995 resultados para military system
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
Research on the attitudes, motivations and social and political behavior of European cadets have been made throughout the last decade. Nowadays Spain also joins those surveys. Thru the analysis of polling data, we can consider the different attitudes of Spanish cadets in relation with the other European ones. The conclusion is that although the Spanish political transition to democracy has not ended already in the military teaching system, there are a lot of similarities among Spanish and European cadets.
Resumo:
Drawing on a database for 1988-2006 containing information on 157 countries, we investigate the effects on military spending of government form, electoral rules, concentration of parliamentary parties, and ideology. From an OLS regression on pooled data, our results show that presidential democracies spend more than parliamentary systems on defense, whereas the presence of a plurality voting system will reduce the defense burden. Our findings suggest that, in contrast to theoretical predictions in the literature, institutions do not have the same impact on the provision of all public goods. We present as well evidence regarding the effect of ideology on defense spending.
Resumo:
Drawing from strategic theory, this study investigates the strategic roles of commercial companies providing military services, frequently referred to as private military companies. Theoretically, the thesis analyzes how states organize its military capabilities in order to be able to wield power within the international system while empirically, it examines the character and role of commercial companies that provide military training services to the United States Government and partner nations. The reason for this rather instrumental and functional, rather than critical, approach is that this work is written within the discipline known as War Studies. Strategic theory is used first to logically organize the empirical findings in two case studies and then to develop an analytical framework with which the strategic roles of companies providing military services can be investigated. The analysis has been conducted using both new and hitherto unknown sources in the shape of interviews as well as previously classified telegrams, but also draws on previous research and other secondary sources. The main findings are that commercial companies have five typical strategic roles: first, they cloak the state by substituting traditional uniformed troops; second, they act as trailblazers by securing US influence in new regions and by breaking new ground by contributing to the build-up of new partners; third, they act as scene setters by preparing the ground for military exit out of a theater of operations or by facilitating inter-operability between foreign militaries and the US military; fourth, they can be used to infiltrate the security structures of foreign countries; fifth and finally, they can be used to provide offensive capabilities by providing either kinetic or cyber warfare effects. Another finding is that military service contracting is an important part of the US strategic culture.
Resumo:
Abstract - This paper reviews existing military capability models and the capability life cycle. It proposes a holistic capability life-cycle model (HCLCM) that combines capability systems with related capability models. ISO 15288 standard is used as a framework to construct the HCLCM. The HCLCM also shows how capability models and systems relate to each other throughout the capability life cycle. The main contribution of this paper is conceptual in nature. The model complements the existing, but still evolving, understanding of the military capability life cycle in a holistic and systemic way. The model also increases understanding and facilitates communication among various military capability stakeholders.
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
Our goal is to get better understanding of different kind of dependencies behind the high-level capability areas. The models are suitable for investigating present state capabilities or future developments of capabilities in the context of technology forecasting. Three levels are necessary for a model describing effects of technologies on military capabilities. These levels are capability areas, systems and technologies. The contribution of this paper is to present one possible model for interdependencies between technologies. Modelling interdependencies between technologies is the last building block in constructing a quantitative model for technological forecasting including necessary levels of abstraction. This study supplements our previous research and as a result we present a model for the whole process of capability modelling. As in our earlier studies, capability is defined as the probability of a successful task or operation or proper functioning of a system. In order to obtain numerical data to demonstrate our model, we conducted a questionnaire to a group of defence technology researchers where interdependencies between seven representative technologies were inquired. Because of a small number of participants in questionnaires and general uncertainties concerning subjective evaluations, only rough conclusions can be made from the numerical results
Resumo:
This paper develops a model of short-range ballistic missile defense and uses it to study the performance of Israel’s Iron Dome system. The deterministic base model allows for inaccurate missiles, unsuccessful interceptions, and civil defense. Model enhancements consider the trade-offs in attacking the interception system, the difficulties faced by militants in assembling large salvos, and the effects of imperfect missile classification by the defender. A stochastic model is also developed. Analysis shows that system performance can be highly sensitive to the missile salvo size, and that systems with higher interception rates are more “fragile” when overloaded. The model is calibrated using publically available data about Iron Dome’s use during Operation Pillar of Defense in November 2012. If the systems performed as claimed, they saved Israel an estimated 1778 casualties and $80 million in property damage, and thereby made preemptive strikes on Gaza about 8 times less valuable to Israel. Gaza militants could have inflicted far more damage by grouping their rockets into large salvos, but this may have been difficult given Israel’s suppression efforts. Counter-battery fire by the militants is unlikely to be worthwhile unless they can obtain much more accurate missiles.
Resumo:
In civil applications, many researches on MIMO technique have achieved great progress. However, we consider military applications here. Differing from civil applications, military MIMO system may face many kinds of interferences, and the interference source may even not be equipped with multiple antennas. So the military MIMO system may receive some kind of strong interference coming from certain direction. Therefore, the military MIMO system must have capability to suppress directional interference. This paper presents a scheme to suppress directional interference for STBC MIMO system based on beam-forming. Simulation result shows that the scheme is valid to suppress directional strong interference for STBC MIMO system although with some performance loss compared with the ideal case of non-interference.
Resumo:
Includes bibliography
Night Vision Imaging System (NVIS) certification requirements analysis of an Airbus Helicopters H135
Resumo:
The safe operation of nighttime flight missions would be enhanced using Night Vision Imaging Systems (NVIS) equipment. This has been clear to the military since 1970s and to the civil helicopters since 1990s. In these last months, even Italian Emergency Medical Service (EMS) operators require Night Vision Goggles (NVG) devices that therefore amplify the ambient light. In order to fly with this technology, helicopters have to be NVIS-approved. The author have supported a company, to quantify the potentiality of undertaking the certification activity, through a feasibility study. Even before, NVG description and working principles have been done, then specifications analysis about the processes to make a helicopter NVIS-approved has been addressed. The noteworthy difference between military specifications and the civilian ones highlights non-irrevelant lacks in the latter. The activity of NVIS certification could be a good investment because the following targets have been achieved: Reductions of the certification cost, of the operating time and of the number of non-compliance.