To see the other types of publications on this topic, follow the link: Defensive architecture.

Dissertations / Theses on the topic 'Defensive architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Defensive architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Clendening, Michael, James New, Alejandro Cuevas, Van Ngo, Amritpal Dhindsa, Amrish Patel, Dennis Hopkins, et al. "C4I architecture supporting conduct of defensive and offensive joint ASW." Monterey, California, 2008. http://hdl.handle.net/10945/6987.

Full text
Abstract:
The Anti-Submarine Warfare (ASW) community requires a fully operational Command, Control, Communications, Computers, and Intelligence (C4I) architecture to significantly reduce time from sensor detection to defensive weapons release. The United States Navy has established programs of record leveraging space, terrestrial, and maritime communications capabilities extending to fiscal year 2015. An ordered systems engineering process was performed to derive requirements and identify Joint ASW C4I Architecture strengths and weaknesses. This architecture is dependent upon the ASW community’s ability to leverage current and planned technologies impacting C4I areas including common operational tactical picture delivery, data transmission rate, time latency, and data fusion processes. Performance forecasts for identified alternatives were modeled and simulated based on a synthesized operational scenario using the EXTEND simulation tool, and life cycle cost estimates were produced for each alternative. Based on those outcomes, one of the several alternatives is recommended for implementation. In addition, it was discovered that programmed C4I capabilities lack an integrated fielding plan and do not properly align in FY2020. Furthermore, the ASW community must make process changes to enable cross-program manager collaboration supported by a single system architect to ensure robust architectures are fielded by 2020.
APA, Harvard, Vancouver, ISO, and other styles
2

Farmer, John. "The deepest shelter in town : from the ruins to the bunker." Thesis, Royal College of Art, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Benselama-Messikh, Safia. "Les fortifications ottomanes d’Alger : Essai de restitution typologique et défensive 1516-1830." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM3095.

Full text
Abstract:
Le XVIe siècle qui voit l'expansion de l'empire ottoman en Méditerranée orientale, propulse la petite bourgade d'Alger au rang de capitale de Régence et bastion militaire de la Porte Sublime, sur les côtes du Maghreb, face à l'hégémonie de l'empire espagnol. Les Ottomans qui la transforment en ville guerrière, lui créent un port artificiel, la dotent de nouveaux remparts et établissent autour d'elle, un réseau de points de fortification, qui quadrille le territoire et contrôle la province. Entre 1516 et 1830, Alger qui est surnommée al Maḥrūssa (la bien gardée), reste imprenable par la mer. Son souci permanent de protection se traduit par un renforcement et un entretien continuels de ses fortifications. Cet essai qui ne prétend qu'à une contribution au vaste champ de recherche d'un corpus inédit, est une enquête sur une architecture totalement inexplorée, sur la base d'archives et de relevés in situ. L'exploration des archives du Génie militaire français, constituant une source fondamentale en grande partie inédite, servira à la restitution de la structure défensive de la province d'Alger. L'intérêt de ce travail réside principalement dans l'identification des typologies constructive et architecturale militaires d'Alger ottoman, qui permettent de cerner la culture constructive de guerre ottomane en Afrique du Nord
The 16th century which saw the expansion of the ottoman empire in Eastern Mediterranean, propels the small town of Algiers to the rank of capital of Regency and military bastion of the Sublime Porte, on the Maghreb coast, facing the hegemony of the Spanish empire. The Ottomans who transform it into city Warrior, creates an artificial port, equipped with new ramparts and establish around it, a network of points of fortification, which quadrille the territory and supervise the province. Between 1516 and 1830, Algiers which is called al Maḥrūssa (well kept), remains impregnable by the sea. Its permanent concern for protection is to show the strengthened and continual maintenance of its fortifications. This essay claiming to a contribution to the vast field of research of an unpublished corpus is an investigation into a totally unexplored architecture, on the basis of archives and records in situ. The exploration of the archives of the French military engineering, constituting a fundamental source largely unpublished, will serve as the return of the defensive structure of the province of Algiers. The interest of this work lies mainly in the identification of the military constructive typologies and architectural of ottoman Algiers, which identify the constructive culture of Ottoman war in North Africa
APA, Harvard, Vancouver, ISO, and other styles
4

Derenick, David Allen. "Architecture in defense of dignity." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/9018.

Full text
Abstract:
Thesis (M.Arch.) -- University of Maryland, College Park, 2008.
Thesis research directed by: School of Architecture, Planning and Preservation Architecture. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
5

Bergenfelz, Charlotte, and Fredrik Silverglimth. "Att designa bort det oönskade : Exkluderande design i Göteborg och Västsverige." Thesis, Högskolan i Halmstad, Akademin för lärande, humaniora och samhälle, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37658.

Full text
Abstract:
Studiens syfte är att undersöka olika former av exkluderande design i offentliga och semi-offentliga rum, samt vilka konsekvenser en sådan design kan ha på olika samhällsgrupper. Studiens resultat är baserade på fokuserade observationer av den fysiska designen, främst i Göteborg, i triangulering med innehållsanalys av översikts- och detaljplaner. Studiens resultat visar att en mångfald av designmodeller användes i de observerade offentliga och semi-offentliga rummen, varav en del av dessa designer kan ses som exkluderande. Majoriteten av observerade sittplatser finns hos privata aktörer som caféer och uteserveringar, vilket signalerar ett behov av att vara konsument för att få ta del av dessa semi-offentliga platser. Semi-offentliga platser som var stängda nattetid samt hinder mot skateboardåkning var andra observerade designer som riktar in sig på särskilda samhällsgrupper eller beteenden. Fyra grupper anses vara speciellt påverkade av exkluderande design: hemlösa, funktionsnedsatta, resurssvaga, samt skateboardåkare. I kontrast till tidigare forskning anser vi att flera av de observerade designerna kan anses vara inkluderande istället för att enbart ses som exkluderande.
The aim of this study is to explore different forms of unpleasant design in public and semi-public spaces and what potential consequences such design may have on different social groups. The results are based on focused observations of the physical designs themselves, primarily in Gothenburg, Sweden, in triangulation with text analysis of official documentations of land use and zoning plans. The findings indicate that a variety of designs were used throughout the observed public and semi-public spaces, some of which can be seen as unpleasant. Most of the observed seating options were located within privatised businesses, signalling the need to be a consumer to use these semi-public spaces. Semi-public spaces that are inaccessible during the night as well as anti-skate obstacles were other observed designs that targeted a certain group or behaviour. Four social groups were found to be more of a target or sufferer of the designs: the homeless, people with disabilities, the destitute, and skateboarders. In contradiction to previous research a substantial amount of the observed designs can be perceived as inclusive rather than only exclusionary.
APA, Harvard, Vancouver, ISO, and other styles
6

Chaaya, Anis. "Le dispositif défensif du Comté de Tripoli." Thesis, Lyon 2, 2010. http://www.theses.fr/2010LYO20011.

Full text
Abstract:
Le Comté de Tripoli est le dernier à être fondé des quatre Etats Latins d’Orient issus de la Première Croisade. Ce Comté est le seul à garder sa capitale en possession des croisés jusqu’aux dernières années de l’existence de ces Etats. Ce Comté possède certains des plus anciens châteaux construits par les croisés au début du XIIe siècle tels les châteaux de Tripoli et Gibelet.Cette thèse a plusieurs objectifs, elle vise à préciser les frontières du Comté de Tripoli, énumérer et préciser l’ensemble des places fortes de ce Comté, étudier d’une façon exhaustive les différents sites fortifiés situés sur le territoire de la République Libanaise, et l’élaboration d’une typologie de l’architecture défensive de l’époque des croisades aux XIIe - XIIIe s. dans ce Comté.Grâce aux différentes méthodes de prospection archéologique, l’étude topographique du terrain avec l’archéologie du paysage, il était possible d’identifier et de découvrir plusieurs sites fortifiés, essentiellement des tours, qui n’étaient pas connus auparavant.Un intérêt spécial a été consacré dans notre travail à la lecture approfondie et l’analyse systématique de quelques sites fortifiés majeurs. Cela a permis une meilleure compréhension de l’installation de ces sites, de leur histoire, et de l’évolution de leur construction. Les sites en question sont: Archas, le château de Gibelet, le château de Smar Jbeil, le château Saint-Gilles à Tripoli, la tour Bahani et la tour Mouheich
The County of Tripoli was the last one to be created between the Frenkish States established after the First Crusade. It is the only State that kept its capital city within the power of the Crusades till the last years of the existence of these States. Some of the oldest castles built at the beginning of the XIIth century are located in this County; such as the castles of Tripoli and Gibelet.This PhD has several objectives; it aims to define the frontiers of the County of Tripoli, to list and specify all its strongholds, to study exhaustively the various fortified sites in the territory of the Republic of Lebanon, and to develop a typology of defensive architecture of the Crusades during the XIIth - XIIIth centuries in this county.Through various methods of archaeological survey, study of the topography of the territory with archaeological landscape reading, it was possible to identify and explore several fortified sites, mainly towers not known before. In our work, special interest was devoted on extensive reading and systematic analysis of some major fortified sites. This enabled a better understanding of their installation, their history and the evolution of their construction. The sites are: Archas, Castle of Gibelet, Castle of Smar Jbeil, the castle of St. Gilles in Tripoli, the tower Bahani and the tower Mouheish
APA, Harvard, Vancouver, ISO, and other styles
7

Ulmer, Nicholas A. "Optimizing microgrid architecture on Department of Defense installations." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44023.

