Academic literature on the topic 'Information warfare. Systems engineering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information warfare. Systems engineering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Information warfare. Systems engineering"

1

Parlin, Karel, Taneli Riihonen, Vincent Le Nir, Mark Bowyer, Thomas Ranstrom, Erik Axell, Borje Asp, Robert Ulman, Matthias Tschauner, and Marc Adrat. "Full-Duplex Tactical Information and Electronic Warfare Systems." IEEE Communications Magazine 59, no. 8 (August 2021): 73–79. http://dx.doi.org/10.1109/mcom.001.2001139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Overill, R. E. "Information warfare: battles in cyberspace." Computing & Control Engineering Journal 12, no. 3 (June 1, 2001): 125–28. http://dx.doi.org/10.1049/cce:20010304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pathak, A. K., Zafar Husain, and R. D. Pathak. "Technology-based information warfare: developing world perspective." International Journal of Computer Applications in Technology 16, no. 1 (2003): 47. http://dx.doi.org/10.1504/ijcat.2003.000310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moore, Carl, Seung Baek, Jay Liebowitz, LTC Robert Kilmer, and Robert Minehart. "Intelligent agent‐based information warfare advisor (“Bob‐in‐a‐box”)." Kybernetes 27, no. 1 (February 1998): 38–53. http://dx.doi.org/10.1108/03684929810200521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Duddu, Vasisht. "A Survey of Adversarial Machine Learning in Cyber Warfare." Defence Science Journal 68, no. 4 (June 26, 2018): 356. http://dx.doi.org/10.14429/dsj.68.12371.

Full text
Abstract:
<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p>The changing nature of warfare has seen a paradigm shift from the conventional to asymmetric, contactless warfare such as information and cyber warfare. Excessive dependence on information and communication technologies, cloud infrastructures, big data analytics, data-mining and automation in decision making poses grave threats to business and economy in adversarial environments. Adversarial machine learning is a fast growing area of research which studies the design of Machine Learning algorithms that are robust in adversarial environments. This paper presents a comprehensive survey of this emerging area and the various techniques of adversary modelling. We explore the threat models for Machine Learning systems and describe the various techniques to attack and defend them. We present privacy issues in these models and describe a cyber-warfare test-bed to test the effectiveness of the various attack-defence strategies and conclude with some open problems in this area of research.</p><p> </p></div></div></div>
APA, Harvard, Vancouver, ISO, and other styles
6

Makarenko, S. I., and A. S. Mamonchikova. "Dynamic plurilateral information conflict model with different participant strategies." Radio industry (Russia) 31, no. 2 (July 7, 2021): 35–48. http://dx.doi.org/10.21778/2413-9599-2021-31-2-35-48.

Full text
Abstract:
Problem setting. The development of the information theory conflicts is connected with the need to form new models that take into account new factors and features of real actions of conflicting parties in the information area. Currently, a fairly developed scientific and methodological apparatus for study of information conflict are models in the formalism of the Markov theory processes and game theory. At the same time, models based on dynamic systems are not sufficiently developed, and dynamic models of multilateral conflicts are not available in well-known publications.Target. The purpose of the work is to form a dynamic plurilateral information conflict model with different participant strategies.Results. The research results in a dynamic plurilateral information conflict model with different participant strategies. The elements of the model scientific novelty are: the conflict formalization in the form of differential equations system, which are based on the original modification of the Lotki-Voltera model equations; nine strategies for action by parties to a multilateral conflict with varying degrees of conflict; each strategy formalization in the form of coefficients or complex functions with the modeling possibility of their application and change in duel conflicts between each pair of sides.Practical significance. The model presented using in the article allows: to study the dynamic of changes in the conflict parties resources; identify local wins and losses in transition mode; to make conclusions about global wins and losses of the parties over the conflict duration; to make recommendations about party-specific strategies choice and parameters of their strategies usefulness for achieving global wins. These studies may be useful to those skilled special purpose information systems field, electronic warfare or information warfare.
APA, Harvard, Vancouver, ISO, and other styles
7

Dong, Jie, Guowei Wu, Tingting Yang, and Yangyang Li. "The Improved Image Scrambling Algorithm for the Wireless Image Transmission Systems of UAVs." Sensors 18, no. 10 (October 12, 2018): 3430. http://dx.doi.org/10.3390/s18103430.

