-
Capabilities-Based Resourcing for Air Force Weapon System Sustainment
Can/should funding levels tied to a more objective measurement, i.e. aircraft availability? Should
-
Historical Analysis of the Awareness and Key Issues of the Insider Threat to Information Systems
Since information systems have become smaller, faster, cheaper and more interconnected many organiz
-
A Robust Rotorcraft Flight Control System Design Methodology Utilizing Quantitative Feedback Theory
Rotorcraft flight control systems present design challenges which often exceed those associated wit
-
Geographic Location of a Computer Node Examining a Time-to-Location Algorithm and Multiple Autonomous System Networks
To determine the location of a computer on the Internet without resorting to outside information or
-
A 3D Display System for Lightning Detection and Ranging (LDAR) Data
Lightning detection is an essential part of safety and resource protection at Cape Canaveral. In or
-
Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
The Air Force has multiple initiatives to develop data repositories for high-speed network intrusio
-
A Systems Architecture and Advanced Sensors Application for Real-Time Aircraft Structural Health Monitoring
Aircraft are being pushed beyond their original service life, increasing the potential for structur
-
Understanding and Improving Depot Level Reparable Pricing for Air Force Systems
The Air Force has been under enormous pressure to reduce depot maintenance costs for weapon and sup
-
A New Flexible Global Positioning System (GPS) Constellation Sustainment Strategy
The Global Positioning System (GPS) is now a global utility. The United States Air Force is the ste
-
Analysis of Radio Frequency Interference Effects on a Modern Coarse Acquisition Code Global Positioning System Receiver
The purpose of this thesis was to investigate the performance of a twelve channel Standard Position
-
Using Relational Schemata in a Computer Immune System to Detect Multiple-Packet Network Intrusions
Given the increasingly prominent cyber-based threat, there are substantial research and development
-
A Methodology for Simulating the Joint Strike Fighter's (JSF) Prognostics and Health Management System
The Autonomic Logistics System Simulation (ALSim) was developed to provide decision makers a tool t
-
An Integrity Framework for Image-Based Navigation Systems
This work first examines fundamental differences between measurement models established for GPS and
-
Simulation of Autonomic Logistics System Sortie Generation
The current Air Force logistics operations system is reactive in nature, meaning that after the air
-
An Analysis of the Air Force Environmental Management System
In order to be effective and responsible stewards of the environment, the Air Force needs an enviro
-
Comparative Energy and Cost Analysis Between Conventional HVAC Systems and Geothermal Heat Pump Systems
To sustain the United States current affluence and strength, the U.S. Government has encouraged ene
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
An Integrated Synthetic Aperture Radar/Global Positioning System/Inertial Navigation System for Target Geolocation Improvement
A significant amount of military and civilian research has been aimed at the sensor fusion technolo
-
An Application of Automated Theorem Provers to Computer System Security
The Schematic Protection Model is specified in SAL and theorems about Take-Grant and New Technology
-
Artificial Intelligence in Legal Systems
CRC Press 出版This book presents a comprehensive analysis of the transformative impact of artificial intelligence
-
A Feasibility Study of a Persistent Monitoring System for the Flight Deck of U.S. Navy Aircraft Carriers
This research analyzes the use of modern Real Time Locating Systems (RTLS), such as the Global Posi
-
Performance Evaluation of a Field Programmable Gate Array-based System for Detecting and Tracking Peer-to-peer Protocols on a Gigabit Ethernet Network
The TRacking and Analysis for Peer-to-Peer 2 (TRAPP-2) system is developed on a Xilinx ML510 FPGA.
-
A 3D Display System for Lightning Detection and Ranging (LDAR) Data
Lightning detection is an essential part of safety and resource protection at Cape Canaveral. In or
-
Development and Flight Test of a Robust Optical-Inertial Navigation System Using Low-Cost Sensors
This report develops and tests a precision navigation algorithm fusing optical and inertial measure
-
Group Decision Support Systems and Influence Modes
This study examined the effect of Group Decision Support System (GDSS) technology on perceived infl
-
Automated Civil Engineer Planning and Execution System
Air Force Civil Engineers have long supported the employment of airpower during contingency operati
-
Thin Film Encapsulation of Radio Frequency Microelectromechanical Systems Switches
Microelectromechanical systems (MEMS) radio frequency (RF) switches have been shown to have excelle
-
Range Precision of LADAR Systems
A key application of Laser Detection and Ranging (LADAR) systems is measurement of range to a targe
-
Unmanned Aircraft Systems in a Forward Air Controller (Airborne) Role
The ability to deliver weapons systems and the increased capabilities of unmanned aircraft systems
-
Corrosion Manual for Internal Corrosion of Water Distribution Systems
The U.S. Environmental Protection Agency (EPA) was introduced on December 2, 1970 by President Rich
-
Developing a Campaign Plan to Target Centers of Gravity Within Economic Systems
In 1994, Arnold et al. conducted a research study which attempted tomathematically model a nation's
-
Geographic Location of a Computer Node Examining a Time-to-Location Algorithm and Multiple Autonomous System Networks
To determine the location of a computer on the Internet without resorting to outside information or
-
Systems-Level Feasibility Analysis of a Microsatellite Rendezvous With Non-Cooperative
The United States is very dependant upon the use of space. Any threat to our ability to use it as d
-
A Distributed Agent Architecture for a Computer Virus Immune System
Information superiority is identified as an Air Force core competency and is recognized as a key en
-
Using a Distributed Object-Oriented Database Management System in Support of a High-Speed Network Intrusion Detection System Data Repository
The Air Force has multiple initiatives to develop data repositories for high-speed network intrusio
-
A Future-Based Risk Assessment for the Survivability of Long Range Strike Systems
The United States Air Force today faces the challenge of allocating development resources to prepar
-
Pattern Search Ranking and Selection Algorithms for Mixed-Variable Optimization of Stochastic Systems
A new class of algorithms is introduced and analyzed for bound and linearly constrained optimizatio
-
The Need for a Permanent Gun System on the F-35 Joint Strike Fighter
Historically, the United States Air Force (USAF) concentrates on advanced or future weaponry when i
-
A Model to Predict Diffraction Attenuation Resulting From Signal Propagation Over Terrain in Low Earth Orbit Satellite Systems
A critical issue for designers of communication systems is the characterization of the communicatio
-
Step-by-Step Practitioner Toolkit for Evaluating the Work of Sexual Assault Nurse Examiner (SANE) Programs in the Criminal Justice System
The National Institute of Justice (NIJ) is the research, development and evaluationagency of the US
-
Defense Transportation System
The Defense Transportation System (DTS) is a robust collection of capabilities that provide the Uni
-
The Role of Recovery Support Services in Recovery-Oriented Systems of Care
Describes substance abuse recovery support services, models of recovery-oriented systems of care in
-
Intelligence, Surveillance, and Reconnaissance Processing, Exploitation, and Dissemination System in Support of Global Strike in 2035
"Strike" is not the main challenge facing Global Strike in 2035-it is to globally attribute, target
-
Designing Bare Base Systems for Logistics Efficiency in the Joint Operational Environment
In 1991, Operations DESERT SHIELD and DESERT STORM marked a milestone in joint and coalition operat
-
Prophecy Decoded A Systematic Approach to End-Time Theology
Prophecy Decoded: A Systematic Approach to End-Time Theology By Dr. Rodney E. HarriganUnlock the my
-
Data Security in AI Systems
This book explores the vital intersection of AI and data security, stressing the need to safeguard
-
-
Ubi-Media Computing, Pervasive Systems, Algorithms and Networks
Springer 出版This 2-volume set constitutes the refereed proceedings of the 17th International Symposium on Perva