Full text
Abstract:
Approved for public release; distribution is unlimited
Energy managers are faced with the challenge of upgrading their installation microgrids in a tight fiscal environment, while meeting the challenges of incorporating higher percentages of renewable energy sources and providing better energy assurance during commercial grid failures. Incorporating renewable sources of energy into a microgrid is challenging due to the intermittent nature of supply. Using historical solar data and simulated forecasts for wind data, we formulate and exercise a capital planning optimization model designed to choose the best subset of existing and potential energy sources to maximize microgrid islanding time. Islanding time is defined as the amount of time demands can be met without connection to the commercial power grid, and it is one measure of an installation’s power resiliency. Using sensitivity analysis, we show quantitatively how increases in the capital planning budget has a direct positive impact on islanding time. However, the model also identifies areas where large increases in budget yield proportionally smaller returns in islanding time. Additionally, energy storage can provide increases in islanding time, but there are diminishing returns as the storage capacity is increased. Finally, we quantitatively show that increasing reliance on renewable power decreases sensitivity to changes in the price of fuel.
APA, Harvard, Vancouver, ISO, and other styles
8

Hobgood, Jean, Kimberly Madison, Geoffrey Pawlowski, Steven Nedd, Michael Roberts, and Paige Rumberg. "System Architecture for Anti-Ship Ballistic Missile Defense (ASBMD)." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/6945.

Full text
Abstract:
Approved for public release; distribution is unlimited.
Recent studies suggest that China is developing a new class of ballistic missiles that can be used against moving targets, such as ships. One such technology is anticipated to cover a range of 2,000 kilometers and operate at a speed of Mach 10. The threat is also capable of maneuvering both during the midcourse and terminal flight phases for the purposes of guidance, target acquisition, and countermeasures. This threat could greatly impact the current concept of operations of U.S. Navy ships and alter national defense policies. While current ballistic missile defense solutions are capable of intercepting threats in midcourse and terminal flight phases, no comprehensive system has been developed to counter a ballistic missile threat that can (1) maneuver upon reentry in the endoatmosphere and (2) be used to attack a moving defended area, such as a U.S. Navy carrier strike group (CSG). To fulfill this need, the Anti-Ship Ballistic Missile Defense (ASBMD) team conducted research and developed a notional architecture for a system of systems solution that could be integrated into the existing Ballistic Missile Defense System (BMDS) to effectively counter this threat. This thesis documents the process that was used to select and integrate the proposed ASBMD architecture.
APA, Harvard, Vancouver, ISO, and other styles
9

Matthews, Stephen W., and Kenneth H. Miller. "An open architecture for defense virtual environment training systems." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/6297.

Full text
Abstract:
Approved for public release; distribution in unlimited.
This thesis develops a proposed software system that allows programmers to create virtual reality training environment applications for military (or other) use in which characters and character animation are necessary. Such applications are becoming more necessary to fill a gap in military training due to lack of personnel, time, money, and resources. Creation of virtual environment training applications allows military units to augment procedural training in preparation for live or physically simulated training. In the current environment of lesser training and more military requirements, such augmentation will only serve to benefit unit capabilities. While such systems for developing virtual environment applications are commercially available, those systems are costly in both licensing and usage fees. One of the tenets of the system that this thesis develops is that this system will be free and partially open source, such that programmers can create low cost virtual environment applications for military training, and such that experienced programmers can modify or add to the system in order to improve or enhance its capabilities to meet their needs.
APA, Harvard, Vancouver, ISO, and other styles
10

Matthews, Stephen W. Miller Kenneth H. "An open architecture for defense virtual environment training systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FMatthews.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2003.
Thesis advisor(s): Rudolph P. Darken, Joseph A. Sullivan. Includes bibliographical references (p. 131-134). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
11

Daehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Camacho, Juan G., Lawrence F. Guest, Belen M. Hernandez, Thomas M. Johnson, Alan H. Kang, Giang T. Le, Brian J. MacGillivray, Tu K. Ngo, Kyle B. Norman, and Franklin Tomei. "Open architecture as an enabler for FORCEnet Cruise Missile Defense." Thesis, Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/6930.

Full text
Abstract:
Advancements in missile technology have made cruise missile capability available worldwide. Current US naval weapon systems lack full interoperability across multiple platforms and full integration of detection, control, and engagement processes against incoming targets. The key to defeating future threats to our military assets is in gaining additional reaction time. This can be accomplished by leveraging collective sensor detection data throughout the battlespace, utilizing the FORCEnet data resources to evaluate the threat, and engaging the threat with a tiered defense. The objective of this capstone project is to address the above issues through the use of Open Architecture (OA) within a FORCEnet environment. This report focuses on the development of a conceptual architecture for Cruise Missile Defense (CMD) that combines FORCEnet architecture requirements with Program Executive Office of Integrated Warfare Systems (PEO IWS)'s OA functional architecture technical requirements. Further, this conceptual architecture is compared with PEO IWS's functional architecture via a series of systems engineering diagrams. These diagrams culminate in a simulation model that analyzes and determines the validity of the conceptual architecture. Results from the simulation model show that the conceptual architecture performed significantly better than PEO IWS's. These results are attributed to the addition of a re-engagement loop called Observe-Orient-Decide-Act (OODA).
APA, Harvard, Vancouver, ISO, and other styles
13

Wilson, C. Barry (Charles Barry). "Improving value of strategic defense systems using modular open architecture." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111233.

Full text
Abstract:
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2017.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Vita. Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 89-91).
Modular Open System Architecture (MOSA) has been deliberately pursued in Department of Defense acquisitions of military systems for the last two decades due to its ability to save cost, improve performance, and prolong system lifespan. As defense systems grow increasingly complex and expensive, the risk of unforeseen threat environments becomes more significant and mitigation strategies more important. Considering this uncertainty, the capability to react to new environments quickly and inexpensively is paramount. Modular systems mitigate risks inherent in such uncertain environments by providing flexibility to users. However, a method to quantitatively assess the benefit modularity provides remains elusive. This thesis provides a methodology for analyzing the value of flexibility to users of defense systems with the purpose of revealing how and where open architectures are most beneficial. Using performance modeling, Monte Carlo simulation, and sensitivity analysis the thesis illuminates the power of improving flexibility in complex systems by means of modularity. A specific case study -- the Multi Object Kill Vehicle Anti-Ballistic Missile System -- will be used to demonstrate the capability of the process to facilitate MOSA implementation in defense systems.
by C. Barry Wilson.
S.M. in Technology and Policy
APA, Harvard, Vancouver, ISO, and other styles
14

Williams, Jack Stephen. "Architecture and defense on the military frontier of Arizona, 1752-1856." Diss., The University of Arizona, 1991. http://hdl.handle.net/10150/185464.

Full text
Abstract:
The relationship between architecture and defense during the mid-eighteenth to mid-nineteenth centuries in the portion of Hispanic Sonora that later became southern Arizona is examined. Included are a description and analysis of presidio fortifications, and a comparison of these defense works with other kinds of fortified and garrisoned places found in the region. Separate sections offer appraisals of how raw materials, labor, and tools, were used to plan and build frontier strongholds in northern New Spain and early Mexico. Also provided is a description of the weapons and tactics used in the defense of fortified places. An evaluation is made of the role of fortifications in grand strategy. Based on this evidence, it is argued that defense involved a wider variety of institutions than has traditionally been recognized. The survey of defensive sites also indicates that the presidios do not share certain important features. These differences reflect gradual changes in design concepts over time. It is argued that the causes of these modifications are principally the results of shifts in strategy.
APA, Harvard, Vancouver, ISO, and other styles
15

Hitefield, Seth D. "A Defense-In-Depth Security Architecture for Software Defined Radio Systems." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/96594.