Full text
Abstract:
With the deepening of modern military reforms, information has become the key to winning modern warfare. The use of unmanned aerial vehicle (UAV) to capture image information has become an important means of reconnaissance in modern warfare and plays an irreplaceable role. The image information usually uses a wireless image transmission system, since image information is intercepted or stolen easily during the information transmission, encrypting an image is a common method for ensuring image security. However, traditional encryption algorithms have some deficiencies in terms of efficiency and security. In order to overcome these shortcomings, a new algorithm is proposed in this paper-an improved image scrambling encryption algorithm based on Fibonacci-p coding. The first new idea of the algorithm is to separate the positive and negative signs and data of the scrambled DCT coefficients, then form the symbol matrix and the data matrix respectively, perform the scrambling encryption operation on the symbol matrix. The second new idea is to encrypt the color RGB image by converting the R, G, and B colors into Y, Cb, and Cr, and converting the normal image operation into operations on Y, Cb, and Cr, thereby implementing the encryption operation. The comprehensive performance of the algorithm is optimal with different image information. Experiments results validate the favorable performance of the proposed improved encryption algorithm.
APA, Harvard, Vancouver, ISO, and other styles
8

Sayer, Kylie. "Denying the Technology: Middle Management Resistance in Business Process Re-Engineering." Journal of Information Technology 13, no. 4 (December 1998): 247–57. http://dx.doi.org/10.1177/026839629801300404.

Full text
Abstract:
Business Process Re-engineering (BPR) as a methodology for organizational transformation has been around since the early 1990s. There are however, some serious issues of concern surrounding the success of BPR as a methodology for organizational change. This paper attempts to highlight the issues surrounding the BPR approach to change management that remain implicit within the re-engineering literature. The research presented in this paper specifically investigates BPR in practice and concentrates on the issues of power and control that underlie many of the re-engineering methodologies and how these conflict with the prerequisites of the flattened, empowered workforce that BPR envisions. The research presented here was conducted using the interpretive approach of ethnography to investigate how middle management were able to deny the technology of BPR and disable a change project. In order to maintain their hold on power in the organization they needed to revolt against the technology of re-engineering imposed on them by senior management. In using the clinical metaphor, middle management were able to create a reality around technology that portrayed it almost as a function of biological warfare, denying it being seen as a positive social tool. This paper highlights how they were able to manipulate the technology and turn its power around to reinforce their position and power in the process.
APA, Harvard, Vancouver, ISO, and other styles
9

Ang Yang, H. A. Abbass, and R. Sarker. "Characterizing warfare in red teaming." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 36, no. 2 (April 2006): 268–85. http://dx.doi.org/10.1109/tsmcb.2005.855569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zachary, Wayne W., Monica C. Zubritzky, and Floyd A. Glenn. "The Development of the Air Anti-Submarine Warfare MissionTestbed as a Tool for the Development of Operator Models." Proceedings of the Human Factors Society Annual Meeting 32, no. 16 (October 1988): 1073–77. http://dx.doi.org/10.1177/154193128803201617.

