Dissertations / Theses on the topic 'Defensive architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Defensive architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Clendening, Michael, James New, Alejandro Cuevas, Van Ngo, Amritpal Dhindsa, Amrish Patel, Dennis Hopkins, et al. "C4I architecture supporting conduct of defensive and offensive joint ASW." Monterey, California, 2008. http://hdl.handle.net/10945/6987.
Full textFarmer, John. "The deepest shelter in town : from the ruins to the bunker." Thesis, Royal College of Art, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.602324.
Full textBenselama-Messikh, Safia. "Les fortifications ottomanes d’Alger : Essai de restitution typologique et défensive 1516-1830." Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM3095.
Full textThe 16th century which saw the expansion of the ottoman empire in Eastern Mediterranean, propels the small town of Algiers to the rank of capital of Regency and military bastion of the Sublime Porte, on the Maghreb coast, facing the hegemony of the Spanish empire. The Ottomans who transform it into city Warrior, creates an artificial port, equipped with new ramparts and establish around it, a network of points of fortification, which quadrille the territory and supervise the province. Between 1516 and 1830, Algiers which is called al Maḥrūssa (well kept), remains impregnable by the sea. Its permanent concern for protection is to show the strengthened and continual maintenance of its fortifications. This essay claiming to a contribution to the vast field of research of an unpublished corpus is an investigation into a totally unexplored architecture, on the basis of archives and records in situ. The exploration of the archives of the French military engineering, constituting a fundamental source largely unpublished, will serve as the return of the defensive structure of the province of Algiers. The interest of this work lies mainly in the identification of the military constructive typologies and architectural of ottoman Algiers, which identify the constructive culture of Ottoman war in North Africa
Derenick, David Allen. "Architecture in defense of dignity." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/9018.
Full textThesis research directed by: School of Architecture, Planning and Preservation Architecture. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Bergenfelz, Charlotte, and Fredrik Silverglimth. "Att designa bort det oönskade : Exkluderande design i Göteborg och Västsverige." Thesis, Högskolan i Halmstad, Akademin för lärande, humaniora och samhälle, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37658.
Full textThe aim of this study is to explore different forms of unpleasant design in public and semi-public spaces and what potential consequences such design may have on different social groups. The results are based on focused observations of the physical designs themselves, primarily in Gothenburg, Sweden, in triangulation with text analysis of official documentations of land use and zoning plans. The findings indicate that a variety of designs were used throughout the observed public and semi-public spaces, some of which can be seen as unpleasant. Most of the observed seating options were located within privatised businesses, signalling the need to be a consumer to use these semi-public spaces. Semi-public spaces that are inaccessible during the night as well as anti-skate obstacles were other observed designs that targeted a certain group or behaviour. Four social groups were found to be more of a target or sufferer of the designs: the homeless, people with disabilities, the destitute, and skateboarders. In contradiction to previous research a substantial amount of the observed designs can be perceived as inclusive rather than only exclusionary.
Chaaya, Anis. "Le dispositif défensif du Comté de Tripoli." Thesis, Lyon 2, 2010. http://www.theses.fr/2010LYO20011.
Full textThe County of Tripoli was the last one to be created between the Frenkish States established after the First Crusade. It is the only State that kept its capital city within the power of the Crusades till the last years of the existence of these States. Some of the oldest castles built at the beginning of the XIIth century are located in this County; such as the castles of Tripoli and Gibelet.This PhD has several objectives; it aims to define the frontiers of the County of Tripoli, to list and specify all its strongholds, to study exhaustively the various fortified sites in the territory of the Republic of Lebanon, and to develop a typology of defensive architecture of the Crusades during the XIIth - XIIIth centuries in this county.Through various methods of archaeological survey, study of the topography of the territory with archaeological landscape reading, it was possible to identify and explore several fortified sites, mainly towers not known before. In our work, special interest was devoted on extensive reading and systematic analysis of some major fortified sites. This enabled a better understanding of their installation, their history and the evolution of their construction. The sites are: Archas, Castle of Gibelet, Castle of Smar Jbeil, the castle of St. Gilles in Tripoli, the tower Bahani and the tower Mouheish
Ulmer, Nicholas A. "Optimizing microgrid architecture on Department of Defense installations." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44023.
Full textEnergy managers are faced with the challenge of upgrading their installation microgrids in a tight fiscal environment, while meeting the challenges of incorporating higher percentages of renewable energy sources and providing better energy assurance during commercial grid failures. Incorporating renewable sources of energy into a microgrid is challenging due to the intermittent nature of supply. Using historical solar data and simulated forecasts for wind data, we formulate and exercise a capital planning optimization model designed to choose the best subset of existing and potential energy sources to maximize microgrid islanding time. Islanding time is defined as the amount of time demands can be met without connection to the commercial power grid, and it is one measure of an installation’s power resiliency. Using sensitivity analysis, we show quantitatively how increases in the capital planning budget has a direct positive impact on islanding time. However, the model also identifies areas where large increases in budget yield proportionally smaller returns in islanding time. Additionally, energy storage can provide increases in islanding time, but there are diminishing returns as the storage capacity is increased. Finally, we quantitatively show that increasing reliance on renewable power decreases sensitivity to changes in the price of fuel.