Full text
Abstract:
Modern wireless communications systems are constantly evolving and growing more complex. Recently, there has been a shift towards software defined radios due to the flexibility soft- ware implementations provide. This enables an easier development process, longer product lifetimes, and better adaptability for congested environments than conventional hardware systems. However, this shift introduces new attack surfaces where vulnerable implementa- tions can be exploited to disrupt communications or gain unauthorized access to a system. Previous research concerning wireless security mainly focuses on vulnerabilities within pro- tocols rather than in the radios themselves. This dissertation specifically addresses this new threat against software radios and introduces a new security model intended to mitigate this threat. We also demonstrate example exploits of waveforms which can result in either a denial-of-service or a compromise of the system from a wireless attack vector. These example exploits target vulnerabilities such as overflows, unsanitized control inputs, and unexpected state changes. We present a defense-in-depth security architecture for software radios that protects the system by isolating components within a waveform into different security zones. Exploits against vulnerabilities within blocks are contained by isolation zones which protects the rest of the system from compromise. This architecture is inspired by the concept of a microkernel and provides a minimal trusted computing base for developing secure radio systems. Unlike other previous security models, our model protects from exploits within the radio protocol stack itself and not just the higher layer application. Different isolation mechanisms such as containers or virtual machines can be used depending on the security risk imposed by a component and any security requirements. However, adding these isolation environments incurs a performance overhead for applications. We perform an analysis of multiple example waveforms to characterize the impact of isolation environments on the overall performance of an application and demonstrate the overhead generated from the added isolation can be minimal. Because of this, our defense-in-depth architecture should be applied to real-world, production systems. We finally present an example integration of the model within the GNU Radio framework that can be used to develop any waveform using the defense-in-depth se- curity architecture.
Doctor of Philosophy
In recent years, wireless devices and communication systems have become a common part of everyday life. Mobile devices are constantly growing more complex and with the growth in mobile networks and the Internet of Things, an estimated 20 billion devices will be connected in the next few years. Because of this complexity, there has been a recent shift towards using software rather than hardware for the primary functionality of the system. Software enables an easier and faster development process, longer product lifetimes through over- the-air updates, and better adaptability for extremely congested environments. However, these complex software systems can be susceptible to attack through vulnerabilities in the radio interfaces that allow attackers to completely control a targeted device. Much of the existing wireless security research only focuses on vulnerabilities within different protocols rather than considering the possibility of vulnerabilities in the radios themselves. This work specifically focuses on this new threat and demonstrates example exploits of software radios. We then introduce a new security model intended to protect against these attacks. The main goal of this dissertation is to introduce a new defense-in-depth security architecture for software radios that protects the system by isolating components within a waveform into different security zones. Exploits against the system are contained within the zones and unable to compromise the overall system. Unlike other security models, our model protects from exploits within the radio protocol stack itself and not just the higher layer application. Different isolation mechanisms such as containers or virtual machines can be used depending on the security risk imposed by a component and any security requirements for the system. However, adding these isolation environments incurs a performance overhead for applications. We also perform a performance analysis with several example applications and show the overhead generated from the added isolation can be minimal. Therefore, the defense-in-depth model should be the standard method for architecting wireless communication systems. We finally present a GNU Radio based framework for developing waveforms using the defense- in-depth approach.
APA, Harvard, Vancouver, ISO, and other styles
16

Polansky, Nicholas W. (Nicholas Wilkes). "Inhabiting cycles of maritime obsolescence : redirecting the National Defense Reserve Fleet." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/87547.

Full text
Abstract:
Thesis: M. Arch., Massachusetts Institute of Technology, Department of Architecture, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 112-115).
Defense is in a state of obsolescence. The metrics of risk have changed from threat of military invasion to that of weather. Infrastructure is in a state of transition. The Maritime Administration's National Defense Reserve Fleet (NDRF) has dwindled from 2,700 ships in 1946 to only 140 in 2013. Now, along with closure of over 350 military installations and their related infrastructures in the continental US, the 140 remaining sea-lift merchant vessels are deemed obsolete, no longer needed for global defense operations. This cycle of infrastructural obsolescence offers an opportunity to realign coastal sites of maritime service and production, within regional seaport operations, to mitigate the inevitable threat of a seismic and/or flood catastrophe while contributing valuable social utility through industrial ingenuity. Waterfront development must now be coupled with appropriate metrics of defense and redundancy, projecting a long term phasing for the future occupation of the post industrial estuary. This thesis proposes a strategic redevelopment of obsolete maritime infrastructures that programs a regional sea-lift defense program for the San Francisco Bay as a prototype for inland bay regions. It realigns one of three remaining sites of the NDRF to serve a region with a 63% chance of experiencing an earthquake with magnitude of 6.7 or greater in the next 30 years resulting in the loss of water, power, and shelter for 60,000 people in 27,000 buildings. The project proposes reprogramming the remaining NRDF merchant vessels as floating water, power, and food utilities and staging strategic coastal port infrastructures on an entirely ship powered waterfront, beyond the grid. These proposed hybrid landscapes work together as a strategic urban model for phasing resilient seaports in highly vulnerable coastal regions. They invert the "hard," land-borne conduits of power and water in favor of multiplied and thus redundant, "soft," distributed, waterborne infrastructure delivering power, water, and food to support emergency urbanism.
by Nicholas W. Polansky.
M. Arch.
APA, Harvard, Vancouver, ISO, and other styles
17

Yikilkan, Orhan. "A changing European Security and defense architecture and its impact on Turkey." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA396532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sowers, David Albert. "Architecture for Issuing DoD Mobile Derived Credentials." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/64351.

Full text
Abstract:
With an increase in performance, dependency and ubiquitousness, the necessity for secure mobile device functionality is rapidly increasing. Authentication of an individual's identity is the fundamental component of physical and logical access to secure facilities and information systems. Identity management within the Department of Defense relies on Public Key Infrastructure implemented through the use of X.509 certificates and private keys issued on smartcards called Common Access Cards (CAC). However, use of CAC credentials on smartphones is difficult due to the lack of effective smartcard reader integration with mobile devices. The creation of a mobile phone derived credential, a new X.509 certificate and key pair based off the credentials of the CAC certificates, would eliminate the need for CAC integration with mobile devices This thesis describes four architectures for securely and efficiently generating and delivering a derived credential to a mobile device for secure communications with mobile applications. Two architectures generate credentials through a software cryptographic module providing a LOA-3 credential. The other two architectures provide a LOA-4 credential by utilizing a hardware cryptographic module for the generation of the key pair. In two of the architectures, the Certificate Authority']s (CA) for the new derived credentials is the digital signature certificate from the CAC. The other two architectures utilize a newly created CA, which would reside on the DoD network and be used to approve and sign the derived credentials. Additionally, this thesis demonstrates the prototype implementations of the two software generated derived credential architectures using CAC authentication and outlines the implementation of the hardware cryptographic derived credential.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
19

Condello, Celia. "Le château ducal de Moulins (Allier) de Louis II de Bourbon à Anne de France : étude historique et archéologique d'une résidence princière (XIVe - XVIe siècle)." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE2029.

