper will investigate gravity measurement technology to address the problem of deeply buried facility detection and characterization. The examination will include the history of gravity measurement technology, current uses for geology and earth science, ongoing laboratory developments and the applicability of this technology to the search of deeply buried targets. The discussion will conclude with desired system capabilities and potential system concepts.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Determining the Surface-to-Air Missile Requirement for Western and Southern Part of the Turkish Air Defense System
An air defense system is vital for countries to protect their homelands. Today, air defense systems consist of integrated systems such as early warning radars, fighter aircraft, airborne early warning aircraft and surface-to-air (SAM) systems. The Turkish air defense system does not have long range SAM systems. Turkey plans to procure SAM systems to protect her borders. This research develops two location optimization models to optimally locate SAM sites to defend specified areas of the nation. One of the models finds the minimum number of SAM sites to cover the specified area; the other finds the maximum coverage for a given number of SAM sites. The model is formulated as an integer program, and the LINGO 10 software package is used to solve the model. Three candidate SAM systems are examined. All models use the maximum range of each SAM system. Solutions are presented for the decision makers to examine. Sensitivity analysis is used to explore how much the optimal solution(s) change given fluctuations in input values. The main objective of this research is to provide the Turkish Air Force coverage information regarding the three candidate SAM systems. This research also provides a model and an approach that can be used to examine other candidate systems. The results and models presented in this research should facilitate development of a more efficient and effective air defense system to support Turkey's homeland defense.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cca
Top military leadership has identified problems with the timeliness and effectiveness of DoD contingency construction support. Qualitative data was in order to gain clarity on the problem space and lay a foundation for solution generation and selection. Interviews were conducted with agents with experience within the Iraq and Afghanistan theater of operation as well as support functions for the Pentagon. Commanders, Engineers, Lawyers, Acquisition Attorneys, Staff Officers and Program Managers have been interview. The interviews have been analyzed using open coding to answer research question and identify to emergent themes and concepts. The data collected has confirmed the hypothesis that the project programming regulatory structure is not meeting its intent, or the needs of our war fighters. Furthermore, because it is not meeting the war fighter's need the system is being manipulated in order to, "accomplish the mission" which is creating unintended consequences with regard to cost, health, safety, force protection, ADA violations, mission support and safety. Significant negative consequences were found to be attributed to the interpretation of "temporary construction" and the time required to process CCA projects. Additionally, a value stream map was created in order to map the contingency construction approval and funding process. This research effort has provided clarity of the problem space of contingency construction and prepared a foundation for future research to address the problem.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Higher Eyes in the Sky
During the past few years, United States Air Force (USAF) leaders have begun to emphasize space operations. Global Engagement: A Vision for the 21st Century Air Force states that we will eventually transition from an air and space force into a space and air force and various leaders have opined that that air and space are seamless. Gen Ronald R. Fogleman, USAF chief of staff, introduced the concept that in the future, we will be able to "find, fix, target, track, and engage (F2T2E)" any target, anywhere on the earth. In order to accomplish F2T2E, the functions performed by the E-3 airborne warning and control system (AWACS) and the E-8 joint surveillance, target attack radar system (JSTARS) will need to migrate to space-based platforms. This study explores how such a migration would occur.Before examining space operations, the historical military need for moving tar-get indicators (MTI) is examined, tracing the evolution from hot air balloons to our current AWACS and JSTARS aircraft. Because space systems operate differently from airborne systems, those differences are explored. The organizations involved in space operations are also examined, along with their potential to effect the development of a space-based MTI system. The radar systems of both the AWACS and the JSTARS are described, as well as a few of the most prominent of the proposed space-based systems.The planning for space-based MTI is in its early phases. A "Concept of Operations for Space-Based MTI" has been written, as has a "Space-Based MTI Roadmap." US Space Command has also written the Long Range Plan, which includes space-based MTI concepts in its plan for 2020. These plans are a good start but do not address several important issues, including satellite architecture, whether satellite MTI systems should completely replace airborne systems, who should be responsible for the system, and how battle managers will operate in the new system.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A New Age for Aerostats