Hobgood, Jean, Kimberly Madison, Geoffrey Pawlowski, Steven Nedd, Michael Roberts, and Paige Rumberg. "System Architecture for Anti-Ship Ballistic Missile Defense (ASBMD)." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/6945.
Full textRecent studies suggest that China is developing a new class of ballistic missiles that can be used against moving targets, such as ships. One such technology is anticipated to cover a range of 2,000 kilometers and operate at a speed of Mach 10. The threat is also capable of maneuvering both during the midcourse and terminal flight phases for the purposes of guidance, target acquisition, and countermeasures. This threat could greatly impact the current concept of operations of U.S. Navy ships and alter national defense policies. While current ballistic missile defense solutions are capable of intercepting threats in midcourse and terminal flight phases, no comprehensive system has been developed to counter a ballistic missile threat that can (1) maneuver upon reentry in the endoatmosphere and (2) be used to attack a moving defended area, such as a U.S. Navy carrier strike group (CSG). To fulfill this need, the Anti-Ship Ballistic Missile Defense (ASBMD) team conducted research and developed a notional architecture for a system of systems solution that could be integrated into the existing Ballistic Missile Defense System (BMDS) to effectively counter this threat. This thesis documents the process that was used to select and integrate the proposed ASBMD architecture.
Matthews, Stephen W., and Kenneth H. Miller. "An open architecture for defense virtual environment training systems." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/6297.
Full textThis thesis develops a proposed software system that allows programmers to create virtual reality training environment applications for military (or other) use in which characters and character animation are necessary. Such applications are becoming more necessary to fill a gap in military training due to lack of personnel, time, money, and resources. Creation of virtual environment training applications allows military units to augment procedural training in preparation for live or physically simulated training. In the current environment of lesser training and more military requirements, such augmentation will only serve to benefit unit capabilities. While such systems for developing virtual environment applications are commercially available, those systems are costly in both licensing and usage fees. One of the tenets of the system that this thesis develops is that this system will be free and partially open source, such that programmers can create low cost virtual environment applications for military training, and such that experienced programmers can modify or add to the system in order to improve or enhance its capabilities to meet their needs.
Matthews, Stephen W. Miller Kenneth H. "An open architecture for defense virtual environment training systems /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FMatthews.pdf.
Full textThesis advisor(s): Rudolph P. Darken, Joseph A. Sullivan. Includes bibliographical references (p. 131-134). Also available online.
Daehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.
Full textCamacho, Juan G., Lawrence F. Guest, Belen M. Hernandez, Thomas M. Johnson, Alan H. Kang, Giang T. Le, Brian J. MacGillivray, Tu K. Ngo, Kyle B. Norman, and Franklin Tomei. "Open architecture as an enabler for FORCEnet Cruise Missile Defense." Thesis, Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/6930.
Full textWilson, C. Barry (Charles Barry). "Improving value of strategic defense systems using modular open architecture." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/111233.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Vita. Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 89-91).
Modular Open System Architecture (MOSA) has been deliberately pursued in Department of Defense acquisitions of military systems for the last two decades due to its ability to save cost, improve performance, and prolong system lifespan. As defense systems grow increasingly complex and expensive, the risk of unforeseen threat environments becomes more significant and mitigation strategies more important. Considering this uncertainty, the capability to react to new environments quickly and inexpensively is paramount. Modular systems mitigate risks inherent in such uncertain environments by providing flexibility to users. However, a method to quantitatively assess the benefit modularity provides remains elusive. This thesis provides a methodology for analyzing the value of flexibility to users of defense systems with the purpose of revealing how and where open architectures are most beneficial. Using performance modeling, Monte Carlo simulation, and sensitivity analysis the thesis illuminates the power of improving flexibility in complex systems by means of modularity. A specific case study -- the Multi Object Kill Vehicle Anti-Ballistic Missile System -- will be used to demonstrate the capability of the process to facilitate MOSA implementation in defense systems.
by C. Barry Wilson.
S.M. in Technology and Policy
Williams, Jack Stephen. "Architecture and defense on the military frontier of Arizona, 1752-1856." Diss., The University of Arizona, 1991. http://hdl.handle.net/10150/185464.
Full textHitefield, Seth D. "A Defense-In-Depth Security Architecture for Software Defined Radio Systems." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/96594.
Full textDoctor of Philosophy
In recent years, wireless devices and communication systems have become a common part of everyday life. Mobile devices are constantly growing more complex and with the growth in mobile networks and the Internet of Things, an estimated 20 billion devices will be connected in the next few years. Because of this complexity, there has been a recent shift towards using software rather than hardware for the primary functionality of the system. Software enables an easier and faster development process, longer product lifetimes through over- the-air updates, and better adaptability for extremely congested environments. However, these complex software systems can be susceptible to attack through vulnerabilities in the radio interfaces that allow attackers to completely control a targeted device. Much of the existing wireless security research only focuses on vulnerabilities within different protocols rather than considering the possibility of vulnerabilities in the radios themselves. This work specifically focuses on this new threat and demonstrates example exploits of software radios. We then introduce a new security model intended to protect against these attacks. The main goal of this dissertation is to introduce a new defense-in-depth security architecture for software radios that protects the system by isolating components within a waveform into different security zones. Exploits against the system are contained within the zones and unable to compromise the overall system. Unlike other security models, our model protects from exploits within the radio protocol stack itself and not just the higher layer application. Different isolation mechanisms such as containers or virtual machines can be used depending on the security risk imposed by a component and any security requirements for the system. However, adding these isolation environments incurs a performance overhead for applications. We also perform a performance analysis with several example applications and show the overhead generated from the added isolation can be minimal. Therefore, the defense-in-depth model should be the standard method for architecting wireless communication systems. We finally present a GNU Radio based framework for developing waveforms using the defense- in-depth approach.
Polansky, Nicholas W. (Nicholas Wilkes). "Inhabiting cycles of maritime obsolescence : redirecting the National Defense Reserve Fleet." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/87547.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 112-115).
Defense is in a state of obsolescence. The metrics of risk have changed from threat of military invasion to that of weather. Infrastructure is in a state of transition. The Maritime Administration's National Defense Reserve Fleet (NDRF) has dwindled from 2,700 ships in 1946 to only 140 in 2013. Now, along with closure of over 350 military installations and their related infrastructures in the continental US, the 140 remaining sea-lift merchant vessels are deemed obsolete, no longer needed for global defense operations. This cycle of infrastructural obsolescence offers an opportunity to realign coastal sites of maritime service and production, within regional seaport operations, to mitigate the inevitable threat of a seismic and/or flood catastrophe while contributing valuable social utility through industrial ingenuity. Waterfront development must now be coupled with appropriate metrics of defense and redundancy, projecting a long term phasing for the future occupation of the post industrial estuary. This thesis proposes a strategic redevelopment of obsolete maritime infrastructures that programs a regional sea-lift defense program for the San Francisco Bay as a prototype for inland bay regions. It realigns one of three remaining sites of the NDRF to serve a region with a 63% chance of experiencing an earthquake with magnitude of 6.7 or greater in the next 30 years resulting in the loss of water, power, and shelter for 60,000 people in 27,000 buildings. The project proposes reprogramming the remaining NRDF merchant vessels as floating water, power, and food utilities and staging strategic coastal port infrastructures on an entirely ship powered waterfront, beyond the grid. These proposed hybrid landscapes work together as a strategic urban model for phasing resilient seaports in highly vulnerable coastal regions. They invert the "hard," land-borne conduits of power and water in favor of multiplied and thus redundant, "soft," distributed, waterborne infrastructure delivering power, water, and food to support emergency urbanism.
by Nicholas W. Polansky.
M. Arch.
Yikilkan, Orhan. "A changing European Security and defense architecture and its impact on Turkey." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA396532.
Full textSowers, David Albert. "Architecture for Issuing DoD Mobile Derived Credentials." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/64351.
Full textMaster of Science
Condello, Celia. "Le château ducal de Moulins (Allier) de Louis II de Bourbon à Anne de France : étude historique et archéologique d'une résidence princière (XIVe - XVIe siècle)." Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE2029.
Full textDuring his history, the ducal castle of Moulins has been subject to several destructions and improvements. Despite this, it still contains elements that should be studied carefully in order to restore its original state. From written sources, one knows at least two major buildings campaigns. First one was initiated by the third duke of Bourbon, Louis II, in the late fourteenth century. The remaining main tower, known as “Mal-Coiffée” ("Untidy Top"), has been dated by dendrochronology around 1399/1400. A second campaign of expansion and redevelopment begins after 1488, commissioned by the Duke of Bourbon, Pierre de Beaujeu and his wife Anne de France, Charles VIII’s sister. This expansion will be completed in the early sixteenth century with the construction of a renaissance architecture portico, very early in France. This thesis combines both History and art history, starting from an archaeological reflection of the remaining buildings. The aim of this work is to combine and compare these different approaches in order to obtain the most comprehensive and exhaustive study of this forgotten site which play a key role in History
OLIVEIRA, LUIZA NASCIMENTO DE. "FORTIFICATION PLANS OF RIO DE JANEIRO: MILITARY ARCHITECTURE AND DEFENSE OF THE EMPIRE (1700-1730)." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2014. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=24113@1.
Full textO presente trabalho tem por objetivo analisar as plantas de fortificação para a cidade de São Sebastião do Rio de Janeiro, de autoria do padre matemático Diogo Soares, no que diz respeito a sua utilização como um instrumento de governo da Monarquia Portuguesa para a cidade e para a defesa do Império. Para tal, criou-se metodologia de leitura das plantas de fortificação a partir do estudo dos tratados de arquitetura militar dos padres Soares e Luiz Gonzaga. Percebemos que as plantas de fortificação respondiam ao duplo desafio posto à Monarquia Portuguesa na pós-Restauração de manter a soberania do Reino e preservar as conquistas coloniais. Do mesmo modo, procuramos analisar a forma pela qual tais desenhos se constituíram em uma linguagem específica que fez parte do discurso político Setecentista para afirmar a soberania portuguesa.
This study aims to analyze plans fortification for Saint Sebastian of Rio de Janeiro city, performed by mathematical priest Diogo Soares, regarding its use as an instrument of the Portuguese Monarchy government to the city and to the defense of the Empire. To this end, a reading methodology was created for the plans fortification based on the study of the military architecture treaties of priests Soares and Luiz Gonzaga. We noticed that the fortification plans answered the double challenge to the Portuguese Monarchy after the Restoration: to maintain the sovereignty of the Kingdom and to preserve the colonial conquests. In the same way, we tried to analyze the manner in which such designs were used as a specific language that was part of the eighteenth-century political discourse to assert Portuguese sovereignty.
Túlio, Ana. "Sistema defensivo de Peniche: o Forte de São João Batista na ilha da Berlenga." Master's thesis, Universidade de Évora, 2015. http://hdl.handle.net/10174/17694.
Full textTolgay, Sera. "Planning for water scarcity in Jordan Valley : in defense of environmental flows in arid climates." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118562.
Full textThesis: S.M., Massachusetts Institute of Technology, Department of Architecture, 2018.
"June 2018." Cataloged from PDF version of thesis.
Includes bibliographical references (pages 97-101).
Scarcity is relative, as water resources can be mismanaged, shared inequitably and allocated asymmetrically. Half a billion people live under conditions of severe water scarcity in many arid and semi-arid regions, marked by an increasing demand for water and unprecedented droughts.' The Jordan River basin, a peri-urban regional corridor, is in a particularly water-stressed region with worldwide lows in per capita water availability that is projected to decrease further by 20 percent by 2050.2 Both the valley's communities, especially smallholders, and fragile habitats of the watershed will be hard hit by the impact of a drying climate. The collapse of Jordan River, which has seen its flow reduced to a small fragment, and decline of the Dead Sea downstream are flagged as ecological disasters. However, beyond being merely a physical constraint or a supply issue, the problem of scarcity is also shaped by the politics of allocation. Through layers of geospatial data, from archival maps, surveys and remote sensing data, I show how the history of land resettlement, water allocation and infrastructural development can complicate restoration efforts today. The Regional NGO Master Plan, drafted by experts from Israel, Jordan and Palestine, makes the case for the need to rehabilitate Jordan River by allocating 400 MCM, a third of pre-modern levels, as the required inflow for restoration. I argue that restoring the river goes beyond direct flows and should be defined to include critical ecosystems that affect the hydrological cycle of the entire basin, including buffer systems and conservation reserves that support local communities. In the absence of fair reallocation mechanisms and regional design at the scale of the watershed, a roadmap to establishing common environmental flows is infeasible. Rather than offering a utopian vision for the rehabilitation of Jordan River, as an addendum to the masterplan, I develop six geospatial propositions in defense of establishing environmental flows in contexts of scarcity.
by Sera Tolgay.
M.C.P.
S.M.
Weigand, John F. "A proposed message system architecture for a Marine Corps Base implementation of the Defense Message System (DMS)." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA225703.
Full textThesis Advisor(s): Schneidewind, N.F. Second Reader: McCaffrey, M.J. 'March 1990." Description based on signature page as viewed on August 26, 2009. Author(s) subject terms: Defense Message System, Naval message, computer networking. Includes bibliographical references (p. 88-94). Also available online.
Ng, Jackson. "A distributed sensor network architecture for defense against the ship as a weapon in the maritime domain." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5698.
Full textA successful terrorist attack using a ship as a weapon (SAW) on shore infrastructure in the Malacca and Singapore Straits would cause chaos to global trade, as these Straits carry over one-quarter of the world's commerce and half the world's oil. This calamity must be prevented. Toward this goal, this thesis aims at developing and determining the best distributed sensor network (DSN) architecture and implementing a sensor fusion algorithm for tracking a SAW intended to run into the oil and chemical terminals on Jurong Island, Singapore. The work in this thesis involves the application of (1) an integrated systems engineering methodology for designing alternative DSN architectures, (2) Kalman and information filters for SAW tracking and sensor data fusion, (3) a track-to-track fusion algorithm, and (4) a Monte Carlo simulative study to assess the effectiveness of three distributed sensor fusion network architectures-centralized, de-centralized, and hybrid. Each distributed sensor fusion network architecture includes the various sensors that Singapore deploys in and along the Singapore Straits. The simulative study results indicate that, with and without communication bandwidth constraints, a ship with the intent to attack Jurong can be identified accurately at an earlier time with both the centralized and de-centralized sensor fusion network architectures than with the hybrid sensor fusion network architecture.
Keller, Isaac. "Public Housing: Revisiting Housing for the Masses." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin161710891169819.
Full textDavis, Jeffrey (Jeffrey Ethan). "Software reuse in defense electronics : a study of organization and architecture approaches in a challenging business and technical environment." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/59231.
Full textCataloged from PDF version of thesis.
Includes bibliographical references.
Although large scale software reuse has been studied and practiced in industry for more than 20 years, there are some practice areas where it has presented both technical and business challenges. A sector notable for exhibiting these challenges is defense electronics, the home business arena of the client organization. We have gathered information from academic and broad industry work to compare with the sponsor's experience over the past 15 years. Their organization has built a software reuse program over this time, and benefits from significant exploration of component, module, and software. product line' reuse models. In this context, we try to make sense of and understand patterns of the sponsor's cases, also concentrating on the business and technological environment and the resultant constraints that bound software projects. Our general hypothesis is that success of a reuse program is affected by: project organization type, the team's support and performance, and the design-for-reuse quality of the product. The business success that flows from the reuse program is dependent upon the strategic decisions made with reuse in mind as well as the suitability of the program's structure to the overall business model. In the sponsor's case, this suitability was less than perfect due to the nuances of the defense industry. We draw valuable insights from these cases and present them in a manner useful by similar projects. Further, experience with the product platform technique presents cases that may reveal how it requires the rigor of strict product focus to best serve the business. The main output of this work is to offer conclusions that can be used to shape business area strategy and reuse techniques based on specific conditions of the potential projects or product families.
by Jeffrey Davis.
S.M.in System Design and Management
Brown, Willie D. "Analysis and design of a cooperative weapon assignment module for advanced battle manager of a ballistic missile defense system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FBrown.pdf.
Full text"March 2006." Thesis Advisor(s): Man-Tak Shing, J. Bret Michael. Includes bibliographical references (p. 77-82). Also available online.
Howard, Bryan Paul. "Fortifications of St Eustatius: An Archaeological and Historical Study of Defense in the Caribbean." W&M ScholarWorks, 1991. https://scholarworks.wm.edu/etd/1539625659.
Full textTharanath, Anu Russell A. "An examination of the relationship between undergraduate residence-hall architecture and student sense of community using Oscar Newman's defensible space principles as a conceptual framework." Kansas State University, 2002. http://hdl.handle.net/2097/36083.
Full textMoxley, Frederick I. II. "On the Development of a Software Architecture for a Distributed Information System that can Support the Warrior as Envisioned by the U.S. Department of Defense." NSUWorks, 1997. http://nsuworks.nova.edu/gscis_etd/739.
Full textGluck, Thaler Emile. "Computational, Evolutionary and Functional Genetic Characterization of Fungal Gene Clusters Adapted to Degrade Plant Defense Chemicals." The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1555406081422532.
Full textHodges, Charles Thomas. "Forts of the Chieftains: A Study of Vernacular, Classical, and Renaissance Influence on Defensible Town and Villa Plans in 17th-Century Virginia." W&M ScholarWorks, 2003. https://scholarworks.wm.edu/etd/1539626396.
Full textRenoult, Bénédicte. "Le système défensif de Pétra (Jordanie) et de ses environs à l'époque nabatéenne à travers les sources archéologiques, littéraires et épigraphiques." Thesis, Paris 1, 2014. http://www.theses.fr/2014PA010669.
Full textSince the first archaeological researches were carried out at Petra in the early 20th century, some questions regarding the defense of the city haven’t been tackled: there is still no consensus on the existence of fortifications and their dating, especially when it comes to the Nabatean period. The purpose of the present study is to determine, thanks to an inventory of archaeological site surface remains, the existence of a possible defense system relying on a network of fortifications and observation posts, and specify its chronology through the survey of building techniques and surface pottery analysis. According to the distribution of the listed defensive remains, the defense of the city seems to have been ensured by a system which controls strategic locations in a territory including the peripheral areas of the city. Volume I first puts Petra in its natural environment, describes its urban space and presents the geopolitical context of Nabataea. It is then focused on the archaeological study of the defensive system of the Nabataeans from Petra: the history of research on this subject, the military organization and architecture of the Nabateans, the analysis of the distribution of the defensive remains according to their type, complemented with datings and interpretations on the function of each remain. It ends by a comparative study with other defensive systems developed in other times in Petra and in other places, Nabataeans or Hasmoneans. The volume II is dedicated to the catalog which describes the various areas where defensive remains were recorded. Finally, the volumes III and III bis are specifically dedicated to illustrations
Gaugain, Lucie. "Le château et la ville d'Amboise à la fin du Moyen Age et au début de la Renaissance (1421-1525) : architecture et société." Thesis, Tours, 2011. http://www.theses.fr/2011TOUR2030/document.
Full textThis thesis presents a multidisciplinary approach, it consists in the study of topography, of buildings, thanks to layouts, and of the existing accounts and iconography. Because the architecture has changed a lot it has required analyzing both the castle and the town. From 1463, Louis XI’s huge magnificent project had repercussions on the economy and the development of this small “bridge-Town”. In 1498, the building sites were set up and the town was to become a city but Charles VIII’s unexpected death stopped its expansion. However, this dynamic building period, over 40 years, has to be considered as an experiment of new architectural forms which would impact princely buildings in the early Renaissance
Lee, Michael N. "Information capture during early front end analysis in the Joint Capabilities Integration and Development System (JCIDS) : a formative study of the capabilities of the Department of Defense Architecture Framework (DoDAF)." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107609.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 102-107).
The United States has achieved defense superiority in air, land, and sea while using some of the most advanced defense systems in the world. However, underlying this success is a troubled procurement system. Enterprise-wide problems such as poor integration between the three components (JCIDS, DAS, PPBE) of DoD acquisition and inadequate management of procurement personnel have undermined the potential of the Department of Defense. One particular area for improvement is the need for understanding the overlaps, gaps, and interdependencies of the capability portfolio. Information is a precondition to attaining that knowledge. Information is embodied in capability documents and architecture frameworks and drives the critical process of determining the right capability requirements upfront, a vital task in saving costs. (Wirthlin, 1994) The stakeholders need a comprehensive understanding of the capability portfolio during this validation process but information can be trapped in functional stovepipes. DoD Architecture Framework (DoDAF) holds much promise in enhancing the visibility and traceability of information in the capability portfolio to the stakeholders. It is a more structured way to capture and analyze information than free-text documents. The most recent JCIDS manual published in February 2015 added a new requirement to submit seven DoDAF viewpoints during the ICD submission. This indicates the potential of DoDAF viewpoints to be able to provide a full representation of a capability requirement so it can be validated in light of a holistic understanding of the portfolio. The purpose of this thesis is to analyze whether DoDAF alone can provide a holistic understanding of a capability requirement during this early front-end validation. The analysis examines the information captured by the viewpoints by comparing it to ICD information requirements. The results of the analysis reveal the benefits of DoDAF in its ability to capture more detailed information such as resource flows in structured form. A second finding revealed that the seven DoDAF viewpoints were missing key information elements about the capability requirement such as related missions and strategy documents that limit holistic visibility of the capability portfolio. Lastly, there were additional limitations such as the challenge of determining the level of specificity in the viewpoints. Recommendations include changing particular optional data fields to mandatory and adding the CV-1 and OV-3 viewpoints to provide more information about the capability requirement.
by Michael N. Lee.
S.M. in Engineering and Management
Firmin, Titus L. "'Geaux Guard' and the Shift to the All-Volunteer Force: The Economics of the Louisiana Army National Guard, 1973-1991." ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2461.
Full textJones, Benjamin S. "The Other Side of the Fence." VCU Scholars Compass, 2006. http://scholarscompass.vcu.edu/etd/843.
Full textRabie, Osama Bassam J. "Developing a Cyberterrorism Policy: Incorporating Individual Values." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5549.
Full textHart, Peter Bartholomew. "A plm implementation for aerospace systems engineering-conceptual rotorcraft design." Thesis, Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28278.
Full textOuellet, Keven. "Les défenses de la Grèce du Nord : architecture, géographie, histoire et phénomènes régionaux aux périodes archaïque, classique et hellénistique." Thesis, 2019. http://hdl.handle.net/1866/24635.
Full textFrom the 8th century BC onwards, Greek colonists established many colonies between the Thermaic Gulf and the Evros river. Often located on hostile territory where the land is a very important source of wealth, these new cities have ensured their safety and stability by quickly establishing defense systems around their settlements. Throughout the periods, several powers have also taken interest in the northern Aegean territories and marked the military landscape of the region by fortifying their own urban centers. This research project concerns the systematic study of these fortifications. If some researchers, mainly Yves Grandjean, Dimitrios Lazaridis and Alexander Cambitoglou, have shown interest in the fortifications of specific cities (Thasos, Amphipolis and Torone), no synthesis covering our region, yet very rich in military architecture, has been undertaken, hence the interest of this project. More specifically, we pursue the following objectives: 1) to study the geography and demography of the region in order to better understand the distribution of the territory and the way it was defended by the settlers; 2) to contextualize the defensive structures within the politico-military history of the region. Apart from the monumental work of N.G.L. Hammond (but focusing mainly on Macedonia), the one of Benjamin Isaac (whose chronological scope is relatively limited) or that of Angelos Zannis (which focuses only in the country between Strymon and Nestos) there is no real analysis of the military history of northern Greece. Therefore, our objective is to analyze the effects of political and military movements (Persian presence, Macedonian advance, Athenian interference, Thasian expansion, Thracian conflicts, etc.) on the development of the military architecture. 3) The aim is also to catalog, locate, describe, date and illustrate (photographically and topographically) all the defensive works of northern Greece. 4) Finally, we will analyze and argue on the different defense methods, the construction techniques and the stylistic features and forms of the fortifications. The objective here is to have a better appreciation of the cultural heritage and the regional influences in the establishment and construction of defense systems. The analysis of techniques and styles will provide a better understanding of the links between new settlements and mother-cities, it will also allow to address the question of artisanal mobility and the effects of migration on military architecture.
Tsai, Ming-Chih, and 蔡明志. "Multi-layer Defense Architecture Combined with Tracking System and Defense-in-Depth Flow Control System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/09130377994482388486.
Full text南台科技大學
資訊傳播系
97
Due to the rapid growth of the Internet, in addition to the prosperity of the e-commerce, people are now visioning a beautiful picture of business opportunities brought by the Internet. However, the risk of potential network threats and hacking are in existence while people are heavily relying on the convenience brought by information technology. Attacks from hackers, Trojan, worms, and viruses have been interrupting a lot of buyers from trading with and accessing sites such as Amazon, Yahoo, CNN, E*Trade, EBay and Buy.com suffered by the DoS / DDoS attacks, resulting in the suspension of the general user's services and other business transactions. Nevertheless, there is no such standalone network security mechanism can effectively protect users from the complicated Internet environment and advance hackers’ attack. The only way to strengthen the protection is to simultaneously using many different defensive mechanisms. Therefore, the very first focus of this paper is to make you understand the most commonly used network attacks and threats, and while researching into several protective measures against those attacks, we then formulate into a multi-layer defensive mechanism. Thus an administrator can swiftly handle any surprises, protect its server, and vastly reduce the damage. In the study of McAfee Total Protection and Neo Trace Pro, the use of combining two software into a protection system structure and to prove the possibility and its anti-hacking ability. In the end, the result of the simulation experiment proved that the N-tier does work very effectively, and it is just what we have expected.
Lee, Chang-Lin, and 李長霖. "Network Security Defense-in-Depth Architecture based on Virturalization Technology." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/17972736095958462172.
Full text國立交通大學
資訊學院碩士在職專班資訊組
99
In this paper, we propose a solution “Network Security Defense-in-Depth Architecture based on Virtualization Technology” that can effectively reduce cost of the deployment of defense in depth and increase the usage of computer resources. Further, this paper will also compare their advantages and disadvantages for the traditional defense in depth architecture, Unified threat management and our solution. While also analysis their network performance. We hope this paper can provide a contribution in virtualization network security research and the defense in depth research.
Lucenkiw, Michael. "Flora Machina: A defensible cyborg landscape." 2014. http://hdl.handle.net/1993/24012.
Full textHung, Kuang-Yao, and 洪光耀. "The Research and Implementation of Network Security Defense Architecture in Cloud Virtual Environments." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/65590578430208015262.
Full text國立中正大學
通訊工程研究所
102
Since 2009 the concept of cloud computing has been proposed, a variety of Internet services have emerged. The concept of cloud computing, is simply through a virtual network resources provided by providers, users can quickly build a huge network of virtual computing in the cloud environments, users can quickly build a huge network of virtual computing in the cloud environments to replace the physical equipments to save the huge cost and the complex settings, and to achieve offsite backup and without service interruption and so on. So the major companies all working to find a more convenient and quickly and cost-saving methods within virtual environments. However, the network security for virtual environments has no uniform specification and approaches, major security vendors are committed to developing a new protective equipment, but improving the firewall is still the fastest approach. In this thesis, we propose a defense architecture about network management and security, for resolve some security issues after the traditional physical network transform to cloud virtual network. In this paper, a method based on VLAN segmentation will be improved, replacing a physical firewall by the virtual switch which has the function of packets forwarding, to save the time that packets exchanged between the physical and virtual network. Combined with the security policy decision system to make defense rules, according to defense rules by SPDS, controller will command the virtual switch to perform it. Through this paper, we hope to construct a simple virtual firewall which can implement the function of physical network security defense system in cloud virtual environments.
Wen, Chen Li, and 陳麗雯. "Application of the defense enterprise architecture design Disaster Prevention and Response Information Management mode." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/34188416469801968285.
Full text國防大學理工學院
資訊工程碩士班
101
Along with the global climate change and social infrastructure dependency, the scale and complexity of the disaster will be more intensified. Therefore, the more government departments and stakeholders are needed to execute the rescue mission, and, even the civil rescue teams are involved. In large scale disaster, armed force are assigned to support disaster or actively assist in disaster relief, a wide range of interaction, interdisciplinary communication and integration of the information are needed for mission. The information preparedness and management is one of the important supporting tasks. Secondly, disaster prediction, monitoring, response require a large number of disaster-related information from all parties, which the early warning is based on, to carry out the analysis and decision. Faced with huge and heterogeneous disaster-relief, information must be filtered and processed immediately. The intelligence requirements of decisions for rescue activities also needs planning to collect and timely be accessed, and then the decision-making and the action of armed force can effectively support the high complexity of disaster rescue activities. Therefore, this work focuses the scenario that army command post encounters huge amount of information in disaster-rescue mission. There must be a well-planned information requirement and management model to deal with the disaster-related information sources, access, processing, responsibility, sharing, storage, etc. We proposed an activity-based information requirement (ABIR) model to analyze the information needs of the various activity stages and to establish the architecture-connected information life cycle management model. Finally, a disaster-rescue case is implemented by ABIR to validate the proposed method.
HSU, YUN-HSIU, and 徐韻修. "A Study on SOC-based Defense-in-depth Architecture for a Network Information System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/gtymh2.
Full text國防大學
資訊管理學系
107
The Office of the President of the Republic of China(Taiwan) published the first “National Cybersecurity Strategy report” in 2018, president declared that “the cybersecurity is the national security”, because the security threat has been raised to the national security level. IBM 2015 Threat Intelligence report states that internal threats are the first of all types of attacks, and 55% of attacks come from insiders who have access to the organization's systems. Cybersecurity Insiders organization published the "Internal Threats" report in 2018, which also refers to the fact that the most devastating threats today are not from outsiders or malicious software, but from trusted internal malicious employee and negligent employees. The hacker attack method is rapidly mutating with the development of information technology. Using traditional defense architecture and security deployment defense mechanism, it has been unable to effectively deal with organizational and detailed, and well-designed cyber attacks. How to establish a multi-level protection mechanism based on access control records in the absence of a lack of information personnel and the inability of the gateway-type security equipment to function effectively. It is worthy of discussion to use an automated approach to grasp the security status of the internal network, reduce the risk of security threats from the Internet and the internal network, and improve the security protection capabilities within the enterprise. This paper hopes to integrate the gateway-side security protection system and the internal network client system log mode based on the security operation center, and construct a defense-in-depth structure. Through the experimental verification of this paper, it is indeed possible to detect and block internal threats automatically. To reduce the risk of security, and to improve the internal security protection capabilities of enterprises and reduce the load of information personnel.
Tsou, Po-Chun, and 鄒博鈞. "An Efficient Hybrid Defense Architecture to Prevent Malicious Nodes in Mobile Ad hoc Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/38033338680083169390.
Full text國立宜蘭大學
資訊工程研究所碩士班
99
With the widespread availability of mobile devices, and rapid development of wireless technologies, the number of users of Mobile Ad hoc Networks (MANETs) is increasing at a quick rate. Due to the fact that infrastructure is not needed for MANETs, it can be deployed fast and conveniently in any environment, which makes it suitable for military operations, emergent preparedness and response operations. However, due to the dynamic nature of its network topology, its infrastructure-less property and the lack of certificate authority, achieving security of data and routing in MANETs is an ongoing challenge. Common routing protocols in MANETs such as DSR, AODV, to name a few, do not implement mechanisms for detection and responses to attacks. Focusing on possible attacks by malicious nodes based on the DSR protocol, this thesis presents a mechanism (referred to as Cooperative Bait Detection Scheme (CBDS)) that can be used to effectively detect malicious nodes launching black-hole/gray-hole attacks as well as cooperative black-hole attacks. CBDS integrates the advantages of both proactive and reactive defense architectures, and implements a reverse tracing technique to help achieving the stated goal. Simulation results are given to validate the stated goal, showing that under malicious nodes attacks, CBDS outperforms the DSR, 2ACK, and BFTR protocols in terms of packet delivery ratio and routing overhead, chosen as performance metrics.
Yang, Bo-Pong, and 楊柏峰. "Architecture-Oriented Design Method for Technical Specs Description Model of 3D Mobile Tower Defense Game." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/59216557093583917249.
Full text義守大學
資訊工程學系
103
In this study, we adopt Structure-Behavior Coalescence (SBC) Architecture Description Language (SBC-ADL) as a design method for 3D Mobile games. The resulting technical specs will integrate the structure and behavior views of a 3D Mobile game to give game developers a clear idea of both its essential components and their complex interaction details. The results of SBC system design help improve the acceptance and effectiveness of the development of 3D Mobile games. This study is an application of Architecture-oriented system design using SBC-ADL as the tool. SBC-ADL consists of six fundamental diagrams. These diagrams are: a) architecture hierarchy diagram (AHD), b) framework diagram (FD), c) component operation diagram (COD), d) component connection diagram (CCD), e) structure-behavior coalescence diagram (SBCD), and f) interaction flow diagram (IFD). Through these diagrams, the 3D mobile game technical specs describe the gameplay, game rules, interface designs, etc. We will focus on formulating a general architectural design for 3D mobile game technical specs using SBC-ADL. This architecture-oriented design will lay the groundwork for future 3D mobile game developments. The design helps integrate different developers’ works on the same track, resolve uncertainties and risks caused by those non-architecture-oriented design methods.
Wei, Shiu Je, and 許哲瑋. "Constructing an Object Monitor System via a Building Tool: Department of Defense Architecture Framework (DoDAF." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/33786841127825232665.
Full text德明財經科技大學
資訊科技與管理研究所
100
The Object Monitor System is the precedential project in a modern company. It is important that the Object Monitor System can keep objects safe in the working environments and reduce the missing cost in the warehouse or logistics companies. Due to the development of the wireless communication technology the traditional manual monitor has gradually been replaced by the information technology. The method of traditional manual monitor needs higher personnel cost to solves the uncontrolled issues such that the monitor method trends to the computerization in the near future. However the implementation of the object monitor system wastes much high cost and time. For example when the information or art exhibition needs to temporally and urgently be deployed the current object monitor system maybe spends much time and more efforts. Using the object monitor system in our research takes advantages of the convenient deployment about the ZigBee control nodes, the characteristics of low-power consumption and the rapid environment evaluation around the deployment place. In order to precede the rapid integration of the object monitor system and reduce deployment time, we use the Department of Defense Architecture Framework (DoDAF) and the architecture building tool Enterprise Architect (EA) to analyze and model the function of an object monitor system for rapidly integrating the subsystems and effectively saving the implementation time. In our research, we build an object monitor system via the tool EA and the technique ZigBee and demonstrate the related products and important system interfaces. Key words: ZigBee, DoDAF, object monitor system, C4ISR systems
Frantom, Wyatt Jacob. "Mobilization of the multi-tasking machine: Up-cycling the interstate and defense highways." Thesis, 2001. http://hdl.handle.net/1911/17422.
Full text