Full text
Abstract:
Le château ducal de Moulins, s’il a subi diverses destructions, comporte aujourd’hui encore des éléments qui méritent d’être étudiés de près, afin de restituer son état initial. On connaît d’après les sources écrites au moins deux grandes campagnes de construction, la première fut amorcée par le troisième duc de Bourbon, Louis II, à la toute fin du XIVe siècle. La tour maîtresse « Mal-Coiffée » étant datée par dendrochronologie vers 1399/1400. Un second chantier d’agrandissement et de réaménagements débute après 1488, commandité cette fois par le duc de Bourbon Pierre de Beaujeu et son épouse Anne de France, sœur de Charles VIII. Cet agrandissement se terminera au tout début du XVIe siècle avec la construction d’un portique d’architecture renaissante, très précoce en France. Cette thèse mêle l’histoire et l’histoire de l’art mais part surtout d’une réflexion archéologique des bâtiments subsistants. C’est en cumulant et en confrontant ces diverses approches que l’étude a pu être la plus complète
During his history, the ducal castle of Moulins has been subject to several destructions and improvements. Despite this, it still contains elements that should be studied carefully in order to restore its original state. From written sources, one knows at least two major buildings campaigns. First one was initiated by the third duke of Bourbon, Louis II, in the late fourteenth century. The remaining main tower, known as “Mal-Coiffée” ("Untidy Top"), has been dated by dendrochronology around 1399/1400. A second campaign of expansion and redevelopment begins after 1488, commissioned by the Duke of Bourbon, Pierre de Beaujeu and his wife Anne de France, Charles VIII’s sister. This expansion will be completed in the early sixteenth century with the construction of a renaissance architecture portico, very early in France. This thesis combines both History and art history, starting from an archaeological reflection of the remaining buildings. The aim of this work is to combine and compare these different approaches in order to obtain the most comprehensive and exhaustive study of this forgotten site which play a key role in History
APA, Harvard, Vancouver, ISO, and other styles
20

OLIVEIRA, LUIZA NASCIMENTO DE. "FORTIFICATION PLANS OF RIO DE JANEIRO: MILITARY ARCHITECTURE AND DEFENSE OF THE EMPIRE (1700-1730)." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2014. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=24113@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
O presente trabalho tem por objetivo analisar as plantas de fortificação para a cidade de São Sebastião do Rio de Janeiro, de autoria do padre matemático Diogo Soares, no que diz respeito a sua utilização como um instrumento de governo da Monarquia Portuguesa para a cidade e para a defesa do Império. Para tal, criou-se metodologia de leitura das plantas de fortificação a partir do estudo dos tratados de arquitetura militar dos padres Soares e Luiz Gonzaga. Percebemos que as plantas de fortificação respondiam ao duplo desafio posto à Monarquia Portuguesa na pós-Restauração de manter a soberania do Reino e preservar as conquistas coloniais. Do mesmo modo, procuramos analisar a forma pela qual tais desenhos se constituíram em uma linguagem específica que fez parte do discurso político Setecentista para afirmar a soberania portuguesa.
This study aims to analyze plans fortification for Saint Sebastian of Rio de Janeiro city, performed by mathematical priest Diogo Soares, regarding its use as an instrument of the Portuguese Monarchy government to the city and to the defense of the Empire. To this end, a reading methodology was created for the plans fortification based on the study of the military architecture treaties of priests Soares and Luiz Gonzaga. We noticed that the fortification plans answered the double challenge to the Portuguese Monarchy after the Restoration: to maintain the sovereignty of the Kingdom and to preserve the colonial conquests. In the same way, we tried to analyze the manner in which such designs were used as a specific language that was part of the eighteenth-century political discourse to assert Portuguese sovereignty.
APA, Harvard, Vancouver, ISO, and other styles
21

Túlio, Ana. "Sistema defensivo de Peniche: o Forte de São João Batista na ilha da Berlenga." Master's thesis, Universidade de Évora, 2015. http://hdl.handle.net/10174/17694.

Full text
Abstract:
O Forte de São João Batista foi construído no século XVII sobre a ilha da Berlenga, situando-se a oeste da vila de Peniche. Atualmente encontra-se em funcionamento como casa de abrigo, ou campismo de habitação, dirigido por um grupo de residentes, que apesar do grande esforço desenvolvido para manter o edifício em boas condições, não tem sido muito bem sucedido, uma vez que se encontra em mau estado de conservação. Independentemente de se tratar de uma estrutura de caráter militar, que desempenhou essencialmente a função de defesa, sempre foi um lugar muito ocupado ao longo dos tempos. A sua localização única, privilegiada e de certo modo particular, no litoral português, provoca curiosidade e interesse nas pessoas, e dessa forma um grande desejo de o visitar. Com base nas obras de Mariano Calado, que estudou a história da vila de Peniche, este trabalho consiste em dois momentos. O primeiro pretende analisar e expor a evolução de todo o sistema defensivo, no qual se insere o Forte em estudo de São João Batista. Este último tem como objetivo apresentar uma possível intervenção arquitetónica que albergue um programa sólido e permita a sua ocupação anual. Através de uma análise aprofundada, não só de documentos escritos como também de elementos desenhados, este estudo permitirá uma melhor compreensão de todo o sistema de defesa da linha costeira, que tem vindo a desaparecer progressivamente de acordo com o elevado número de edifícios que se encontram em ruína, bem como mencionar possíveis intervenções em construções deste tipo de modo a evitar o seu total abandono e erosão. Este é um tema cujo interesse importa realçar, com o objetivo de contribuir para a sua salvaguarda e possível reutilização; The Defensive System of Peniche Fort of St. John the Baptist on the Berlenga Island ABSTRACT: The Fort of Saint John the Baptist was built in the XVII century on the Berlenga Island that is situated on the west side of the town of Peniche. Nowadays this building is used as a shelter or a house camping and it is ruled by a group of inhabitants of the town of Peniche. In spite of the great effort done by this group of people to maintain the building in good conditions, they haven’t been very well succeeded, because it is in a bad state of repair. Independently being a structure of military character, which had essentially a defence function, it has always been visited by many people. As it is very well situated, in the Portuguese coast, with wonderful landscapes, the building provokes curiosity and interest in people and this way they feel a great desire to visit it. Based on the works of Mariano Calado, who has studied the history of the town of Peniche, this work consists of two stages. The first aims to analyse and expose the evolution of the entire defensive system of the town, which includes the Fort of St. John the Baptist. The latter aims to present a possible architectural intervention which includes a solid programme and allows the annual occupation. Through an in-depth analysis, not only of written documents but also of drawings, this study will allow a better understanding of the entire defence system of the coastline that is gradually disappearing under the high number of buildings that are in disrepair, as well as mention possible interventions in buildings of this type and prevent their total abandonment and erosion. This is a topic whose interest should be noted, in order to contribute to the preservation and possible reuse of these buildings.
APA, Harvard, Vancouver, ISO, and other styles
22

Tolgay, Sera. "Planning for water scarcity in Jordan Valley : in defense of environmental flows in arid climates." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118562.

Full text
Abstract:
Thesis: M.C.P., Massachusetts Institute of Technology, Department of Urban Studies and Planning, 2018.
Thesis: S.M., Massachusetts Institute of Technology, Department of Architecture, 2018.
"June 2018." Cataloged from PDF version of thesis.
Includes bibliographical references (pages 97-101).
Scarcity is relative, as water resources can be mismanaged, shared inequitably and allocated asymmetrically. Half a billion people live under conditions of severe water scarcity in many arid and semi-arid regions, marked by an increasing demand for water and unprecedented droughts.' The Jordan River basin, a peri-urban regional corridor, is in a particularly water-stressed region with worldwide lows in per capita water availability that is projected to decrease further by 20 percent by 2050.2 Both the valley's communities, especially smallholders, and fragile habitats of the watershed will be hard hit by the impact of a drying climate. The collapse of Jordan River, which has seen its flow reduced to a small fragment, and decline of the Dead Sea downstream are flagged as ecological disasters. However, beyond being merely a physical constraint or a supply issue, the problem of scarcity is also shaped by the politics of allocation. Through layers of geospatial data, from archival maps, surveys and remote sensing data, I show how the history of land resettlement, water allocation and infrastructural development can complicate restoration efforts today. The Regional NGO Master Plan, drafted by experts from Israel, Jordan and Palestine, makes the case for the need to rehabilitate Jordan River by allocating 400 MCM, a third of pre-modern levels, as the required inflow for restoration. I argue that restoring the river goes beyond direct flows and should be defined to include critical ecosystems that affect the hydrological cycle of the entire basin, including buffer systems and conservation reserves that support local communities. In the absence of fair reallocation mechanisms and regional design at the scale of the watershed, a roadmap to establishing common environmental flows is infeasible. Rather than offering a utopian vision for the rehabilitation of Jordan River, as an addendum to the masterplan, I develop six geospatial propositions in defense of establishing environmental flows in contexts of scarcity.
by Sera Tolgay.
M.C.P.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
23

Weigand, John F. "A proposed message system architecture for a Marine Corps Base implementation of the Defense Message System (DMS)." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA225703.

Full text
Abstract:
Thesis (M.S. in Telecommunications System Management)--Naval Postgraduate School, March 1990.
Thesis Advisor(s): Schneidewind, N.F. Second Reader: McCaffrey, M.J. 'March 1990." Description based on signature page as viewed on August 26, 2009. Author(s) subject terms: Defense Message System, Naval message, computer networking. Includes bibliographical references (p. 88-94). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
24

Ng, Jackson. "A distributed sensor network architecture for defense against the ship as a weapon in the maritime domain." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5698.