Both the U.S. and its allies have increasingly relied upon civilian transport aircraft, such as the Civil Reserve Air Fleet (CRAF), to augment organic military airlift. However, the widespread proliferation of Man Portable Air Defense Systems (MANPADS) poses a significant threat to unprotected civilian aircraft. Previous research focused on installing the military's counter-MANPADS systems, such as Infrared Countermeasures (IRCM), on civilian aircraft. However, the unique CRAF operating environment makes such an aircraft-centric approach economically unfeasible. Instead, future counter-MANPADS programs should shift focus from protecting individual aircraft to an area-wide system that protects entire airfields. Aerostats possess unique capabilities that enable them to provide an area-wide counter-MANPADS defense using existing IRCM technology.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Tactical Information Gathering in the High Technology Command and Control Environment
This study investigates the US Army division commander's leadership responsibilities in directing the information gathering effort of his high technology command and control systems. The study first summarizes some major criteria for effective command and control. The study briefly describes today's command and control environment, recognizing the effects of the latest technology, revised doctrine, and the timeless human element of war. It then examines the potential effects of high technology information gathering on effective command and control. The study identifies five leadership requirements for the division commander in directing the information gathering effort. Those requirements are to: emphasize "command" over "control", organize the systems for the information gathering effort, focus the information gathering effort, discipline the information gathering systems, and train for the effort. The study concludes that the division commander's personal and organizational leadership is necessary to gain the great advantages of the US Army division's modern information gathering systems while minimizing the inherent adverse effects of those systems on effective command and control.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cooperative Engagement
Air superiority has been a near given for the US in every conflict since the Korean War. We are, however, at the cusp of time in history where this could be challenged. An explosion in unmanned aerial vehicle technology and proliferation combine with an unpredictable asymmetric threat at the same time that the USAF inventory of air superiority fighter aircraft is decreasing rapidly. It is very plausible that we could enter a period where the air superiority requirements outstrip our capabilities. In this paper, the author presents a possible solution for this dilemma by combining manned fighter aircraft with unmanned launch platforms in a concept called cooperative engagement. The paper examines the argument for development of an unmanned airborne air-to-air capability in the USAF by exploring the mission of air superiority, followed by a presentation of potential threats to US air superiority. A gap analysis of USAF capability in this arena is examined, and arguments are made for making any added air-to-air capability unmanned through exploration of the concept of "cooperative engagement" between manned fighter aircraft and unmanned launch platforms.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Application of Intelligent Systems to the Close Air Support Mission
The US is clearly moving toward developing an autonomous attack capability, and the intelligent systems to provide battlefield situational awareness will be a key enabling technology for this autonomous attack capability. Within the close air support (CAS) environment, the application of intelligent systems could facilitate the tasks of joint terminal attack controller (JTAC) and the CAS command and control (C2) system. Associated-based systems can provide the JTAC and CAS C2 structure with the intelligent systems for battlefield situational awareness. Both associate systems would utilize an assessor, planner, and interface framework. These systems could be utilized to aid the JTAC in developing attacks and make the C2 process more efficient, thus making the overall CAS system more effective. An associate-based CAS system would make optimal use of available air assets and be less likely to result in fratricide or collateral damage while also ensuring adherence to the rules of engagement. This paper will examine associate systems and CAS operations along with the application of associate systems to the JTAC and CAS C2 process and the associated doctrinal implications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Critical Examination of C-130 Programmed Depot Maintenance (PDM) Induction Methodology
The current USAF process for establishing intervals between C-130 PDM does not account for the wide range of aircraft variables within each aircraft MDS. This paper develops an analytical model, based on five unique aircraft variables, to provide C-130 maintainers with a prediction tool to forecast when a C-130 aircraft requires PDM. These five variables include: aircraft age, total flying hours, average yearly flying hours, mission profile (expressed as a severity factor), and operating location of the aircraft. Interviews with C-130 SPO personnel, combined with use of the C-130 Service Life Data Base, provided the required data to develop the C-130 PDM interval model.The C-130 PDM interval model developed in this paper allows maintainers and operators to predict the optimum time between C-130 PDM activities. It eliminates the requirement to base PDM intervals on aircraft MDS. As a result, there is a potential for significant savings by deferring PDM for a portion of the C-130 fleet. Finally, the PDM interval model developed in this paper may be applicable for other DOD aircraft which use aircraft MDS as the determinant of PDM intervals.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Weaponeering the Future Directed Energy Weapons Effectiveness Now and Tomorrow
The United States Air Force's Center for Strategy and Technology was established atthe Air War College in 1996. Its purpose is to engage in long-term strategic thinkingabout technology and its implications for United States national security. The Center(CSAT) focuses on education, research, and publications that support the integrationof technology into national strategy and policy. This document is one of thesepublications.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Unmanned Combat Aerial Vehicles
Military operations since Desert Storm have taken an almost ultramodern style of warfare a step away from the notion of sequential operations of the past, throughout the successful concept of parallel warfare during the Gulf War, toward a transformational strategy of network-centric warfare (NCW) now being adopted by the Department of Defense. The key technologies associated with NCW are information superiority, stealth, precision, engagement, combination of manned and unmanned aerial platforms. Recent events around the world demonstrate the unique capabilities of the Predator Unmanned Aerial Vehicle have triggered a revolution in unmanned aerospace vehicle research. Proponents, including the President of the United States, are touting the Unmanned Combat Aerial Vehicle (UCAV) as the next generation bomber and fighter platform. This paper investigates the feasibility of an unmanned aerial vehicle as an alternative in close air support (CAS) operations. Can an unmanned airplane engage targets in close proximity to friendly troops with the same or better results than a manned aircraft? To better understand the military applications of UCAVs conducting CAS, several areas must be considered doctrine, cost, survivability, distinct capabilities, and demonstrated accuracy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Airlift 2025
The Chief of Staff of the Air Force, General Ronald R. Fogleman, has directed the Air University to conduct a major study on air and space power and concepts applicable to the year 2025 and beyond. This will include examination of innovative systems, new concepts of operations, and the emerging technologies enabling them. The study formally commenced in August 1995 when the students arrived for the Air University 1995-1996 academic year and will conclude in June 1996 with delivery of the final report to the Chief of Staff of the Air Force. The final report will be a logically ordered collection of white papers developed from the innovative concepts and technology abstracts submitted.Power projection is critically dependent on mobility forces. The air mobility system should be capable of supporting national objectives from humanitarian, non-hostile operations through armed conflict. Because of operational constraints that include evolving threats and reduced external infrastructure, the airlift system in the year 2025 should be independent of theater basing structure. International political changes will likely necessitate the basing of most, if not all, US military forces in the continental United States (CONUS). However, this will not end the requirement for a global US presence. Although the probability of direct foreign military threats to our interests may be slight, Air Mobility Command (AMC), the air transportation arm of US Transportation Command, must be prepared to conduct global air mobility on a daily basis. In addition, AMC must continue to support humanitarian and peacekeeping missions in both benign and hostile environments. These expanding requirements demand attention. This paper proposes technologically feasible concepts to meet the air mobility requirements posed by probable US national objectives in the year 2025.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
High Temperature Coarsening of Cr2Nb Precipitates in Cu-8 Cr-4 Nb Alloy
A new high-temperature-strength, high-conductivity Cu-Cr-Nb alloy with a CrNb ratio of 2:1 was developed to achieve improved performance and durability. The Cu-8 Cr4 Nb alloy studied has demonstrated remarkable thermal and microstructural stability after long exposures at temperatures up to 0.98 T(sub m). This stability was mainly attributed to the slow coarsening kinetics of the Cr2Nb precipitates present in the alloy. At all temperatures, the microstructure consists of a bimodal and sometimes trimodal distribution of strengthening Cr2Nb precipitates, depending on precipitation condition, i.e. from liquid or solid solution, and cooling rates. These precipitates remain in the same size range, i.e. large precipitates of approximately I pm, and small precipitates less dm 300 nm, and effectively pin the grain boundaries thus retaining a fine grain size of 2.7 micro-m after 100 h at 1323 K. (A relatively small number of Cr-rich and Nb-rich particles were also present.) This grain boundary pinning and sluggish coarsening of Cr2Nb particles explain the retention of good mechanical properties after prolonged holding at very high temperatures, e.g., 75% of the original hardness after aging for 100 h at 1273 K. Application of LSW-based coarsening models indicated that the coarsening kinetics of the large precipitates are most likely governed by grain boundary diffsion and, to a lesser extent, volume diffusion mechanisms.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Treatise on Military Small Arms and Ammunition, With Theory of the Motion of a Rifle Bullet
The collections contained within the Combined Arms Research Library Digital Library are largely composed of digital versions of paper documents from the Combined Arms Research Library collections and student papers produced at the US Army Command and General Staff College. The documents in this collection cover the areas on the Vietnam Conflict, Korean War, and the U.S. Civil War, to name a few. This is one of those documents.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Air Pollution Control Orientation Course
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Richard Nixon. The agency is charged with protecting human health and the environment, by writing and enforcing regulations based on laws passed by Congress. The EPA's struggle to protect health and the environment is seen through each of its official publications. These publications outline new policies, detail problems with enforcing laws, document the need for new legislation, and describe new tactics to use to solve these issues. This collection of publications ranges from historic documents to reports released in the new millennium, and features works like: Bicycle for a Better Environment, Health Effects of Increasing Sulfur Oxides Emissions Draft, and Women and Environmental Health.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Survey of Satellite Communications System Vulnerabilities
The U.S. military's increasing reliance on commercial and military communications satellites to enable widely-dispersed, mobile forces to communicate makes these space assets increasingly vulnerable to attack by adversaries. Attacks on these satellites could cause military communications to become unavailable at critical moments during a conflict. This research dissected a typical satellite communications system in order to provide an understanding of the possible attacker entry points into the system, to determine the vulnerabilities associated with each of these access points, and to analyze the possible impacts of these vulnerabilities to U.S. military operations. By understanding these vulnerabilities of U.S. communications satellite systems, methods can be developed to mitigate these threats and protect future systems. This research concluded that the satellite antenna is the most vulnerable component of the satellite communications system's space segment. The antenna makes the satellite vulnerable to intentional attacks such as: RF jamming, spoofing, meaconing, and deliberate physical attack. The most vulnerable Earth segment component was found to be the Earth station network, which incorporates both Earth station and NOC vulnerabilities. Earth segment vulnerabilities include RF jamming, deliberate physical attack, and Internet connection vulnerabilities. The most vulnerable user segment components were found to be the SSPs and PoPs. SSPs are subject to the vulnerabilities of the services offered, the vulnerabilities of Internet connectivity, and the vulnerabilities associated with operating the VSAT central hub. PoPs are susceptible to the vulnerabilities of the PoP routers, the vulnerabilities of Internet and Intranet connectivity, and the vulnerabilities associated with cellular network access.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Weaponeering the Future
Direct Energy weapons can exist on the battlefield of today. Yet, the warfighter needs to know what Probability of Damage theses weapons can attain. Currently, the Joint Munitions Effectiveness Manual calculates a Single Sortie Probability of Damage for conventional Blast and Fragmentation weapons. Using Futures Research methodology allows determination of what effects Direct Energy weapons will impart in the year 2035. The Status of Futures Index (SoFI) method compares complex entities to one another across multiple dimensions. Adapting the Single Sortie Probability of Damage formula for Lasers, Microwave and Millimeter wave weapons allows a determination of their effectiveness. The required formulas for each type of Direct Energy Weapons' Probability of Damage (or Effect) are derived and explained. The Direct Energy weapons are compared to both conventional weapons and one another. Adjusting these Probability equations adjusted for various inputs enables a forecast of the future capabilities of each weapon. The current trend trajectory establishes a baseline estimate of future Probabilities of Effect. Then, disruptive technologies are analyzed for their effect on the weapons capabilities. Each type of weapon poses a unique challenge. For Laser to match the capabilities of Blast/Fragmentation weapons, the power output must be increased. Microwaves, not only require increases in power, but also advances in antenna technology. Millimeter wave weapons can currently produce the required power, but manufacturing the weapons proves an obstacle. To overcome these difficulties, new technologies must be pursued. The SoFI method allows continuous evaluation of progress toward the goal of effective Direct Energy Weapons.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Life Cycle Assessment and Economic Analysis of Wind Turbines Using Monte Carlo Simulation
The United States depends heavily on nonrenewable fossil fuels to generate electricity. Using renewable energy sources, such as wind, could reduce air emissions and fossil fuel dependency. Previous studies have examined the life cycle costs and environmental impacts of using wind to generate electricity, but results have varied due to inconsistent modeling assumptions. This research uses Monte Carlo simulation to conduct an economic payback analysis and life cycle assessment of 11 modern, utility-scale wind turbines. Hourly meteorological data was used to evaluate 239 U.S. locations. For each location, the wind turbine with the shortest median payback period was assumed to be the economically preferred turbine model. This simulation demonstrates that variance in the model output is primarily caused by differences in location-specific climate data (wind speed, air density). Depending on the location, the median economic payback periods ranged from 2 to 132 years. 41% of the locations had median payback periods less than 10 years, and 63% less than 15 years. Considering a typical turbine lifespan of 15-30 years, wind turbines are not economically viable at all locations. At locations with favorable wind resources, wind turbines are likely to be superior to electricity production using natural gas or coal. For the preferred wind turbine, the median life cycle energy intensities at all 239 locations ranged from 0.05-0.54 (KWh energy inputs/KWh outputs), compared to 2.3 for natural gas and 2.6-3.5 for coal-fired electricity generation. The median CO2 (eq) intensity values range from 13-156 g-CO2 (eq)/kWh for the preferred wind turbine, compared to 585 g-CO2 (eq)/kWh for natural gas and 757-1042 g-CO2 (eq)/kWh for coal-fired power plants.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Intelligence Surveillance and Reconnaissance Asset Assignment for Optimal Mission Effectiveness
This research develops mathematical programming techniques to solve an intelligence, surveillance, and reconnaissance sensor assignment problem for USSTRATCOM. The problem as specifed is hypothesized to be difficult (i.e NP-HARD).With the smallest test cases, the true optimal solution is found using simple optimization techniques, but, due to intractability, the optimal solutions for larger test cases are not found using these same techniques. Instead, heuristic techniques are applied to several test cases in order to determine the best, robust methodologies to find true or near optimal solutions. Specifically, simulated annealing (SA) is tested for convergence properties across several different parameter settings. This research also utilizes local search techniques with simple exchange neighborhoods of various sizes. Mission prioritization is also examined via a weighted sum scalarization technique.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Space Coordinating Authority of Information Services From Space
In recognizing the importance of space power to military operations, doctrine recommends a single authority to coordinate joint theater space operations and integrate space capabilities. The Joint Force Commander (JFC) may designate a space coordinating authority (SCA) to facilitate unity of effort in employing space power. Unity of effort is crucial, as unity of command is problematic. Military operations often exploit civil, commercial, national, and military space capabilities to aid and accelerate observations, decisions, and actions across the entire spectrum of conflict. Space capabilities are foundational to the information domain providing communications, warning, intelligence, surveillance, reconnaissance, positioning, navigation, timing, environmental and weather data. Information services from space improve operations through space-integrated applications of combat powerThe space power combination of supporting space information services and space superiority is a force multiplier for military commanders. The JFC needs SCA to deconflict, prioritize, and integrate space capabilities by optimizing usage of finite space resources from various sources. This paper, from an Airman's perspective for operations in joint and coalition environments, proposes a space power framework for the JFC to employ SCA. It explores space capabilities and the responsibilities of SCA. With the advent of the new Director of Space Forces (DIRSPACEFOR) construct in Air Force doctrine, it provides recommended doctrinal changes to SCA responsibilities. It offers intellectual thought for coordinating and controlling space power at the operational level of war.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
A Framework for Prognostics Reasoning
The use of system data to make predictions about the future system state, commonly known as prognostics, is a rapidly developing field. Prognostics seeks to build on current diagnostic equipment capabilities for its predictive capability. Many military systems, including the Joint Strike Fighter (JSF), are planning to include on-board prognostics systems to enhance system supportability and affordability. Current research efforts supporting these developments tend to focus on developing a prognostic tool for one specific system component. This dissertation research presents a comprehensive literature review of these developing research efforts. It also develops presents a mathematical model for the optimum allocation of prognostics sensors and their associated classifiers on a given system and all of its components. The model assumptions about system criticality are consistent with current industrial philosophies. This research also develops methodologies for combining sensor classifiers to allow for the selection of the best sensor ensemble.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Caught in a Jam
Caught in a Jam: the US Air Force's Electronic Attack Conundrum Stealth or low-observable aircraft are not a substitute for air defense suppression. As Air Force leaders strive to recapitalize the air fleet with fifth generation capability, they are failing to address a core component of modern air combat--electronic attack (EA). Electronic attack is the shield that protects all generations of air assets from the bite of integrated air defense systems. No form of warfare, including stealth air warfare, is sufficient on its own. All are able to be threatened in ways that make them vulnerable to attack. This lesson was evident in Kosovo almost a decade ago when Serbians armed with early generation surface-to-air missiles where able to track, target, and shoot down an F-117 stealth fighter. This lesson seems lost, unfortunately, by today's air leaders seeking to acquire more advanced, high-priced, fighters to re-posture our nation's air inventory. While these procurements are certainly warranted, they do not guarantee a significantly higher probability of success without adequate support jamming assets in the anti-access environment of an advanced, sophisticated air defense network. Our adversaries have the benefit of observing two decades of stealth employment and are not complacent. The Air Force must take bold steps now to cement its stake in securing the shield that has protected coalition air assets since the Vietnam War. If the Air Force continues to ignore the EA gap staring them in the face, the fundamental operational concept of air employment will be significantly altered and the entire force structure will be at greater risk. The US Navy has provided electronic attack for the joint force since the mid-1990's when the Air Force decided to retire its EF-111 and RF-4 airframes in the wake of the successes of the Persian Gulf War. Stealth technology was seen as a panacea for defeating air defense systems. The Navy, lacking organic stealth capability, decided tThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.