Full text
Abstract:
The central concern of human factors engineering (HFE) is facilitating a productive relationship between man and machine. A new generation of man-machine systems has arisen in which the machine acts in a relatively intelligent manner to enhance the operator's decision-making capabilities in real-time multi-tasking situations. These systems have been termed “distributed intelligence systems” (DIS) because intelligence is distributed among all system entities, whether they are human or computer. The ability of these systems to aid humans in a flexible, interactive fashion depends on the capability of the machine to predict the human's information needs in a given decision-making situation. Thus, the DIS must incorporate a model that reflects the operator's information processing requirements for the tasks necessary to operate the system. To construct this model, it is necessary to develop a DIS testbed where experimental investigations can occur. The mission environment chosen for simulation is the Naval Air Anti-Submarine Warfare (ASW) mission, whose objectives to search for, find, and attack the enemy submarine involve complex tactical decisions in a real-time multi-tasking environment. In the Air ASW mission, most significant tactical decisions are made by the Tactical Coordinator (TACCO), the main operator of the system. The aspects of the testbed discussed in this paper include those elements of the simulation and responsibilities of the TACCO needed to illustrate the types of information processing tasks involved in the ASW mission. Also, the data collection capabilities of the testbed and how this data will be applied to operator model development will be discussed.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Information warfare. Systems engineering"

1

Smith, Chad M. "Optimizing Navy information warfare a systems engineering approach." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FSmith_Chad.pdf.

Full text
Abstract:
Thesis (M.S. in Information Warfare Systems Engineering)--Naval Postgraduate School, September 2008.
Thesis Advisor(s): Elliot, Raymond A. "September 2008." Description based on title screen as viewed on November 4, 2008. Includes bibliographical references (p. 61-63). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Rios, Cesar G. "Return on investment analysis of information warfare systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FRios.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McNabb, Marcus E. "Optimizing the routher configurations within a nominal Air Force base." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMcNabb.pdf.

Full text
Abstract:
Thesis (M.S. in Information Warfare Systems Engineering and M.S. in Applied Mathematics)--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Elliott, Ray ; Rasmussen, Craig. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Network Architecture; Graph Theory; Spanning Tree; Network Security Includes bibliographical references (p. 45). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Kucukozyigit, Ali Can. "Electronic Warfare (EW) historical perspectives and its relationship to Information Operations (IO)-considerations for Turkey." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/10154.

Full text
Abstract:
The purpose of this thesis is the exploration of the relationship and interaction between Electronic Warfare (EW) and Information Operations (IO) core, supporting and related competencies. Understanding the definitions of information and its value, information superiority, and the decision making cycle provides the foundation for the thesis. Investigation of the historical transformation of EW from the U.S. Civil War to the First Gulf War, and also examining how the concept of IO has developed and evolved contributes to this study by helping to comprehend the modern day interaction between EW and each IO competency separately. This interaction is constructed upon the guidance and standards provided by the latest U.S. Joint Chiefs of Staff Publication Joint Publication 3-13 Information Operations. This study concludes that the relationship between EW and IO is increasingly interactive and consists of two aspects: limiting and interfering, and reinforcing and supporting. Also, the relationship between EW and each IO competency is not consistent between the core and supporting competencies. In addition to these conclusions, this study expresses some considerations for EW and IO applications with respect to the unique environment and requirements of the Turkish Republic.
APA, Harvard, Vancouver, ISO, and other styles
5

Petersson, Björn. "Modeling of a Retrodirective Channel With Active Antenna Arrays for Cross-Eye Jamming." Licentiate thesis, KTH, Elektroteknisk teori och konstruktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217232.