Full text
Abstract:
Approved for public release; distribution is unlimited.
A successful terrorist attack using a ship as a weapon (SAW) on shore infrastructure in the Malacca and Singapore Straits would cause chaos to global trade, as these Straits carry over one-quarter of the world's commerce and half the world's oil. This calamity must be prevented. Toward this goal, this thesis aims at developing and determining the best distributed sensor network (DSN) architecture and implementing a sensor fusion algorithm for tracking a SAW intended to run into the oil and chemical terminals on Jurong Island, Singapore. The work in this thesis involves the application of (1) an integrated systems engineering methodology for designing alternative DSN architectures, (2) Kalman and information filters for SAW tracking and sensor data fusion, (3) a track-to-track fusion algorithm, and (4) a Monte Carlo simulative study to assess the effectiveness of three distributed sensor fusion network architectures-centralized, de-centralized, and hybrid. Each distributed sensor fusion network architecture includes the various sensors that Singapore deploys in and along the Singapore Straits. The simulative study results indicate that, with and without communication bandwidth constraints, a ship with the intent to attack Jurong can be identified accurately at an earlier time with both the centralized and de-centralized sensor fusion network architectures than with the hybrid sensor fusion network architecture.
APA, Harvard, Vancouver, ISO, and other styles
25

Keller, Isaac. "Public Housing: Revisiting Housing for the Masses." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin161710891169819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Davis, Jeffrey (Jeffrey Ethan). "Software reuse in defense electronics : a study of organization and architecture approaches in a challenging business and technical environment." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/59231.

Full text
Abstract:
Thesis (S.M. in System Design and Management)--Massachusetts Institute of Technology, Engineering Systems Division, 2010.
Cataloged from PDF version of thesis.
Includes bibliographical references.
Although large scale software reuse has been studied and practiced in industry for more than 20 years, there are some practice areas where it has presented both technical and business challenges. A sector notable for exhibiting these challenges is defense electronics, the home business arena of the client organization. We have gathered information from academic and broad industry work to compare with the sponsor's experience over the past 15 years. Their organization has built a software reuse program over this time, and benefits from significant exploration of component, module, and software. product line' reuse models. In this context, we try to make sense of and understand patterns of the sponsor's cases, also concentrating on the business and technological environment and the resultant constraints that bound software projects. Our general hypothesis is that success of a reuse program is affected by: project organization type, the team's support and performance, and the design-for-reuse quality of the product. The business success that flows from the reuse program is dependent upon the strategic decisions made with reuse in mind as well as the suitability of the program's structure to the overall business model. In the sponsor's case, this suitability was less than perfect due to the nuances of the defense industry. We draw valuable insights from these cases and present them in a manner useful by similar projects. Further, experience with the product platform technique presents cases that may reveal how it requires the rigor of strict product focus to best serve the business. The main output of this work is to offer conclusions that can be used to shape business area strategy and reuse techniques based on specific conditions of the potential projects or product families.
by Jeffrey Davis.
S.M.in System Design and Management
APA, Harvard, Vancouver, ISO, and other styles
27

Brown, Willie D. "Analysis and design of a cooperative weapon assignment module for advanced battle manager of a ballistic missile defense system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FBrown.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2006.
"March 2006." Thesis Advisor(s): Man-Tak Shing, J. Bret Michael. Includes bibliographical references (p. 77-82). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
28

Howard, Bryan Paul. "Fortifications of St Eustatius: An Archaeological and Historical Study of Defense in the Caribbean." W&M ScholarWorks, 1991. https://scholarworks.wm.edu/etd/1539625659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Tharanath, Anu Russell A. "An examination of the relationship between undergraduate residence-hall architecture and student sense of community using Oscar Newman's defensible space principles as a conceptual framework." Kansas State University, 2002. http://hdl.handle.net/2097/36083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Moxley, Frederick I. II. "On the Development of a Software Architecture for a Distributed Information System that can Support the Warrior as Envisioned by the U.S. Department of Defense." NSUWorks, 1997. http://nsuworks.nova.edu/gscis_etd/739.

Full text
Abstract:
This dissertation examines, defines, and presents a viable software architecture that can be used as the structural foundation for a large distributed information system. The software architecture presented is based upon a unique concept envisioned by the U.S. Department of Defense (DOD). This concept envisions that certain characteristics and capabilities exist within the system in order to provide the type of support deemed necessary to meet the needs of the DOD. In order to provide the types of capabilities desired, the software architecture needs to be sound and proven, based on definitive solutions that provide continuity and cohesiveness throughout the systems development and implementation. For these reasons, the software architecture is based on the pattern language paradigm. The pattern language paradigm successfully demonstrates how a particular design decision consisting of diverse computational environments can be effectively used to form the structural foundation necessary to fulfill the architectural requirements established by the DOD.
APA, Harvard, Vancouver, ISO, and other styles
31

Gluck, Thaler Emile. "Computational, Evolutionary and Functional Genetic Characterization of Fungal Gene Clusters Adapted to Degrade Plant Defense Chemicals." The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1555406081422532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Hodges, Charles Thomas. "Forts of the Chieftains: A Study of Vernacular, Classical, and Renaissance Influence on Defensible Town and Villa Plans in 17th-Century Virginia." W&M ScholarWorks, 2003. https://scholarworks.wm.edu/etd/1539626396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Renoult, Bénédicte. "Le système défensif de Pétra (Jordanie) et de ses environs à l'époque nabatéenne à travers les sources archéologiques, littéraires et épigraphiques." Thesis, Paris 1, 2014. http://www.theses.fr/2014PA010669.

Full text
Abstract:
Depuis les premières recherches archéologiques sur le site de Pétra au début du XXe s., certaines questions concernant la défense de la ville n'ont pas véritablement été abordées : il n’y a pas consensus sur l'existence et la datation de fortifications, notamment pour l'époque nabatéenne. Cette étude a pour objectif de vérifier l’existence d’un éventuel système défensif reposant sur un réseau de fortifications et de postes de guet au travers d'un relevé des vestiges archéologiques visibles en surface et de pouvoir en préciser la chronologie grâce à l’observation des techniques de construction et l’analyse de la céramique de surface. D’après la répartition des vestiges défensifs répertoriés, la défense de la ville semble avoir été assurée par un système contrôlant des points stratégiques sur un territoire incluant les secteurs périphériques de la ville. Le volume I replace tout d’abord Pétra dans son milieu naturel, décrit son espace urbain et présente le contexte géopolitique de la Nabatène. Il est ensuite consacré à l'étude archéologique du système défensif des Nabatéens de Pétra : l'histoire de la recherche sur ce sujet, l'organisation et l’architecture militaires des Nabatéens, l’analyse de la répartition des vestiges défensifs par type, accompagnée de datations et d'interprétations sur la fonction de chacun d'eux. Il se termine par une étude comparative avec d'autres systèmes défensifs développés en d'autres temps à Pétra et en d'autres lieux, nabatéens ou hasmonéens. Le volume II est consacré au catalogue décrivant les différents secteurs où des vestiges défensifs ont été enregistrés. Enfin, les volumes III et III bis sont dédiés à l'illustration
Since the first archaeological researches were carried out at Petra in the early 20th century, some questions regarding the defense of the city haven’t been tackled: there is still no consensus on the existence of fortifications and their dating, especially when it comes to the Nabatean period. The purpose of the present study is to determine, thanks to an inventory of archaeological site surface remains, the existence of a possible defense system relying on a network of fortifications and observation posts, and specify its chronology through the survey of building techniques and surface pottery analysis. According to the distribution of the listed defensive remains, the defense of the city seems to have been ensured by a system which controls strategic locations in a territory including the peripheral areas of the city. Volume I first puts Petra in its natural environment, describes its urban space and presents the geopolitical context of Nabataea. It is then focused on the archaeological study of the defensive system of the Nabataeans from Petra: the history of research on this subject, the military organization and architecture of the Nabateans, the analysis of the distribution of the defensive remains according to their type, complemented with datings and interpretations on the function of each remain. It ends by a comparative study with other defensive systems developed in other times in Petra and in other places, Nabataeans or Hasmoneans. The volume II is dedicated to the catalog which describes the various areas where defensive remains were recorded. Finally, the volumes III and III bis are specifically dedicated to illustrations
APA, Harvard, Vancouver, ISO, and other styles
34

Gaugain, Lucie. "Le château et la ville d'Amboise à la fin du Moyen Age et au début de la Renaissance (1421-1525) : architecture et société." Thesis, Tours, 2011. http://www.theses.fr/2011TOUR2030/document.

Full text
Abstract:
La thèse propose une approche pluridisciplinaire, mêlant l’analyse de la topographie et la lecture minutieuse du bâti, avec relevés à l’appui, à l’exploitation de nombreuses comptabilités et des sources iconographiques. Les ensembles architecturaux profondément modifiés d’Amboise − et de ce fait très complexes à appréhender − ont en effet demandé une analyse conjointe du château et de la ville.D’une ampleur jamais encore égalée, le chantier de construction royal, initié par Louis XI en 1463, eut des répercussions immédiates sur l’économie et l’urbanisme de cette petite « ville-Pont » de 300 à 400 feux. En 1498, les chantiers étaient lancés et Amboise avait tous les atouts pour devenir une cité d’importance mais à cette date, la mort accidentelle de Charles VIII en arrêta l’essor. Toutefois, le dynamisme du chantier d’Amboise sur une quarantaine d’années constitua le laboratoire de nouvelles solutions architecturales qui influencèrent les chantiers princiers du début de la Renaissance
This thesis presents a multidisciplinary approach, it consists in the study of topography, of buildings, thanks to layouts, and of the existing accounts and iconography. Because the architecture has changed a lot it has required analyzing both the castle and the town. From 1463, Louis XI’s huge magnificent project had repercussions on the economy and the development of this small “bridge-Town”. In 1498, the building sites were set up and the town was to become a city but Charles VIII’s unexpected death stopped its expansion. However, this dynamic building period, over 40 years, has to be considered as an experiment of new architectural forms which would impact princely buildings in the early Renaissance
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Michael N. "Information capture during early front end analysis in the Joint Capabilities Integration and Development System (JCIDS) : a formative study of the capabilities of the Department of Defense Architecture Framework (DoDAF)." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107609.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, School of Engineering, System Design and Management Program, Engineering and Management Program, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 102-107).
The United States has achieved defense superiority in air, land, and sea while using some of the most advanced defense systems in the world. However, underlying this success is a troubled procurement system. Enterprise-wide problems such as poor integration between the three components (JCIDS, DAS, PPBE) of DoD acquisition and inadequate management of procurement personnel have undermined the potential of the Department of Defense. One particular area for improvement is the need for understanding the overlaps, gaps, and interdependencies of the capability portfolio. Information is a precondition to attaining that knowledge. Information is embodied in capability documents and architecture frameworks and drives the critical process of determining the right capability requirements upfront, a vital task in saving costs. (Wirthlin, 1994) The stakeholders need a comprehensive understanding of the capability portfolio during this validation process but information can be trapped in functional stovepipes. DoD Architecture Framework (DoDAF) holds much promise in enhancing the visibility and traceability of information in the capability portfolio to the stakeholders. It is a more structured way to capture and analyze information than free-text documents. The most recent JCIDS manual published in February 2015 added a new requirement to submit seven DoDAF viewpoints during the ICD submission. This indicates the potential of DoDAF viewpoints to be able to provide a full representation of a capability requirement so it can be validated in light of a holistic understanding of the portfolio. The purpose of this thesis is to analyze whether DoDAF alone can provide a holistic understanding of a capability requirement during this early front-end validation. The analysis examines the information captured by the viewpoints by comparing it to ICD information requirements. The results of the analysis reveal the benefits of DoDAF in its ability to capture more detailed information such as resource flows in structured form. A second finding revealed that the seven DoDAF viewpoints were missing key information elements about the capability requirement such as related missions and strategy documents that limit holistic visibility of the capability portfolio. Lastly, there were additional limitations such as the challenge of determining the level of specificity in the viewpoints. Recommendations include changing particular optional data fields to mandatory and adding the CV-1 and OV-3 viewpoints to provide more information about the capability requirement.
by Michael N. Lee.
S.M. in Engineering and Management
APA, Harvard, Vancouver, ISO, and other styles
36

Firmin, Titus L. "'Geaux Guard' and the Shift to the All-Volunteer Force: The Economics of the Louisiana Army National Guard, 1973-1991." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2461.

Full text
Abstract:
After the Vietnam War, increased defense funds assigned to the Army National Guard stimulated and supported small communities in Louisiana. Recruits from economically depressed regions lined up to join the Guard because of the competitive pay and the generous education benefits it offered. In the mid-1980s, when a state budgetary shortfall threatened to limit the stream of federal funds and close local armories, communities in Louisiana rallied to keep the doors of their armories open. This paper examines how the readiness efforts of the Louisiana Army National Guard affected the economies of small communities as defense dollars increased following the shift from a draft army to an all-volunteer force and the implementation of Total Force Policy.
APA, Harvard, Vancouver, ISO, and other styles
37

Jones, Benjamin S. "The Other Side of the Fence." VCU Scholars Compass, 2006. http://scholarscompass.vcu.edu/etd/843.

Full text
Abstract:
I pull from what I see in my urban surroundings. There is always a sense of dread fused with optimism that prevails. Is it beautiful? Fragments of low-riders and tricked-out cars become symbols of desire and the glowing red lens of a stop light becomes a Cyclops poised to defend his garden. Candy-coated, blooming, dripping and seductively slick confronts you with the obvious warning: STOP! You could be next… …The grass really is greener on The Other Side of the Fence. At least until winter comes.
APA, Harvard, Vancouver, ISO, and other styles
38

Rabie, Osama Bassam J. "Developing a Cyberterrorism Policy: Incorporating Individual Values." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5549.

Full text
Abstract:
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.
APA, Harvard, Vancouver, ISO, and other styles
39

Hart, Peter Bartholomew. "A plm implementation for aerospace systems engineering-conceptual rotorcraft design." Thesis, Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28278.

Full text
Abstract:
The thesis will discuss the Systems Engineering phase of an original Conceptual Design Engineering Methodology for Aerospace Engineering-Vehicle Synthesis. This iterative phase is shown to benefit from digitization of Integrated Product&Process Design (IPPD) activities, through the application of Product Lifecycle Management (PLM) technologies. Requirements analysis through the use of Quality Function Deployment (QFD) and 7 MaP tools is explored as an illustration. A "Requirements Data Manager" (RDM) is used to show the ability to reduce the time and cost to design for both new and legacy/derivative designs. Here the COTS tool Teamcenter Systems Engineering (TCSE) is used as the RDM. The utility of the new methodology is explored through consideration of a legacy RFP based vehicle design proposal and associated aerospace engineering. The 2001 American Helicopter Society (AHS) 18th Student Design Competition RFP is considered as a starting point for the Systems Engineering phase. A Conceptual Design Engineering activity was conducted in 2000/2001 by Graduate students (including the author) in Rotorcraft Engineering at the Daniel Guggenheim School of Aerospace Engineering at the Georgia Institute of Technology, Atlanta GA. This resulted in the "Kingfisher" vehicle design, an advanced search and rescue rotorcraft capable of performing the "Perfect Storm" mission, from the movie of the same name. The associated requirements, architectures, and work breakdown structure data sets for the Kingfisher are used to relate the capabilities of the proposed Integrated Digital Environment (IDE). The IDE is discussed as a repository for legacy knowledge capture, management, and design template creation. A primary thesis theme is to promote the automation of the up-front conceptual definition of complex systems, specifically aerospace vehicles, while anticipating downstream preliminary and full spectrum lifecycle design activities. The thesis forms a basis for additional discussions of PLM tool integration across the engineering, manufacturing, MRO and EOL lifecycle phases to support business management processes.
APA, Harvard, Vancouver, ISO, and other styles
40

Ouellet, Keven. "Les défenses de la Grèce du Nord : architecture, géographie, histoire et phénomènes régionaux aux périodes archaïque, classique et hellénistique." Thesis, 2019. http://hdl.handle.net/1866/24635.

Full text
Abstract:
Du VIIIe au VIe siècles av. n.è., les Grecs ont colonisé la côte nord de la mer Égée, de la rive orientale du golfe Thermaïque jusqu’à l’embouchure du fleuve Évros. Situées souvent en territoire hostile, dans une région aux richesses multiples qui suscitaient les convoitises, ces cités naissantes se sont rapidement dotées de systèmes défensifs pour assurer leur sécurité. À travers les périodes, plusieurs puissances se sont intéressées aux territoires du nord de l’Égée marquant elles aussi le paysage défensif de la région en fortifiant leurs établissements. Ce projet de recherche concerne l’étude systématique de ces systèmes de défense. Si quelques chercheurs, essentiellement Yves Grandjean, Dimitrios Lazaridis et Alexander Cambitoglou, se sont intéressés aux fortifications de certains établissements précis (Thasos, Amphipolis et Torone), aucune synthèse portant sur l’ensemble du territoire, pourtant très riche en architecture militaire, n’a été entreprise, d’où l’intérêt d’un tel projet. Plus précisément, nous poursuivons les objectifs suivants : 1) étudier la géographie et la démographie de la région afin de mieux comprendre la distribution du territoire ainsi que la manière dont il était défendu ; 2) situer les ouvrages défensifs dans le contexte de l’histoire politico-militaire de la région. Mise à part l’œuvre monumentale de N.G.L. Hammond (mais qui concerne principalement la Macédoine), celle de Benjamin Isaac (dont la portée chronologique est relativement restreinte) ou celle de Angelos Zannis (qui se concentre uniquement sur le pays entre le Strymon et le Nestos) il n’existe pas réellement d’analyse de l’histoire militaire du nord de la Grèce. Il s’agira ici d’analyser les effets des mouvements politiques et militaires (présence perse, avancée macédonienne, ingérence athénienne, expansion thasienne, conflits thraces, etc.) sur le développement des systèmes de défense. 3) Il s’agira également de localiser, répertorier, décrire, dater et illustrer (photographiquement et topographiquement) la totalité des ouvrages défensifs du nord de la Grèce. 4) Finalement, nous tenterons d’analyser les méthodes de défense, les techniques de construction, les particularités stylistiques et les formes des différentes structures défensives. L’objectif visé ici est de mieux apprécier l’héritage culturel et les influences régionales dans la mise en place et la construction des systèmes de défense. L’analyse des techniques et des styles permettra de mieux comprendre les liens entre colonies et cités-mères, d’aborder la question de la mobilité artisanale et des effets de la migration sur l’architecture militaire.
From the 8th century BC onwards, Greek colonists established many colonies between the Thermaic Gulf and the Evros river. Often located on hostile territory where the land is a very important source of wealth, these new cities have ensured their safety and stability by quickly establishing defense systems around their settlements. Throughout the periods, several powers have also taken interest in the northern Aegean territories and marked the military landscape of the region by fortifying their own urban centers. This research project concerns the systematic study of these fortifications. If some researchers, mainly Yves Grandjean, Dimitrios Lazaridis and Alexander Cambitoglou, have shown interest in the fortifications of specific cities (Thasos, Amphipolis and Torone), no synthesis covering our region, yet very rich in military architecture, has been undertaken, hence the interest of this project. More specifically, we pursue the following objectives: 1) to study the geography and demography of the region in order to better understand the distribution of the territory and the way it was defended by the settlers; 2) to contextualize the defensive structures within the politico-military history of the region. Apart from the monumental work of N.G.L. Hammond (but focusing mainly on Macedonia), the one of Benjamin Isaac (whose chronological scope is relatively limited) or that of Angelos Zannis (which focuses only in the country between Strymon and Nestos) there is no real analysis of the military history of northern Greece. Therefore, our objective is to analyze the effects of political and military movements (Persian presence, Macedonian advance, Athenian interference, Thasian expansion, Thracian conflicts, etc.) on the development of the military architecture. 3) The aim is also to catalog, locate, describe, date and illustrate (photographically and topographically) all the defensive works of northern Greece. 4) Finally, we will analyze and argue on the different defense methods, the construction techniques and the stylistic features and forms of the fortifications. The objective here is to have a better appreciation of the cultural heritage and the regional influences in the establishment and construction of defense systems. The analysis of techniques and styles will provide a better understanding of the links between new settlements and mother-cities, it will also allow to address the question of artisanal mobility and the effects of migration on military architecture.
APA, Harvard, Vancouver, ISO, and other styles
41

Tsai, Ming-Chih, and 蔡明志. "Multi-layer Defense Architecture Combined with Tracking System and Defense-in-Depth Flow Control System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/09130377994482388486.

Full text
Abstract:
碩士
南台科技大學
資訊傳播系
97
Due to the rapid growth of the Internet, in addition to the prosperity of the e-commerce, people are now visioning a beautiful picture of business opportunities brought by the Internet. However, the risk of potential network threats and hacking are in existence while people are heavily relying on the convenience brought by information technology. Attacks from hackers, Trojan, worms, and viruses have been interrupting a lot of buyers from trading with and accessing sites such as Amazon, Yahoo, CNN, E*Trade, EBay and Buy.com suffered by the DoS / DDoS attacks, resulting in the suspension of the general user's services and other business transactions. Nevertheless, there is no such standalone network security mechanism can effectively protect users from the complicated Internet environment and advance hackers’ attack. The only way to strengthen the protection is to simultaneously using many different defensive mechanisms. Therefore, the very first focus of this paper is to make you understand the most commonly used network attacks and threats, and while researching into several protective measures against those attacks, we then formulate into a multi-layer defensive mechanism. Thus an administrator can swiftly handle any surprises, protect its server, and vastly reduce the damage. In the study of McAfee Total Protection and Neo Trace Pro, the use of combining two software into a protection system structure and to prove the possibility and its anti-hacking ability. In the end, the result of the simulation experiment proved that the N-tier does work very effectively, and it is just what we have expected.
APA, Harvard, Vancouver, ISO, and other styles
42

Lee, Chang-Lin, and 李長霖. "Network Security Defense-in-Depth Architecture based on Virturalization Technology." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/17972736095958462172.

Full text
Abstract:
碩士
國立交通大學
資訊學院碩士在職專班資訊組
99
In this paper, we propose a solution “Network Security Defense-in-Depth Architecture based on Virtualization Technology” that can effectively reduce cost of the deployment of defense in depth and increase the usage of computer resources. Further, this paper will also compare their advantages and disadvantages for the traditional defense in depth architecture, Unified threat management and our solution. While also analysis their network performance. We hope this paper can provide a contribution in virtualization network security research and the defense in depth research.
APA, Harvard, Vancouver, ISO, and other styles
43

Lucenkiw, Michael. "Flora Machina: A defensible cyborg landscape." 2014. http://hdl.handle.net/1993/24012.

Full text
Abstract:
The landscape is under constant threat from human kind and cannot evolve fast enough to protect itself adequately. By augmenting an ecosystem’s natural resilience with cybernetic technology, it will be better equipped to ensure its survival in an urban setting. This practicum will investigate the creation of a cybernetically-enhanced ecosystem, the cyborg landscape, and how this organism(s) will know and understand the world around it. This practicum has been inspired by the idea of the cyborg, research on plant intelligence, installations, artistic interventions and ideas of chance and performance introduced by composer John Cage. The cyborg plant is a strategy used to expand on the limitations of a plant allowing adaptation to situations and environments. To become a cyborg, is to have an intimate bond between technology and organism, both functioning as one to overcome limitations limiting survival in the environment.
APA, Harvard, Vancouver, ISO, and other styles
44

Hung, Kuang-Yao, and 洪光耀. "The Research and Implementation of Network Security Defense Architecture in Cloud Virtual Environments." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/65590578430208015262.

Full text
Abstract:
碩士
國立中正大學
通訊工程研究所
102
Since 2009 the concept of cloud computing has been proposed, a variety of Internet services have emerged. The concept of cloud computing, is simply through a virtual network resources provided by providers, users can quickly build a huge network of virtual computing in the cloud environments, users can quickly build a huge network of virtual computing in the cloud environments to replace the physical equipments to save the huge cost and the complex settings, and to achieve offsite backup and without service interruption and so on. So the major companies all working to find a more convenient and quickly and cost-saving methods within virtual environments. However, the network security for virtual environments has no uniform specification and approaches, major security vendors are committed to developing a new protective equipment, but improving the firewall is still the fastest approach. In this thesis, we propose a defense architecture about network management and security, for resolve some security issues after the traditional physical network transform to cloud virtual network. In this paper, a method based on VLAN segmentation will be improved, replacing a physical firewall by the virtual switch which has the function of packets forwarding, to save the time that packets exchanged between the physical and virtual network. Combined with the security policy decision system to make defense rules, according to defense rules by SPDS, controller will command the virtual switch to perform it. Through this paper, we hope to construct a simple virtual firewall which can implement the function of physical network security defense system in cloud virtual environments.
APA, Harvard, Vancouver, ISO, and other styles
45

Wen, Chen Li, and 陳麗雯. "Application of the defense enterprise architecture design Disaster Prevention and Response Information Management mode." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/34188416469801968285.

Full text
Abstract:
碩士
國防大學理工學院
資訊工程碩士班
101
Along with the global climate change and social infrastructure dependency, the scale and complexity of the disaster will be more intensified. Therefore, the more government departments and stakeholders are needed to execute the rescue mission, and, even the civil rescue teams are involved. In large scale disaster, armed force are assigned to support disaster or actively assist in disaster relief, a wide range of interaction, interdisciplinary communication and integration of the information are needed for mission. The information preparedness and management is one of the important supporting tasks. Secondly, disaster prediction, monitoring, response require a large number of disaster-related information from all parties, which the early warning is based on, to carry out the analysis and decision. Faced with huge and heterogeneous disaster-relief, information must be filtered and processed immediately. The intelligence requirements of decisions for rescue activities also needs planning to collect and timely be accessed, and then the decision-making and the action of armed force can effectively support the high complexity of disaster rescue activities. Therefore, this work focuses the scenario that army command post encounters huge amount of information in disaster-rescue mission. There must be a well-planned information requirement and management model to deal with the disaster-related information sources, access, processing, responsibility, sharing, storage, etc. We proposed an activity-based information requirement (ABIR) model to analyze the information needs of the various activity stages and to establish the architecture-connected information life cycle management model. Finally, a disaster-rescue case is implemented by ABIR to validate the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
46

HSU, YUN-HSIU, and 徐韻修. "A Study on SOC-based Defense-in-depth Architecture for a Network Information System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/gtymh2.

Full text
Abstract:
碩士
國防大學
資訊管理學系
107
The Office of the President of the Republic of China(Taiwan) published the first “National Cybersecurity Strategy report” in 2018, president declared that “the cybersecurity is the national security”, because the security threat has been raised to the national security level. IBM 2015 Threat Intelligence report states that internal threats are the first of all types of attacks, and 55% of attacks come from insiders who have access to the organization's systems. Cybersecurity Insiders organization published the "Internal Threats" report in 2018, which also refers to the fact that the most devastating threats today are not from outsiders or malicious software, but from trusted internal malicious employee and negligent employees. The hacker attack method is rapidly mutating with the development of information technology. Using traditional defense architecture and security deployment defense mechanism, it has been unable to effectively deal with organizational and detailed, and well-designed cyber attacks. How to establish a multi-level protection mechanism based on access control records in the absence of a lack of information personnel and the inability of the gateway-type security equipment to function effectively. It is worthy of discussion to use an automated approach to grasp the security status of the internal network, reduce the risk of security threats from the Internet and the internal network, and improve the security protection capabilities within the enterprise. This paper hopes to integrate the gateway-side security protection system and the internal network client system log mode based on the security operation center, and construct a defense-in-depth structure. Through the experimental verification of this paper, it is indeed possible to detect and block internal threats automatically. To reduce the risk of security, and to improve the internal security protection capabilities of enterprises and reduce the load of information personnel.
APA, Harvard, Vancouver, ISO, and other styles
47

Tsou, Po-Chun, and 鄒博鈞. "An Efficient Hybrid Defense Architecture to Prevent Malicious Nodes in Mobile Ad hoc Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/38033338680083169390.

Full text
Abstract:
碩士
國立宜蘭大學
資訊工程研究所碩士班
99
With the widespread availability of mobile devices, and rapid development of wireless technologies, the number of users of Mobile Ad hoc Networks (MANETs) is increasing at a quick rate. Due to the fact that infrastructure is not needed for MANETs, it can be deployed fast and conveniently in any environment, which makes it suitable for military operations, emergent preparedness and response operations. However, due to the dynamic nature of its network topology, its infrastructure-less property and the lack of certificate authority, achieving security of data and routing in MANETs is an ongoing challenge. Common routing protocols in MANETs such as DSR, AODV, to name a few, do not implement mechanisms for detection and responses to attacks. Focusing on possible attacks by malicious nodes based on the DSR protocol, this thesis presents a mechanism (referred to as Cooperative Bait Detection Scheme (CBDS)) that can be used to effectively detect malicious nodes launching black-hole/gray-hole attacks as well as cooperative black-hole attacks. CBDS integrates the advantages of both proactive and reactive defense architectures, and implements a reverse tracing technique to help achieving the stated goal. Simulation results are given to validate the stated goal, showing that under malicious nodes attacks, CBDS outperforms the DSR, 2ACK, and BFTR protocols in terms of packet delivery ratio and routing overhead, chosen as performance metrics.
APA, Harvard, Vancouver, ISO, and other styles
48

Yang, Bo-Pong, and 楊柏峰. "Architecture-Oriented Design Method for Technical Specs Description Model of 3D Mobile Tower Defense Game." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/59216557093583917249.

Full text
Abstract:
碩士
義守大學
資訊工程學系
103
In this study, we adopt Structure-Behavior Coalescence (SBC) Architecture Description Language (SBC-ADL) as a design method for 3D Mobile games. The resulting technical specs will integrate the structure and behavior views of a 3D Mobile game to give game developers a clear idea of both its essential components and their complex interaction details. The results of SBC system design help improve the acceptance and effectiveness of the development of 3D Mobile games. This study is an application of Architecture-oriented system design using SBC-ADL as the tool. SBC-ADL consists of six fundamental diagrams. These diagrams are: a) architecture hierarchy diagram (AHD), b) framework diagram (FD), c) component operation diagram (COD), d) component connection diagram (CCD), e) structure-behavior coalescence diagram (SBCD), and f) interaction flow diagram (IFD). Through these diagrams, the 3D mobile game technical specs describe the gameplay, game rules, interface designs, etc. We will focus on formulating a general architectural design for 3D mobile game technical specs using SBC-ADL. This architecture-oriented design will lay the groundwork for future 3D mobile game developments. The design helps integrate different developers’ works on the same track, resolve uncertainties and risks caused by those non-architecture-oriented design methods.
APA, Harvard, Vancouver, ISO, and other styles
49

Wei, Shiu Je, and 許哲瑋. "Constructing an Object Monitor System via a Building Tool: Department of Defense Architecture Framework (DoDAF." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/33786841127825232665.

Full text
Abstract:
碩士
德明財經科技大學
資訊科技與管理研究所
100
The Object Monitor System is the precedential project in a modern company. It is important that the Object Monitor System can keep objects safe in the working environments and reduce the missing cost in the warehouse or logistics companies. Due to the development of the wireless communication technology the traditional manual monitor has gradually been replaced by the information technology. The method of traditional manual monitor needs higher personnel cost to solves the uncontrolled issues such that the monitor method trends to the computerization in the near future. However the implementation of the object monitor system wastes much high cost and time. For example when the information or art exhibition needs to temporally and urgently be deployed the current object monitor system maybe spends much time and more efforts. Using the object monitor system in our research takes advantages of the convenient deployment about the ZigBee control nodes, the characteristics of low-power consumption and the rapid environment evaluation around the deployment place. In order to precede the rapid integration of the object monitor system and reduce deployment time, we use the Department of Defense Architecture Framework (DoDAF) and the architecture building tool Enterprise Architect (EA) to analyze and model the function of an object monitor system for rapidly integrating the subsystems and effectively saving the implementation time. In our research, we build an object monitor system via the tool EA and the technique ZigBee and demonstrate the related products and important system interfaces. Key words: ZigBee, DoDAF, object monitor system, C4ISR systems
APA, Harvard, Vancouver, ISO, and other styles
50

Frantom, Wyatt Jacob. "Mobilization of the multi-tasking machine: Up-cycling the interstate and defense highways." Thesis, 2001. http://hdl.handle.net/1911/17422.

Full text
Abstract:
The metropolis is governed by a certain internal logic, an ' operating system' that we are often blind; initiated at the command line and materialized through mass mobility. The code for this operating system is realized through both very specific and more esoteric social rules and practices, conventions (local code restrictions, signs and semantics) which encode our motive environment, directing our movement, allowing or more often determining our personal inertia. This operating system has more to do with timing and the interactivity of planned coincidences than with built form. While speculative, this thesis preemptively explores a potential amendment to the jurisdictional constraints between architects and developers, planners and policymakers; seeking a collaborative and comprehensive approach to reconditioning the metropolis by up-cycling our highways for alternate occupation, multiplicity and intermodality. This thesis is both a speculation into one area of the metropolitan 'operating system'---it functions as a precursor to a larger manifesto, an initial attempt to decipher, decode and recode the metropolis. Mobilization of the multi-tasking machine.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography