The Hand-book Of Artillery
"The Hand-book Of Artillery" by Joseph Roberts, originally published in 1861, serves as a comprehensive guide to the science and practice of artillery. Written during a period of significant military development, this handbook offers detailed instruction on the operation, maintenance, and tactical employment of artillery pieces. The book provides insights into the types of artillery in use at the time, including field guns, howitzers, and mortars, detailing their construction, capabilities, and limitations. Roberts's work also covers essential aspects of gunnery, such as aiming, firing, and calculating trajectories, along with practical advice on the preparation of ammunition and the management of artillery crews. This handbook is an invaluable resource for understanding 19th-century military technology and tactics, appealing to historians, military enthusiasts, and anyone interested in the evolution of modern warfare. A vital resource for those seeking to understand the intricacies of artillery during a pivotal era in military history.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Science Of Gunnery
"The Science Of Gunnery" by William Greener offers a detailed exploration of gunnery as it applies to military and sporting arms across major nations including England, France, Belgium, Austria, Prussia, Russia, and America. This comprehensive treatise delves into the scientific principles underpinning the construction, operation, and effectiveness of firearms during the era. Greener's work is an invaluable resource for historians, military enthusiasts, and anyone interested in the evolution of weaponry and the science behind it. With its detailed analysis and broad scope, "The Science Of Gunnery" provides a unique insight into the technological advancements and strategic considerations of nineteenth-century warfare and sport.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Occasional Papers, Engineer School, United States Army
"Occasional Papers, Engineer School, United States Army, Volume 35" presents a collection of technical papers and studies pertinent to military engineering and related topics. Authored by the U.S. Army Engineer School, this volume likely covers a range of subjects relevant to the training and education of army engineers. These papers offer insights into engineering practices, technologies, and strategic considerations important to the U.S. Army.This volume serves as a valuable resource for understanding the historical development and technical expertise within the U.S. Army Corps of Engineers. Readers interested in military history, engineering education, and the evolution of military technology will find this collection insightful.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Materials Of Engineering ...
"The Materials Of Engineering... Non-ferrous Metals And Alloys: Copper" delves into the properties, processing, and applications of copper and its alloys. Authored by Robert Henry Thurston, this work provides a detailed examination of copper's role in engineering, highlighting its significance in various industrial sectors.This book offers insights into the characteristics that make copper and its alloys essential components in numerous applications. Readers will gain a comprehensive understanding of the metallurgical aspects, mechanical properties, and practical uses of these materials.With its focus on the technical aspects of copper, this book serves as a valuable resource for engineers, materials scientists, and anyone involved in industries where non-ferrous metals play a critical role.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Materials Of Engineering ...
"The Materials Of Engineering... Non-ferrous Metals And Alloys: Copper" delves into the properties, processing, and applications of copper and its alloys. Authored by Robert Henry Thurston, this work provides a detailed examination of copper's role in engineering, highlighting its significance in various industrial sectors.This book offers insights into the characteristics that make copper and its alloys essential components in numerous applications. Readers will gain a comprehensive understanding of the metallurgical aspects, mechanical properties, and practical uses of these materials.With its focus on the technical aspects of copper, this book serves as a valuable resource for engineers, materials scientists, and anyone involved in industries where non-ferrous metals play a critical role.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Commit To Solar
Commit To Solar - The Ultimate Guide To Understanding, Marketing and Selling Solar - is the creation of author Russ Ward. Russ explains exactly how solar works, the benefits and barriers to adoption. From there he uses his own experience from many years of solar sales and marketing to explain exactly how to perform the best solar marketing campains and how to close sales. He adds golden nuggets (crowns) throughout the book as personal advice to solar marketing and sales reps. This book will help you understand, market and sell solar at a much higher level!
Effects of the New FM 3-0 Operations on Combat Service Support Planning Models
A gap exists between how logistics planners and operational planners see the military environment. This leads to asynchronous planning and flawed solutions. The central theme necessary to merge these two worlds is the common operational picture. By understanding the nature of the problem, efforts can be mutually applied to strengthen the impact of the solution while adequately protecting friendly vulnerabilities from threat influence. This common operational picture rarely forms without a common frame of reference. Nested doctrine tempered by operational art provides the foundation of that framework as it synchronizes planning models and illuminates the critical relationships between them prior to force application. The operational planner depends on clear, comprehensive doctrine to guide and inform the planning process. Shared understanding essential to collective staff work requires a common doctrinal base that is useful, relevant and nested with parent doctrine. Army CSS doctrine must parallel maturation of joint operations doctrine for the logistical focus to remain sharp. The perspectives from which operations and logistics planners respectively view military problems are fundamentally different, yet they have similarities and a mutual purpose. The purpose of logistics is to enable operations. The purpose of operations is to gain the advantage relative to the threat. Both focus on defeating the threat. Neither of these efforts can be successful without the other. In abstract terms both perspectives must merge to highlight relationships necessary to defeat the threat while perpetuating friendly strengths. This holistic approach to problem solving relies more on synthesis of comprehensive doctrine than on branch specific analysis. No single battlefield operating function (BOF) can expect to be successful alone. Nor can the sum of all functions achieve success operating in a stovepipe-like manner. Shared situational awareness is essential to combining individualThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Future of Autonomous Ground Logistics
The military needs an autonomous ground convoy capability because the speed and complexity of the environment in which it operates has begun to exceed the abilities of its members to operate within it. U.S. Army doctrine requires the logistics forces to be able to provide continuous and uninterrupted distribution of supplies. Human frailty, high volumes of supplies, fast paced and offensive operations all hinder the ground transportation system from being able to keep pace. Operational commanders continue to hold back their operations and look back for the required supplies to sustain them. Robotics technology has reached a point where the technology is ready to support some military operations but funding priorities, planning horizons and organizational reluctance towards the new technology are hindering this evolution in transportation operations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Command and Employment of Space Power
It is inevitable that mankind will weaponize space and likely this weaponization will take place in the next thirty years. The United States is in the early stages of a transition from using space assets to support combat operations on the surface of the earth to using space assets to conduct combat operations in space, from space, and through space. This paper discusses factors driving the United States to take its first steps to weaponize space. It is the time for the Air Force to start building the doctrinal framework for combat operations in, from, and through space to guide the technological development of space assets as the doctrine of strategic bombardment guided Air Force thought and aircraft development prior to World War II. This paper discusses the transition from an air to a space force by examining required changes to Air Force doctrine within the framework of its six core competencies if the Air Force is to organize, train, and equip aerospace forces to conduct combat operations in the space environment.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Lead Warfighters and Innovations
Each war has a set of unique contextual elements that make it different from the wars of the past; thus, preparing for war will inevitably uncover capability gaps and deficiencies in warfighting capability. This paper explores the methods used by the Air Force acquisition community during combat operations to fill those gaps, with a specific concentration on developing and employing immature systems via the rapid response process (RRP). New concepts, such as effects-based operations (EBO) and evolutionary acquisition have the potential to enhance the acquisition professional's ability to support the warfighter during times of conflict. EBO will enhance the war planner's ability to highlight capability gaps, and with increased collaboration, the warfighters and acquisition professionals can work together to produce enhanced warfighting capability. Evolutionary acquisition, through spiral development, will speed up the acquisition process and provide more options for filling capability gaps. Underlying each of these concepts is the premise that the Air Force is able to innovate. Undoubtedly, the Air Force can innovate; however, research shows that modifications to current organizations are required to maximize the Air Force's most important source of innovation-the lead warfighters. These modifications will enhance collaboration between the acquisition professionals and the lead warfighters to ensure the Air Force is capitalizing on this important source of innovation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Generating Bomber Routes for the Delivery of Gravity Weapons
Probabilistic quantitative precipitation forecasts (PQPF) based on the medium range forecast (MRF) ensemble are currently in operational use below their full potential quality (i.e., accuracy and reliability). This unfulfilled potential is due to the MRF ensemble being adversely affected by systematic errors which arise from an imperfect model and less than ideal ensemble initial perturbations. This thesis sought to construct a calibration to account for these systematic errors and thus produce higher quality PQPF. Systematic errors were explored with the use of the verification rank histogram, which tracks the performance of the ensemble. The information in these histograms was then used in interpreting MRF ensemble forecasts to produce calibrated PQPF.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cyber Power
Cyberspace is the newest warfighting domain, but heretofore it has been the nearly exclusive purview of technical experts, not warfighters. Consequently, much of the work on cyber power theory has eschewed the traditional concepts and lexicon of war in favor of language more familiar to technical experts in information communications technology. This convention stunts strategic thinking on cyber power and creates a barrier to cyber power's integration into joint military operations. For these reasons, this study advances the beginnings of a cyber power theory rooted in the lessons of war experience in the traditional warfighting domains of land, sea, and air. By examining cyber power through the lens of fundamental concepts like initiative, terrain, speed, and mobility cyberspace's similarities to the other warfighting domains emerge. Cyber power combines qualities inherent to land, sea, and air power -- making cyber power simultaneously distinct from, and analogous to, all three. This unique synergy is what separates cyber power from these other forms of military power. At the same time, similarities between cyberspace and the physical domains lets cyber power theory take lessons from past war experiences, as well as from the military theories of those like Carl von Clausewitz, Sir Julian Corbett, Sir John Slessor, and John Boyd. By rigorously observing when the analogies between cyberspace and the other domains apply and collapse, this study gleans some lessons from traditional experience and theory on how to seize the advantage on attack or defense in cyber power.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Enabling Design
Current operations indicate that improvements are warranted within our Battle Command (BC) planning method to support complex and ill-structured problems. Several modified approaches have been reviewed and synthesized into a general theoretical method currently addressed as Design. A practice of Design is necessary to facilitate the employment of Design theories. Design analysis so far has focused more upon the theory and less upon the actual practices of Design. Guidelines for conducting Design within Army forces do not exist within doctrine or SOP. There are no descriptive guidelines for the organization (team size, roles, and responsibilities), management (time, workflow, artifacts), or support environment (infrastructure and tools) of the design team. The Design practices identified within this paper address some of these gaps and can provide a baseline for additional guidelines or for tailoring by an operational force Design Team.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
For Want of a Nail
The Global Positioning System (GPS) has become a vital component to both the military and civilian infrastructures. U.S. military forces have evolved from using its signal for routine navigation to depending on it for nearly every facet of combat operations. GPS is also seamlessly integrated into every major civil infrastructure, including transportation, communications, energy, commerce, banking, and emergency response services. In addition, the accuracy and worldwide availability of GPS has spawned a multi-billion dollar international market representing billions of dollars in annual tax revenue. Despite its vital importance, the GPS constellation is populated with numerous satellites operating well beyond their design life. These aging satellites are more likely to malfunction, which can reduce service coverage, degrade accuracy, and in some cases, transmit dangerously inaccurate data. The constellation is in a frail state with multiple satellite failures predicted each year for the next several years. The Air Force currently subscribes to the launch to sustain (LTS) satellite replenishment strategy. Under this strategy, new satellites are launched only after a satellite failure or just prior to a failure. The purpose of this monograph is to investigate whether the Air Force should forgo its current LTS replenishment strategy and adopt a more aggressive launch to augment (LTA) strategy in order to proactively eliminate high risk satellites and to accelerate modernization timelines. It will be shown that the explosive growth of GPS over the past fifteen years has outpaced the Air Force 's strategy on satellite replenishment. The growing importance of GPS must be matched with a progressive replenishment strategy that sustains the constellation 's reliability and improves its utility for military, commercial, and international users. Instead, LTS has placed a premium on maximizing individual satellite life in order to reduce constellation life cycle costs. This hasThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Space Dominance
The Air Force, as part of its vision for the 21st century, has declared Space Dominance and Space Control as new military objectives. It is not clear if the Air Force understands the difficulties associated with dominating the space environment, but several issues have yet to be resolved. While the requirements for achieving space control are numerous, three stand out as especially critical: sound doctrine, viable technology, and political resolve. Doctrine provides our basis for employing forces and waging war. Without strong space doctrine, space control will likely meet with less than successful results. Technology is the linchpin which allows space operations to be achievable and effective. Without the required technology, space control is impossible. Politics is the last and most critical requirement in achieving space control. Neither doctrine nor technology can compensate for the lack of political resolve. Without it, all other efforts are futile. This paper discusses the doctrinal, technical and political difficulties of achieving space control as well as other issues which complicate the space control mission. Based on the analysis of these elements, a determination is made as to the feasibility of effectively implementing a space control policy.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Impact of C4ISR/Digitization and Joint Force Ability to Conduct the Global War on Terror
The end of the Cold War marked the end of an era in United States national security. The bi-polar global balance of power, which defined our nation's defensive strategy for more than 30 years, was replaced with the uncertainty of failed nation-states, rogue authoritarian regimes, and international terrorist organizations. A new world was emerging with the rapid increase in computer technology, the internet, satellite communications, and global economic markets. In 1991, the United States conducted its first major conventional war using smart bombs, Global Positioning Systems (GPS), satellite communications, and space-based imagery technology. These systems were further refined during operations in Bosnia, Kosovo, Haiti, and Somalia. Joint Forces were being deployed to all parts of the globe in ways that had not been anticipated before, and the concept of employing a large conventional force was largely becoming too cumbersome and obsolete. A lighter and more rapidly deployable force that provided the same lethal capabilities was required to meet the new challenges of the twenty first century. The Chief of Staff of the Army, General Eric Shinseki, provided a vision of force transformation in order to meet the new challenges for the future. One of the main concepts that emerged as an essential component of force transformation was the ability to achieve information dominance through network-centric warfare. The new paradigm of being a Joint Expeditionary Force that is more rapidly deployable, adaptive, lethal, and able to bring all Joint Force capabilities to bear in any given operation requires the technology that will provide commanders the ability to see the enemy first, understand the situation, and take decisive action. Whether it was low-intensity combat, humanitarian relief, counter-insurgency/counter-terrorist operations, or major combat operations, adapting to new policy demands set the stage for the deployments to Afghanistan and Iraq following the attack oThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Airborne and Space-Based Lasers
The Air Force is simultaneously pursuing both the Airborne and Space Based Laser programs. Under the impression that these two systems are synergistic and even that the ABL represents a logical stepping stone to the SBL, the Air Force has begun the process of advocating both programs, defending their funds, developing the required technology, fielding the weapons, and drafting the doctrine that will make them useful to the operational commands.The purpose of this study is to assess the actual compatibility between the ABL and SBL by carefully examining both the technologies and operational strategies. Only by studying the similarities and differences between these technologies and the technical risks and challenges can the defense establishment gain a more detailed understanding of the compatibility of the ABL and SBL technologies. Only by examining the operational preferences revealed in each system's technical descriptions and concepts of operation will it be possible to understand the compatibility of the operational strategies for the employment of the A.BL and SBL. Once the facts about the actual compatibility between the ABL and SBL are known, the Air Force leadership will be better prepared to make the right decisions about the role of laser weapons in ballistic missile defense. This study hopes to stimulate further debate about how these technologies will influence the security of the United States in the twenty-first century.There is no debate with the propositions that the ABL and SBL are both laser weapons that are capable of performing the same mission of theater ballistic missile defense. But despite the fact that these weapons are based on similar configurations inside their respective aerospace vehicles, it is essential to understand that the ABL and SBL systems are not sufficiently compatible to justify the claim that the programs are synergistic.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Improving Light Infantry Divisional Engineer Agility
This monograph examines the light infantry division engineer battalion's agility. The factors and organizational elements that affect agility are discussed. Organizational weaknesses in the light engineer battalion are examined and changes that will improve agility are recommended. The monograph first examines agility and develops an agility model used to assess the doctrinal capability of the light infantry division's engineer battalion. The monograph next examines historical experiences of infantry divisional engineers in World War II and selected reports and studies since then. Historical pitfalls in organizational design are mentioned. Then an analysis is made identifying common agility deficiencies and how they historically have been dealt with. From this analysis of historical experiences, conclusions are drawn that lead to a number of recommendations. Finally, thirteen recommendations are presented that increase the agility of the light infantry division engineer battalion. The recommendations address training, personnel, equipment, and organization. They are prioritized by their impact on agility and strategic deployability. High technology improvements such as night vision devices, remote firing devices, exotic explosives, and computers and increased firepower are not addressed. Instead, recommendations focus on more traditional means to enhance agility.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Engineer Force Structure Within the HBCT
The purpose of this monograph is to analyze the Heavy Brigade Combat Team's (HBCT) engineer force structure to answer the question: Does the HBCT have the necessary embedded engineer capabilities to conduct full spectrum operations, rapidly transitioning between stability and major combat operations. Operation Iraqi Freedom and the Hezbollah -- Israeli Conflict of 2006 illustrate the vast array of threats that the U.S. military faces in executing the Global War on Terror. These threats require the Army's primary tactical warfighting systems, the brigade combat teams (BCTs), to operate across the full spectrum of conflict. The Army constructed the HBCT for optimization in open and mixed terrain against conventional and irregular threats; however its embedded engineer forces have been reduced from a battalion to a single company. One engineer company does not provide the capabilities required for the HBCT to execute full spectrum operations; consequently the HBCT must rely on engineer augmentation from the engineer force pool to execute specific operations. Systems theory and systemic perspectives provide valuable insight into the interrelationship of the HBCT's embedded units. The HBCT is greater than the sum of its individual parts. Subsequently, if one of the interrelated variables is unable to perform its battlefield functions then the HBCT is also unable to perform its battlefield functions. Operations Desert Shield, Desert Storm, and Iraqi Freedom provide valuable insight into the importance of embedding engineer capabilities in order to conduct combat operations, particularly major combat operations. Interviews from senior engineer commanders further highlight the Engineer Regiment's concerns with the modular BCT force structure. The HBCT's reliance on external engineer forces has created several issues and areas of concern. These issues include the contradictions to systemic thinking and perspectives, reduction in HBCT engineer capabilities, availability andThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Case for an Optionally Manned Tanker
The Air Force has embraced unmanned aircraft systems and begun the process of incorporating them fully into the force structure. Over the last 50 years, these systems have grown from target drones modified for reconnaissance into remotely piloted medium altitude strike platforms and autonomous, high altitude, multispectral ISR systems. As the Air Force looks towards a future of large platform unmanned aircraft systems (UAS), remotely piloted aircraft (RPA) systems will evolve into optionally manned aircraft (OMA), blending the best of both manned and remotely piloted operations, and build in the capability to implement full autonomy as the technology becomes available. While a clear path for these systems have been laid out for ISR, Global Strike and other combat missions, this paper explores the concept of UAS fulfilling the combat support mission of air refueling. Based on projected procurement timelines for KC-Y, technological feasibility fielding an autonomous air refueling capability, and increased likelihood of cultural acceptance of UAS accomplishing this particular mission, an optionally manned tanker is the ideal first mission for the large aircraft MQ-L UAS envisioned in the US Air Forces UAS Flight Plan 2009-2047. The Air Force needs to explore concepts of employment and implications of nontraditional RPA missions now to properly plan for, acquire and allocate resources for the force of tomorrow. The time is right to begin planning for the next air refueling tanker to be optionally manned.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Information Management Principles Applied to the Ballistic Missile Defense System
Information systems (IS) have evolved over the last 50 plus years from individual components with single functionality to grand architectures that integrate multiple individual business functions into global organizational enterprises. Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture. The Missile Defense Agency (MDA) is currently tasked with developing an integrated Ballistic Missile Defense System (BMDS) capable of defending against all ranges of ballistic missiles in all phases of flight in defense of the homeland, our deployed forces, and our allies. While this initiative has been proceeding since before Ronald Reagan's Strategic Defense Initiative, the full momentum has only recently been achieved through the withdrawal of the Anti-Ballistic Missile Treaty and demonstrated threats from North Korea and Iran. This study draws parallels between the evolution of IS and the BMDS. Further it compiles information management (IM) principles, investigates if they apply to the BMDS, and investigates if they can be used to achieve a better integrated system. Initial indications are that IM principles do apply, but it is questionable if they are being applied.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Is it Time to Give the U.S. Army Engineer Battalion (Combat) (Heavy) a Facelift?
This monograph focuses on a construction unit in the United States Army, the Engineer Battalion (Combat) (Heavy). The Engineer Battalion (Combat) (Heavy) is the main organization, providing the U.S. Army the bulk of its heavy construction capability. This monograph specifically examines the organization and capabilities of the battalion and determines if the U.S. Army should make changes to the battalion organizational structure to make it a more effective combat multiplier for full spectrum operations in the 21st century. The concept of modularity is defined from doctrinal sources and an assessment is made to determine if the battalion configurations affords the flexibility required to achieve this. There is a tendency to look to civilian models, which generally have functionalized companies, when recommending changes to military construction organizations. This monograph examines the differences between operating environments of civilian construction firms and military construction units and assesses how this might impact the organizational design of a U.S. Army troop construction organization. The monograph briefly covers the history, employment and reasoning for the present organization of the battalion. Case studies of the use of combat heavy engineer battalions in Operations Desert Shield/Desert Storm (1990-1991), and operations in Bosnia (1995-2000) are examined to determine the battalion's overall effectiveness in providing general engineering support to these operations. These case studies provides a basis for examining the use of the battalions in Major Theater War (MTW) operations of short duration in a relatively mature theater, and Stability and Support Operations (SASO) of long duration in an immature and battle damaged theater. Additionally, the present organizational structure of the troop heavy construction organizations in the U.S. Navy and the U.S. Air Force are analyzed to determine if there are any lessons the Army can apply to the organizationThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Future Tanker Concepts
Since Operations Iraqi Freedom (OIF) and Enduring Freedom (OEF) began, the role of aerial refueling support for the warfighter has gained considerable attention. Future concepts for an advanced tanker aircraft such as unmanned aerial refueling, and automated aerial refueling will bring new ideas to help streamline support to the warfighter and increase safety for aircrews. With the advent of the new KC-X, the recapitalization of the Air Force tanker fleet is a top priority. In this paper the author will examine the Air Force's air refueling capability and how new designs will support tomorrow's fight.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Flight School in the Virtual Environment
Based on the current unsustainable defense budget and impending reductions, the Aviation Branch must develop a plan now to prevent a deterioration of flight skills among aviators when budget reductions can potentially decrease flight training hours. Simulators'; realism has improved exponentially since the 1970s due to the integration and advancement of computer technology. Army Aviation currently relies on the use of simulators to augment actual aircraft flight training in both the operating and generating forces. Analysis on the use of simulators specifically during the first two flying stages of the Initial Entry Rotary Wing (IERW) phase of Flight School XXI (FSXXI), provide leaders the insight into how to reduce aviation operating costs while maintaining or improving aviators'; ability to perform in the operating force. Using current doctrine, learning theories, including transfer of training, and experiments relating simulator performance to aircraft performance, analysis determines that the current flight simulators used at FSXXI can train aviators to execute flight tasks to standard while saving costs. However, questions remain and researchers must conduct further experiments to develop empirical evidence relating directly to the capacity for simulations based primary and instruments to provide aviators of the same quality as the current training program to the operating force, and any associated risks incurred.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Loss of the Global Positioning System and Its Impact on U.S. Economic Security
The use of the Global Positioning System (GPS) has become so ubiquitous within the United States economy that it can now be considered a national utility. The thesis of this paper is that loss of GPS will likely cause severe damage to United States economic security. I will also show that use of redundant systems within critical infrastructure can mitigate the effects of long-term loss. "Severe" is defined here as potential loss of life, economic damage to the civil sector potentially requiring Federal Reserve loans to recover, or revenue or taxpayer losses measured in the billions of dollars. Such severity is also consistent with many sources used in this work when defining "economic damage."This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Imperatives of Tactical Level Maintenance
This study determines what the imperatives of tactical level tank-automotive maintenance should be. An examination of two historical examples, a brief examination of the tenets of AirLand Battle doctrine and current and emerging maintenance doctrine, and a determination of the tactical level maintenance requirements of the modern battle are presented in the monograph. The synthesis of these aspects reveals what the imperatives should be. The two historical examples utilized are the Yom Kippur War in 1973 and the great Soviet offensives on their western front in 1944-45. In both cases, maintenance at the tactical level exhibited similar traits despite the disparity in scope and duration of the operations. An analysis of the maintenance requirements of the current and future battlefields is presented, revealing an intensity, lethality and electronization never before experienced - although approximated in 1973. These requirements are compared to current and emerging doctrine, which stands up well. An implications section addresses issues which the Army must address if it to secure a responsive maintenance system, mainly force structure, command, control and communications, and electronization. The conclusions reached are the imperatives of tactical level tank-automotive maintenance. These are: Fix forward; Provide responsive repair parts supply support; Conduct responsive recovery and evacuation operations; Establish and maintain effective command, control and communications capability vertically and laterally; Secure a 100% mobility capability for forward maintenance operations; and Develop the capability to operate in an NBC environment and at night.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
In Vitro Toxicity of Aluminum Nanoparticles in Human Keratinocytes
Nanotechnology promises to be the defining technology of the 21st century. At an annual investment of $1B, it provides significant contributions to manufacturing, medicine, energy conservation, and the environment. Nanoparticles are structures with at least one dimension in the 1 to 100 nanometer (nm) range. DoD and US Air Force interest in aluminum nanoparticles (AL NPs) stems from its ability to enhance combustion jet fuel, thus increasing fuel efficiency. The addition of AL NPs to JP-8 may pose a unique dermal hazard to aircraft maintenance workers. There is no published data on AL NP toxicity effects on human skin. This research used in vitro techniques to determine the cytotoxicity of AL NPs, sized 50, 80, and 120 nm, on human keratinocytes. AL NPs at concentrations 10 - 10,000 ?g/mL and 24-hour exposure did not have a negative effect on cell viability, as assessed by membrane leakage, metabolic function, and reactive oxygen species generation. Keratinocyte expression of proinflammatory interleukins-1? and -8 was quantified to determine if AL NPs induced precursor cytokines for irritant contact or sensitizer response dermatitis. After 24-hour exposure to AL NPs, keratinocytes expressed significant concentrations of IL-8, 24 - 100 times greater than IL-1?, indicating that AL NPs may induce sensitizer response dermatitis.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Predicting the Cost Per Flying Hour for the F-16 Using Programmatic and Operational Variables
This research analyzes operational and programmatic data from all Air National Guard and 13 of 14 active duty F-16C/D Fighter Wings (FW) from 1998 to 2004 in search of explanatory variables that influence a wing's Cost Per Flying Hour (CPFH). Using data from both the Air Force Total Ownership Cost database and from the Air Force Knowledge Systems database, this research evaluates the predictive ability of the following nine explanatory variables: aircraft age, average sortie duration, MajCOM, base location, utilization rate, percent engine type, percent block, percent deployed, and previous year's CPFH, the last four of which were previously untested. Additionally, this research builds regression models that accurately predict the CPFH of an F-16C/D FW using these operational and programmatic variables. This research concludes that the following variables are highly predictive and quantifies the relative influence of each of these variables: utilization rate, base location, percent block, percent engine type, average age of aircraft, and the previous year's CPFH. Finally, this research identifies a lurking variable and proposes two possible explanations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Information Networks in the Army After Next
The Army After Next envisions an Army which has two key attributes, Knowledge and Speed. Speed is the ability of weapons systems to move faster on the battlefield. Knowledge is the ability of forces throughout the battlefield to see themselves and the enemy through the advantages of Sensors, computers and the networks that connect them. In order for this vision to become a reality the sensors, computers and weapon control systems of the Army After Next must have a robust, reliable and secure data network to interlink them or the envisioned advantages of this force will be abrogated. This monograph examines the direction of the U.S Army at the end of the twentieth century through its Force XXI initiates, the Joint community in the Joint Tactical Radio System program, the U.S. Marine Corps in their Operational Maneuver from the Sea and the U.S. Navy with the High Speed MObile interNET (MONET). It also examines two commercial alternatives, Ricochet Micro Cellular and Cellular Packet Data (CPD) for their applicability and leverage for designing the Intelligent Information Grid for the Army After Next. The focus of the examination is on the applicability of the systems for echelons at Brigade and Below (EBB). Providing data communications networks at this echelon presents the greatest challenge to the Army After Next because of the lethal and mobile nature of the brigade combat environment in the twenty first century. The study concludes that the current U.S. Army architecture, Force XXI, is inadequate to meet the challenges of the Army After Next. However, the Joint Tactical Radio System (JTRS) as it is currently envisioned with some incorporation of the technologies presented by the Ricochet commercial network does present a superior alternative for the Intelligent Information Grid (I2G).This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Decline of the Military Ethos and Profession of Arms
The age of robotic warfare is dawning as today's battlespace witnesses the introduction of robotic systems to conduct military missions. Thus far these robots operate with humans directly "in the loop" of the decision process - especially when that loop is part of an offensive kill chain. The future battlespace, if we allow it, will be quite different. While the exact year is in doubt, the capability for robotic autonomous lethal engagements (ALE) - lethal force taken by a robotic or computer system which solely relies upon its own internal programming and capabilities to conduct and execute all elements of the kill chain - will exist sooner than many think.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Fratricide and a Correlation to ABCS Training Levels
This monograph explores the correlation between incidents of Fratricide and levels of training on the Army Battle Command System (ABCS) individual systems. It begins with an examination of the elements of Battle Command as both an art and a science. This monograph then describes the individual systems that make up the ABCS suite. The development and introduction of these systems is also covered. A careful examination of the training requirements for the ABCS suite is discussed next, as that is central to the argument of the monograph. Following this is a definition of fratricide and the factors surrounding these incidents. This monograph does not delve into a discussion of prevention, but rather identification of the relation of the incidents to the training levels of individual operators and leaders of the systems. Finally, this monograph offers several recommendations to improve the training levels and tracking requirements for training in an effort to reduce the likelihood of incidents of fratricide.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Case for Increasing Production in the Air Battle Management Career Field
The CSAF has directed 100% manning for all operational platforms, and, Air Liaison tours requiring ABMs are increasing each assignment cycle. There is also a CAF-wide shortage of ABM USAFWS graduates available to commanders. Track training Undergraduate Air Battle Managers offers benefits of speedy transition to the Combat Air Forces (CAF) but costs in time, labor and foundational knowledge base. If Headquarters Air Force (HAF) directed an increase in UABM Total Production Required (TPR) to 400, how might AETC best execute the directed increase in TPR to most efficiently train the UABM, while still teaching foundational core competencies as outlined by ACC and demanded by weapon system Mission Essential Task Lists? Although training today is thorough and complete, future drawdowns and losses in simulator capability only compound the difficulty. Research indicates fits and starts in UABM training are nothing new, nor are the changes in complexity of training. By drawing a line for training to start (FY13), this paper analyzes the operating environment at Tyndall and details requirements for training by tying USAF requirements to current training Tyndall AFB. This analysis reveals a training system that is already "tracked?" to the level it should be. It further exposes the need, and details recommendations for up-to-date, high-fidelity training systems preparing the future UABM for complex operational environments.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Carrier Strike Group Aerial ISR
What capability gaps exist that could limit future ISR integration? This paper examines the issue, identifies possible shortcomings, and makes recommendations on ways to mitigate limitations and identify areas neading further investigation. This paper is the result of a qualitative research methodology using document content analysis. As new capabilities are introduced, technical, doctrinal, and training challenges will be experienced; however, on the whole, organic carrier strike group Intelligence, surveillance and reconnaissance capability will improve as the Navy approaches the goals outlined in Sea Power 21.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
First Cut at Doctrine for Automation of Division Command and Control
This study analyzes past efforts to introduce automated systems into existing military and civilian organizations. Six fundamental principles for successful implementation of automated support to management are derived and then applied to the U.S. Army division command and control system. Finally, modifications to current division staff organizations and procedures, division command posts and the commander's modus operandi are recommended. The six principles for successful automation are: 1) Use information systems to improve internal communications and reduce analytical workload; 2) Minimize specialization of information workers; 3) Expand the jobs of information workers; 4) Simplify/modify organization structure before automating; 5) Encourage "agents of change"; and 6) Commanders and senior staff must provide a positive influence. Recommendations include: 1) reduce the size of the current G3 staff organization; 2) Simplify G3 staff procedures; 3) Adopt a new command post concept with two separate command posts operating on twelve hour, alternating periods; and 4) Increase information available to the commander throughout the division area of operations. The study concludes that the Combined Arms Center, as the lead proponent for automated support of command and control within the Army, should begin now to develop and test new doctrine for automated support of division command and control.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
How Should the Fires Network for the Future Force BDE Level UA be Structured?
A network is a system of sensors, information processing and decision-making centers, and firing platforms connected by communications lines. The concept of Network-Centric Warfare originated to solve operational level problems at the joint level. Networking fires at the brigade level unit of action could theoretically add to the efficiency and effectiveness of lower level tactical fires by giving units at all levels direct access to all available fires in the area of operations. This monograph constitutes an exploratory study of and preliminary analysis of the effects of networking all available fires at the brigade level UA. By carefully constructing and developing three courses of action, this monograph analyzes the effectiveness of support provided under three different fires intensity levels - low, medium, and high - with respect to five measures of effectiveness: responsiveness, effectiveness, efficiency, complexity, and the human dimension. Using operations research and systems analysis techniques to combine the different measures of effectiveness and the effects of operating under situations requiring different levels of fires intensity, the results suggest that the most fertile area for further research and development of fires networks is in the region of composite network structures that can exploit the advantages of both the flat and hierarchical structures while still making improvements in other areas that the other two are weak.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Using Value-Focused Thinking to Evaluate the Practicality of Ground-Source Heat Pumps at Military Installations
Because of potential cost and energy savings, military decision-makers may want to consider the use of energy-efficient heating, ventilating, and air-conditioning (HVAC) systems at their installations. Ground source heat pumps (GSHPs), in particular, show great promise because of their low energy requirements and low life-cycle costs. However, there currently exists no design guidance or established criteria for HVAC selection. Consequently, military decision-makers have no basis for comparing conventional HVAC systems and GSHPs. The Value-Focused Thinking (VFT) methodology was used to create a multi-objective decision analysis model that measures the value of different HVAC systems. Consisting of five bottom-tier values and twelve measures, the model captures the Air Force's objectives regarding its selection of HVAC systems. Using data collected from three different Air Force bases, the model was used to evaluate four HVAC alternatives (three conventional and one GSHP alternative) at each location. Sensitivity analysis was also conducted to provide additional insight into the HVAC selection process. The results of this research indicate that GSHPs are a viable option and should be considered at military installations. Further, the results prove that the VFT model can be an effective decision analysis tool for HVAC selection.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Analyzing Air Force Security Posture on Typical Industrial Control Systems Servicing Critical Infrastructures
Today's Air Force bases employ automated systems controlling critical functions such as power delivery, water processing, heating, ventilation and air conditioning (HVAC), and fuels delivery. These control systems have proliferated exponentially in the past several decades. Systems that were once manual or stand-alone are now automated and interconnected, vastly increasing reliability, convenience, and productivity, while decreasing maintenance costs and other costs of ownership. These conveniences come with a downside: the increase in risk of disruption, directly hampering mission accomplishment, due to both natural and manmade disturbances. Factor in recently emerging threats such as the Stuxnet malware, and these vulnerabilities become more relevant. This research analyzes how Air Force Industrial Control Systems (ICS) are intricately tied to mission accomplishment at Air Force bases, and evaluates risk in the implementation, maintenance, and operation of these systems in a more holistic way. From this research, it is clear that Air Force ICS are at all levels of automation and maturity, from manual and electro-mechanical to fully processor-controlled. Further, Air Force ICSs are implemented in non-standardized ways, each unique to the systems involved, making it difficult to generalize the risks involved with interconnectivity. Finally, it is evident that at one large Air Force base, ICS system operators from cyber, civil engineering, security forces, operations, and maintenance functional areas do not understand how their systems rely on other base critical infrastructures. To solve these problems, stakeholders from all involved functional areas, at multiple staff levels, will need to collaborate, evaluate, prioritize, and execute to reduce risk.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Evaluation of Automated Systems
The end of the 20th Century presented the United States Army a new technological and geopolitical environment. The Army has recognized this change and is adapting to operate in this new environment. The army has developed a number of new automated tools to assist leaders to command and control their organizations. One tool currently being developed, tested, and integrated into the Army is the Combined Arms Planning and Execution Monitoring System or CAPES. CAPES is designed to assist decision makers develop, coordinate, and produce operational plans. As this and other automation systems are developed, they must be evaluated. The Army uses evaluation to determine the merits of a system. The evaluation also reveals deficiencies a system must correct to become more useful. This monograph focuses on the evaluation process. Investigating the process identified a number of problems an evaluation might encounter during the assessment. These problems identified in the research for this paper are now documented. Assessors can now use this list to design aspects of future evaluations. Initially the research for this monograph attempted to evaluate the usefulness of CAPES. To determine whether CAPES was useful a test was organized to compare two planning efforts. Two military staffs planned operations based on a similar problem. The experiment defined one planning staff, using traditional planning tools, as the bases of comparison. The second group would have the benefit of CAPES. The early collection and analysis of observations from the two planning groups indicated the design of the experiment was inadequate to show either CAPES 19 benefits or faults. Initial scrutiny revealed significant problems with the experiment 's design. These problems prevented any comparison of the two planning efforts. Investigation of the difficulties discovered problems in the scenario selected, organization of the planning staff, and the exercise architecture. Analysis of the problems indicateThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Evaluation and Analysis of EFX 98 Assessment Experiences and EFX 98 Assessment Evaluation
The Chief of Staff of the Air Force directed that the Air Force conduct five annual experiments beginning in fiscal year 1998 to explore advanced warfighting concepts relating to the Expeditionary Aerospace Force structure. The first of these experiments was conducted from 12-26 Sep 1998 and focused on technologies and processes related to a possible Air Operations Center of the future. This thesis explores two elements of EFX 98. First, the structure of the experiment was examined for ways in which to improve the process for future experiments. Second, the data collected with respect to the structure and systems of the proposed Air Operations Center were analyzed in order to make statistically sound decisions regarding the proposed Air Operations Center. The first part of the thesis looked at the EFX 98 structure and provided suggestions which encouraged a design of experiments approach to EFX scenarios. Additionally, recommendations for leadership were made to break the exercise paradigm and focus the participants toward data collection. The second part of the thesis examined the survey data collected. With respect to the structure/process survey, the mean responses were found to be neutral in almost every regard. Multivariate analysis was used to make recommendations about the construction of future surveys with regard to the survey measures. With respect to the systems/applications survey, several statistical inferences were made regarding the various systems and applications, and multivariate analysis gave support to the survey construction.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The Simulation of Off-Axis Laser Propagation Using HELEEOS
Emerging technology high energy laser (HEL) weapon systems create a myriad of new threats to safety as well as security. One of the primary causes of these concerns is off-axis laser propagation caused by ever-present particulate and molecular scattering media in the atmosphere. The scatter from these aerosols and molecules can redirect some of the HEL's concentrated energy towards unintended targets such as the eyes of pilots, friendly fighters on the surface, or innocent bystanders. Of particular interest to the laser intelligence (LASINT) community is the possibility that off-axis irradiance from HEL weapon systems could be covertly measured with enough accuracy to provide critical information about HEL weight-power relationships, beam characteristics, and target intelligence information. The purpose of this research is to quantify how much offaxis propagation may occur in specific directions given a set of simulated HEL engagement scenarios involving different HEL characteristics, geometries, and atmospheric conditions. Further simulations assess the amount of information that can be derived about HEL platform characteristics and intended target from remotely measured off-axis intensity via inversion techniques. The High Energy Laser End-to End Operational Simulation (HELEEOS) software package is used to exploit its fast-running scaling law propagation methods and its robust probabilistic atmospheric database.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Cargo Aircraft Bombing System
From the early days of aviation, bombs typically have been carried by either fighter or bomber aircraft in the inventory. On the other hand, more and more longrange, precision-guided missiles are being produced with ranges that vary from tens to hundreds of miles. With such missiles, targets can be destroyed without placing personnel and equipment into close proximity to the targets. The mass delivery of standoff weapons could be especially advantageous during the early phases of an air campaign. This study considers the use of cargo aircraft for carrying and launching bombs and missiles. It has discussed many aspects of a Cargo Aircraft Bombing System (CABS) and provided an overall view. The intention of the study was not to complete design details about CABS, but rather to identify preliminary design concepts that need to be considered in a CABS. The study considered and provided background information on four carrying platforms including the C-17, C-141, C-130 and C-5, and four types of precision guided missiles including JSOW, JASSM, SLAM-ER and LOCAAS. Based on the four platforms and four missiles, particular issues were considered concerning systems and three preliminary carriage and release designs have been proposed.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Counter Narcotics Missions for Unmanned Aerial Vehicles
With the ongoing draw down of US military forces and shrinking budgets, finding a more cost efficient means of accomplishing military missions is increasingly important. Current Department of Defense counter-narcotic missions operating in conjunction with U.S. Customs and the U.S. Coast Guard should consider using Unmanned Aerial Vehicles (UAVs) as adjunct to military forces or as the primary mission platform. UAVs have proven themselves as a valuable asset the military commander brings to the fight. Used effectively during military operations in Bosnia and Kosovo, UAVs were limited to intelligence and reconnaissance missions. Given the capabilities of UAVs, they can be more actively integrated into other military operations to enhance US military mission accomplishment. More specifically, UAVs should be incorporated into Intelligence, Surveillance, and Reconnaissance (ISR) roles specifically tailored to meet the challenges of the counter-narcotic mission. To support this proposition, my research will analyze current and proposed capabilities of UAVs as seen by military and industry leaders. Second, the mission of counter narcotics ISR will be examined to identify matching capabilities to the mission.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Joint Laser Interoperability
Joint Vision 2020 directs a transformation of Department of Defense to meet US needs in the next century. One of the major goals of this transformation is a fully joint force capable of precision engagement. This monograph proposes a concept called Joint Laser Interoperability and discusses whether or not this concept provides some or all of Joint Vision 2020s precision engagement. The discussion begins with the current state of US laser systems and the present state of interoperability. This includes a brief discussion of how a laser works and what constitutes the basic parts of a laser system, laser range finders, laser designators, laser spot trackers, and laser guided weapons. The monograph also explains the difference between eye-safe and non eye-safe lasers. Once the monograph outlines current laser system capabilities it describes how current air, ground, and naval laser systems could be combined with new technology to create a joint force that is fully laser interoperable. The monograph also suggests changes in future organizations and equipment such as the US Army's Interim Brigade Combat Team (IBCT). These changes focus on providing a laser based precision capability to units that do not have one, and increasing the capability of those units that already possess some laser capability. After defining Joint Laser Interoperability, the monograph discusses the operational advantages this concept could provide the DOD and how the concept would enhance current precision engagement capabilities. The monograph discusses the joint advantages in both deep and close operations, and how the air, ground, and naval elements would benefit from Joint Laser Interoperability. The monograph also discusses the limitations and roadblocks to fielding this concept with respect to weather, communications, and doctrine. The conclusion shows that Joint Laser Interoperability provides a significant part, but not all of the precision engagement capability called for in Joint VisionThis work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Lasers in Space
The emerging importance of space-based systems is matched by the maturing of laser technology, giving a potential synergy to enhance military capability. For example, global awareness is one of the AF goals to give the US military the competitive advantage in future conflicts. Obtaining global awareness requires a tremendous amount of information being acquired and transferred over vast distances. Space-based laser communication satellites offer the potential of greatly increased data rates, which is just one example of how lasers in space could significantly improve US military capabilities. Recent strategic planning studies have identified various concepts for lasers in space, including both laser weapons and collateral applications such as communication and remote sensing. Four functional classes of systems (enabling, information-gathering, information-relaying, and energy delivery) serve to organize the various concepts and relate them to the new AF core competencies as well as the traditional AF roles. This study analyzes these concepts, scoring them for technical feasibility, technical maturity, operational enhancement and operational cost. The most promising concepts include space-based laser target designation, space-based battlefield illumination, laser communication, and active remote sensing for battle damage assessment and weather characterization. Several strategies can accelerate the development of space-based laser systems, such as using the new AF battlelabs and advanced technology demonstrations.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Eyes of the Nation Does the United States Need Space Radar?
In response to emerging national security threats, DoD and Intelligence Community (IC) leaders examined Space Radar's ability to meet 21st century intelligence, surveillance, and reconnaissance (ISR) requirements. They assessed the leading candidate architectures' potential performance, including a constellation of 8-14 electronically scanned array radar satellites in low earth orbit. This analysis is important for several reasons. First, it draws conclusions about potential capabilities and its utility in achieving or enhancing Joint military and National Security Intelligence mission area tasks. Understanding Space Radar's utility is important to determine if it has the potential to eliminate or reduce gaps in the C4I and ISR networks' ability to provide timely, accurate, fused, and actionable intelligence. Second, operational scenarios in the post-9/11 world increasingly require global, persistent, day and night, all-weather surveillance. Finally, bureaucratic maneuver among the military and IC regarding roles and missions keep the program from gaining enough momentum to obtain full Congressional support. In the process, Space Radar's operational value becomes increasingly misunderstood. A horizontally integrated space radar system could provide global, persistent, day/night, all-weather surveillance to fill the seams necessary to meet compressed engagement times with accurate, fused, and actionable intelligence. The unique military utility of an affordable and achievable Space Radar architecture stems from its global access, inherent flexibility, and quick responsiveness. By illuminating these key system features, this sophisticated technology can be reduced to an understandable terminology for the ongoing ISR force-mix debate.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Utility of Experimental Design in Automatic Target Recognition Performance Evaluation
This research investigates current practices in test and evaluation of classification algorithms, and recommends improvements. We scrutinize the evaluation of automatic target recognition algorithms and rationalize the potential for improvements in the accepted methodology. We propose improvements through the use of an experimental design approach to testing. We demonstrate the benefits of improvements by simulating algorithm performance data and using both methodologies to generate evaluation results. The simulated data is varied to test the sensitivity of the benefits to a broad set of outcomes.The opportunities for improvement are threefold. First, the current practice of "one-at-a-time" factor variation (only one factor is varied in each test condition) fails to capture the effect of multiple factors. Next, the coarse characterization of data misses the opportunity to reduce the estimate of noise in test through the observation of uncontrolled factors. Finally, the lack of advanced data reduction and analysis tools renders analysis and reporting tedious and inefficient. This research addresses these shortcomings and recommends specific remedies through factorial testing, detailed data characterization, and logistic regression. We show how these innovations improve the accuracy and efficiency of automatic target recognition performance evaluation.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Evolution in Military Affairs
The concept of using natural evolution as an analogy for how modern organizationscan adapt to a chaotic, rapidly changing world situation is currently in vogue in the business world. This paper will examine whether the chaotic evolutionary development model is pertinent to the US military's attempt to adapt to the uncertain national security environment of the post Cold War world. The paper will look at the historical example of the development of infrared (IR) systems for tactical aviation in order to see how the natural evolution model can be applied to the development of military systems. The evolutionary development of IR systems will be "benchmarked" against the more traditional planned development of radar systems. The theme of the paper is that the chaotic evolutionary development of IR systems has been successful and has had a significant effect on the current state of air operations. The general conclusion of the paper is that the natural evolution development model has many analogies to the way IR systems were developed and employed and contains many useful insights to consider for future development. Understanding this analogy and its limits may hold the key for developing a more flexible development system that will be better able to adapt to the uncertain security environment of the future. In the epilogue, the paper will address how such evolutionary development might be applied to the attempt to plan an information-based Revolution in Military Affairs.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Improving the Tanker Employment Model
This Graduate Research Project is an improvement to the Tanker Employment Model developed by Maj. Margaret Romero. Her model which uses Excel VBA is used to determine the tanker capacity requirements needed to perform specific user defined tanker employment missions. The output is useful for rough-cut analysis of the tanker employment mission. The improvement to the Tanker Employment Model is the capability to use multiple tanker types simultaneously. The model chooses the optimum order for the tanker types and number of tankers to support a specific tanker employment mission. It also provides additional information to compare the use of multiple tankers.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.