Full text
Abstract:
Cross-Eye (CE) jamming is a technique aimed at inducing false target angles in radar measurements. The potential to deceive monopulse radar, a radar type commonly used due to its angular accuracy and resilience against jamming, has captured the interest of Electronic Warfare (EW) system manufacturers. CE jamming may increase the capability of self-defense against radar guided missiles. In this thesis, a CE jammer, based on the retrodirective channel design, for use in an EW systems is modeled and analyzed. The focus of the analysis is on the non-reciprocal Active Electronically Scanned Arrays (AESA). An electrical model of the jammer system and the AESA, including variations in the electrical properties, together with three different system correction methods are used. A simulation procedure, using single frequency (CW) signals, is defined and used for estimating total level of reciprocity, which is a primary contributor to jammer performance. Reciprocity error sensitivity for variations in model parameters is simulated to indicate which AESA aspects are essential for performance. Further, the influence of characterization and calibration noise is investigated. The usability of the model is demonstrated in different types of simulations, which highlights the differences between the system correction methods. Simulations show that a relatively high level of reciprocity can be achieved when using system correction, if measurement noise and model limitations are disregarded. The expected degradation in reciprocity from differences in electrical properties between the reception and transmission branch of the AESA has been confirmed. The effect of characterization and calibration noise, for realistic levels of noise, seems to be a dominating factor in the total reciprocity error. A significant increase in reciprocity error can likely be expected when non-CW signals are used and when realistic levels of noise and non-linear effects are added.
Cross-eye (CE) är en störprincip som har potential att inducera vinkelmätfel i radar. Dess möjlighet att störa monopulsradar, en vanligt förekommande typ av radar som är motståndskraftig mot många störformer, har skapat ett intresse för metoden hos tillverkare av system för elektronisk krigföring (EW-system). Användning av CE störning i ett EW-system skulle kunna öka möjligheten till självskydd vid attack från en monopulsradarstyrd robot. Avhandlingen analyserar en modell av en retrodirektiv CE störare som är avsedd för integration i ett multifunktionellt EW-system. Fokus i analysen är på de aktiva gruppantennerna (AESA) som används i systemet. En elektrisk modell av systemet används, vilken inkluderar variationer i parametrar hos AESA samt tre olika systemkorrektionsmetoder. En simuleringsprocedur som ger möjlighet att uppskatta reciprocitetsfel och känslighet för parametervariationer i AESA är definierad. Vidare undersöks inverkan av karaktäriserings och kalibreringsbrus. Modellens användningsområden visas i olika typer av prestandasimulering där effekter av de olika systemkorrektionsmetoderna tydliggörs. Simuleringsresultat för enkelfrekvens (CW) signaler visar en relativt hög nivå av reciprocitet om brus och olinjäriteter ignoreras. Det förväntade resultatet, att elektriska skillnader mellan mottagar- och sändargrenarna orsakar en försämring i reciprocitet, bekräftas. Inverkan av karaktäriserings och kalibreringsbrus verkar vara en dominerande faktor i det totala reciprocitetsfelet då rimliga brusnivåer används. En signifikant höjning av reciprocitetsfelet kan sannolikt förväntas då signaler med en viss bandbredd används och då rimliga nivåer av brus samt olinjäriteter inkluderas.

QC 20171102

APA, Harvard, Vancouver, ISO, and other styles
6

Johnson, Allen P., Bryan Breeden, Willard Earl Duff, Paul F. Fishcer, Nathan Hornback, David C. Leiker, Parker Carlisle, et al. "Ship Anti Ballistic Missile Response (SABR)." Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/7268.

Full text
Abstract:
Includes supplemental material.
Based on public law and Presidential mandate, ballistic missile defense development is a front-burner issue for homeland defense and the defense of U.S. and coalition forces abroad. Spearheaded by the Missile Defense Agency, an integrated ballistic missile defense system was initiated to create a layered defense composed of land-, air-, sea-, and space-based assets. The Ship Anti-Ballistic Response (SABR) Project is a systems engineering approach that suggests a conceptualized system solution to meet the needs of the sea portion of ballistic missile defense in the 2025-2030 timeframe. The system is a unique solution to the sea-based ballistic missile defense issue, combining the use of a railgun interceptor and a conformable aperture skin-of-the-ship radar system.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Kenny NMN. "Information warfare targeting : people and processes /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FWang.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, December 2003.
Thesis advisor(s): Dan C. Boger, Raymond Buettner. Includes bibliographical references (p. 49-52). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Tan, Peihao Raymond. "Applying systems thinking towards countering hybrid warfare." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121799.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 121-124).
Carl von Clausewitz, a famous Prussian general and military theorist asserted that war's nature of being violent, interactive, and fundamentally political, does not change - only its character does. According to Clausewitz, the character of war is a dynamic phenomenon that manifests differently with the "spirit" of each age. In our current digital age, technology has heavily influenced interactions, including warfare. In addition to boosting traditional military means, technology has enabled rapid and widespread weaponization of social, information and infrastructural instruments for political coercion. A rising trend of combining national instruments of power to wage war simultaneously across the political, military, economic, social, information and infrastructural domains is a rapidly emerging threat, characteristic of modem "hybrid wars" being fought today. Traditional military-centric defense policies and strategies are ill-prepared to address such threats that deliberately operate in the "grey zone", playing on ambiguity and tailoring coercion to remain just below detection and response thresholds. In this research, a combination of literature review, descriptive study, inductive approach, normative research, case study and systems thinking are applied to analyze the hybrid warfare threat and then construct a suitable response framework, treating it as system with interrelated constituent parts, synergistically working together over time, within the wider international context, to deliver an emergent counter hybrid warfare capability.
by Peihao Raymond Tan.
S.M. in Engineering and Management
S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program
APA, Harvard, Vancouver, ISO, and other styles
9

Oliveria, Tristan V., James W. Beaver, Pedro R. Mercado, Andrew D. Bucher, Jennifer M. Free, and Richard W. Byers. "Systems analysis of alternative architectures for Riverine Warfare in 2010." Thesis, Monterey, California, 2006. http://hdl.handle.net/10945/2361.

Full text
Abstract:
Student Integrated Project
Includes supplementary material.
This thesis analyzed the Navy's proposed Riverine Force (RF) structure and capabilities of 2006. Systems Engineering and Analysis cohort 10 (SEA10) developed a cost-effective system of systems which increased battlespace awareness and situational responsiveness for 2010. Riverine missions were decomposed into their functional, physical, and operational architectures using the detect-to-engage sequence. This analysis determined critical RF functions. Critical functions detect and engage were then physically represented by feasible force package alternatives that augmented the baseline RF. SEA10 analyzed these alternatives using agent based models to identify baseline RF capability gaps and provide insights into possible solutions. Reduction of modeling data indicated the baseline force was as effective as some upgraded force packages depending on the measure of performance (MOP) or scenario structure under scrutiny. Sensor augmentation demonstrated significant improvements to baseline performance by increasing battlespace awareness. Weapon augmentation alone did not significantly improve baseline performance by increasing situational responsiveness. Combined sensor-weapon augmentation performed well across all MOP and scenarios. The Unmanned Surface Vehicle (USV) was the most cost-effective alternative. Dedicated helicopter support demonstrated the best performance overall, but was the most costly alternative.
APA, Harvard, Vancouver, ISO, and other styles
10

Mullis, William S. "Using the acquisition process to reduce the vulnerability of future systems to information warfare." Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/9119.

Full text
Abstract:
Approved for public release; distribution is unlimited
Information warfare (IW) is a growing concern for the United States Army. The sophisticated, high-technology modern weapons systems upon which the U.S. Army heavily relies are increasing vulnerable to IW weapons and tactics. The acquisition process plays a major role in reducing defense systems IW vulnerability. This research identifies the primary IW threats to systems during the acquisition lifecycle and what factors in the acquisition environment contribute to IW vulnerability. This research also suggests a technique for integrating IW countermeasures into the defense systems acquisition process. A primary finding of this research is that while a Program Management Office (PMO) can institute a myriad of useful countermeasures, influencing the prime contractor to establish a secure development environment is the most important action it can take in reducing the vulnerability of future systems to IW
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Information warfare. Systems engineering"

1

Introduction to communication electronic warfare systems. 2nd ed. Boston: Artech House, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Anand, A. Information technology: The future warfare weapon. New Delhi: Ocean Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Deakin, Richard S. Battlespace technologies: Network-enabled information dominance. Boston: Artech House, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Poisel, Richard. Tong xin dian zi zhan xi tong dao lun: Introduction to communication electronic warfare systems. Beijing: Dian zi gong ye chu ban she, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhan zheng gong cheng lun: Zou xiang xin xi shi dai de zhan zheng fang fa. Beijing Shi: Guo fang da xue chu ban she, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hua xue hua gong wen xian jian suo yu li yong. 2nd ed. Dalian: Dalian li gong da xue chu ban she, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

author, Zheng Huali, and Zhao Yuling active 2012, eds. Shi jie lu jun xin xi xi tong zhuang bei jian she fa zhan yan jiu: Study on Global Development of Army Military Information Systems. Beijing Shi: Guo fang gong ye chu ban she, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Borodakiĭ, I︠U︡ V. Informat︠s︡ionnye tekhnologii v voennom dele: Osnovy teorii i prakticheskogo primenenii︠a︡. Moskva: Gori︠a︡chai︠a︡ linii︠a︡ - Telekom, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1532-1623, Tulasīdāsa, ed. Rama, the lord of decorum. New Delhi: Ocean Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sølvberg, Arne, and David Chenho Kung. Information Systems Engineering. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78001-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Information warfare. Systems engineering"

1

Wei, Lin, Yuan Bingcheng, and Wu Pengfei. "The Design of the Control System of Navigation for UUV in Underwater Information Warfare." In Proceedings of the 2012 International Conference on Communication, Electronics and Automation Engineering, 219–26. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31698-2_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ottis, Rain. "Cyber Warfare." In Intelligent Systems, Control and Automation: Science and Engineering, 89–96. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sølvberg, Arne, and David Chenho Kung. "Information and Information Systems." In Information Systems Engineering, 365–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78001-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Beynon-Davies, Paul. "Information Systems Engineering." In Information Systems Development, 53–66. London: Macmillan Education UK, 1998. http://dx.doi.org/10.1007/978-1-349-14931-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sølvberg, Arne, and David Chenho Kung. "Information System Support for Information System Development." In Information Systems Engineering, 305–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78001-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

MacDonald, I. G. "Automating Information Engineering." In Automating Systems Development, 213–29. Boston, MA: Springer US, 1988. http://dx.doi.org/10.1007/978-1-4613-1033-4_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sipper, Joshua A. "Information Warfare and Cyber Education: Issues and Recommendations." In Advances in Intelligent Systems and Computing, 235–37. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58703-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Barjis, Joseph. "A Language Based Combined Requirements Engineering Approach." In Information Systems, 1–16. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35604-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kraljić, Adnan, and Tarik Kraljić. "Agile Software Engineering Practices in ERP Implementation." In Information Systems, 279–90. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44322-1_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sølvberg, Arne, and David Chenho Kung. "Rule Modeling." In Information Systems Engineering, 201–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78001-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Information warfare. Systems engineering"

1

Demuth, S., J. Felini, J. Gerloff, Maim J, N. Swingle, P. Harton, and B. Horowitz. "An urban warfare application of systems engineering for the first derivative." In s and Information Engineering Design Symposium. IEEE, 2005. http://dx.doi.org/10.1109/sieds.2005.193283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dewoody, Robert, Jacob Hayes, Nick Isnardi, Joseph Kalinka, and L. T. C. Edward Teague. "Irregular warfare models for regional stability development." In 2014 Systems and Information Engineering Design Symposium (SIEDS). IEEE, 2014. http://dx.doi.org/10.1109/sieds.2014.6829898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Guo, Rui, and Bu-Yun Wang. "Measuring Complexity of Modern Sea-Warfare System." In 2010 International Conference of Information Science and Management Engineering. IEEE, 2010. http://dx.doi.org/10.1109/isme.2010.224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nastiti, Faulinda Ely, Rina Arum Prastyanti, Restiadi Bayu Taruno, and Dedy Hariyadi. "Social Media Warfare in Indonesia Political Campaign: A Survey." In 2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE). IEEE, 2018. http://dx.doi.org/10.1109/icitisee.2018.8720959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gao, Ying, Lei Lei, Xiuliang Wang, Puzhao Zhang, and Shuxia Guo. "Design and Realization of Virtual Scene System in UAV Electronic Warfare." In 2009 International Conference on Information Engineering and Computer Science. IEEE, 2009. http://dx.doi.org/10.1109/iciecs.2009.5366091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Karnik, M. V., S. K. Gupta, D. K. Anand, F. J. Valenta, and I. A. Wexler. "Design Navigator System: A Case Study in Improving Product Development Through Improved Information Management." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84901.

Full text
Abstract:
This paper provides an overview of the Design Navigator system being developed for the Naval Surface Warfare Center, Indian Head. This system addresses the following three information management needs. First, it captures all the relevant information being generated during the product development process in a computer-interpretable form. This eliminates information loss from the design process. Second, it builds fully interconnected information models. Thus ensuring full connectivity between requirements and specifications to various parts and assemblies in the design. Third, it offers multiple modes of searching and retrieving design information in an intuitive and convenient manner. By supporting functionality-based queries, change-based queries, geometry-based queries, and visual navigation of the entire product database, the Design Navigator system is expected to offer maximum flexibility and power to the designers to meet their diverse information retrieval needs.
APA, Harvard, Vancouver, ISO, and other styles
7

Rowley, C., and G. Ford. "Digitally Empowering Naval Fleet Support." In 14th International Naval Engineering Conference and Exhibition. IMarEST, 2018. http://dx.doi.org/10.24868/issn.2515-818x.2018.058.

Full text
Abstract:
Throughout history, the Royal Navy (RN) has invested in technical innovation to gain warfare advantage over its opponents. However, innovation often comes with change to the asset design, its operation and through life support. The most obvious example was during the turn of the 20th century when the RN moved from coal to oil powered propulsion systems, resulting in a major change to the skills of the crew and the support chain. The demands placed on the RN have continued to grow during the 21st century, with a fleet of highly complex surface ships and submarines that provide the UK conventional and nuclear strike capability. This paper explains how warfare advantage can be further improved by information exploitation that is targeted at the improvement of fleet availability, capability and safety by empowering the operator and its shore-side support organisation. The projects described in this paper have been developed in collaboration with the RN as part of the Maritime Support Information Exploitation Strategy (known as MarSIX). The paper therefore discusses the information principles used within Babcock’s Support Strategy to deliver Navy Command’s MarSIX vision.
APA, Harvard, Vancouver, ISO, and other styles
8

Welling, Douglas M., and Dean B. Edwards. "Multiple Autonomous Underwater Crawler Control for Mine Reacquisition." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81716.

Full text
Abstract:
Autonomous Underwater Vehicles (AUVs) are currently being used by the Navy for mine countermeasures. AUVs include both submarine and tracked crawlers. Recent search strategies have been implemented using both submarines and crawlers; submarines to sweep large areas to detect possible mines, and crawler to re-acquire the possible mines and perform classification. The primary scope of this paper is the control strategies for the crawlers to best cover an area. Both a motion controller and a mine reacquisition scheduling system were developed. Simulations were performed using Autonomous Littoral Warfare Systems Evaluator - Monte Carlo (ALWSEMC) to complete studies on optimal crawler control strategies. These simulations included 1 submarine and 3 crawlers. Two reacquisition scheduling systems were compared, one using a closest target strategy, and one using fuzzy logic that used additional information available to the crawler to best utilize time and resources. It was found that a fuzzy logic scheduling system outperformed the baseline system by reducing the amount of time to reacquire all targets.
APA, Harvard, Vancouver, ISO, and other styles
9

Manley, Richard J., Dennis G. Gallagher, William W. Hughes, and Allie M. Pilcher. "Divers Augmented Vision Display (DAVD)." In ASME 2017 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/imece2017-70026.

Full text
Abstract:
Military diving operations are routinely conducted in what can be one of the most inhospitable environments on the planet, frequently characterized by zero visibility. The inability to clearly see the immediate operational environment has historically been a serious limitation to manned diving operations — whether the mission is ship husbandry, under water construction, salvage, or scientific research. U.S. Navy diving is an integral part of the nation’s defense strategy with a continuing requirement to conduct manned intervention in the water column. To ensure technical superiority across the entire spectrum of diving operations we must identify, exploit, and de velop technology to advance the state-of-the-art in diving equipment. This can only be achieved by investing in, and supporting, focused research and development with specific goals to further diving capabilities. Under a project sponsored by the Office of Naval Research (ONR) and Naval Sea Systems Command (NAVSEA), the Naval Surface Warfare Center-Panama City Division (NSWC PCD) has de veloped a prototype see-through head-up display system for a U. S. Navy diving helmet — the Divers Augmented Vision Display (DAVD). The DAVD system uses waveguide optical display modules that couple images from a micro display into a waveguide optic, translate the images through a series of internal reflections, finally exiting toward the diver’s eye providing a magnified, see-through virtual image at a specific distance in front of the diver. The virtual images can be critical information and sensor data including sonar images, ship husbandry and underwater construction schematics, enhanced navigation displays, augmented reality, and text messages. NSWC PCD is the U.S. Navy’s leading laboratory for research, development, testing, evaluation, and technology transition of diver visual display systems; with unique facilities for rapid prototyping and manufacturing, human systems integration and extreme environment testing. Along with NSWC PCD, the Navy Experimental Diving Unit (NEDU), and Naval Diving and Salvage Training Center (NDSTC) are co-located tenant commands at the Naval Support Activity Panama City (NSA PC). This paper provides a brief background on the development of diver head-up display systems, waveguide optical display technology, development of the DAVD prototype, results of diver evaluations, and recommendations for accelerated development of this game changing capability.
APA, Harvard, Vancouver, ISO, and other styles
10

Xiangyong Chen, Yuanwei Jing, Chunji Li, Nan Jiang, and G. M. Dimirovski. "Effectiveness evaluation of warfare command systems with dissymmetrical warfare information." In 2010 American Control Conference (ACC 2010). IEEE, 2010. http://dx.doi.org/10.1109/acc.2010.5531011.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Information warfare. Systems engineering"

1

Wood, Robert J. Information Engineering the Foundation of Information Warfare,. Fort Belvoir, VA: Defense Technical Information Center, April 1995. http://dx.doi.org/10.21236/ada329024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Renner, Scott. Building Information Systems for Network-Centric Warfare. Fort Belvoir, VA: Defense Technical Information Center, June 2003. http://dx.doi.org/10.21236/ada466409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gatley, Eric, Ian Grado, Edwin Salipande, and Daniel Remiker. Scenario-Based Systems Engineering Application to Mine Warfare. Fort Belvoir, VA: Defense Technical Information Center, December 2015. http://dx.doi.org/10.21236/ad1009269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gneiting, B. C. ,. Westinghouse Hanford. TWRS systems engineering process and information model report. Office of Scientific and Technical Information (OSTI), May 1996. http://dx.doi.org/10.2172/664387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roussopoulos, Nick, Timos Sellis, Leo Mark, and Christos Faloutsos. Design Issues For High Performance Engineering Information Systems. Fort Belvoir, VA: Defense Technical Information Center, April 1992. http://dx.doi.org/10.21236/ada264839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Heminger, Alan R. Collaborative Early Systems Engineering: Strategic Information Management Review. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada544695.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Van Slyke, D. A. System Engineering Analysis For Improved Scout Business Information Systems. Office of Scientific and Technical Information (OSTI), January 2017. http://dx.doi.org/10.2172/1343825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Flach, John, and Golbert G. Kuperman. Victory by Design: War, Information, and Cognitive Systems Engineering. Fort Belvoir, VA: Defense Technical Information Center, February 1998. http://dx.doi.org/10.21236/ada358305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

CORPS OF ENGINEERS WASHINGTON DC. Engineering and Design: Information Systems Design in Support of Military Construction. Fort Belvoir, VA: Defense Technical Information Center, April 1992. http://dx.doi.org/10.21236/ada404012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

DEPARTMENT OF DEFENSE WASHINGTON DC. Department of Defense Handbook: Human Engineering Guidelines for Management Information Systems. Fort Belvoir, VA: Defense Technical Information Center, September 1989. http://dx.doi.org/10.21236/ada240617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography