Dissertations / Theses on the topic 'Information warfare. Systems engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Information warfare. Systems engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Smith, Chad M. "Optimizing Navy information warfare a systems engineering approach." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FSmith_Chad.pdf.
Full textThesis Advisor(s): Elliot, Raymond A. "September 2008." Description based on title screen as viewed on November 4, 2008. Includes bibliographical references (p. 61-63). Also available in print.
Rios, Cesar G. "Return on investment analysis of information warfare systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FRios.pdf.
Full textMcNabb, Marcus E. "Optimizing the routher configurations within a nominal Air Force base." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMcNabb.pdf.
Full textThesis Advisor(s): Elliott, Ray ; Rasmussen, Craig. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Network Architecture; Graph Theory; Spanning Tree; Network Security Includes bibliographical references (p. 45). Also available in print.
Kucukozyigit, Ali Can. "Electronic Warfare (EW) historical perspectives and its relationship to Information Operations (IO)-considerations for Turkey." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/10154.
Full textPetersson, Björn. "Modeling of a Retrodirective Channel With Active Antenna Arrays for Cross-Eye Jamming." Licentiate thesis, KTH, Elektroteknisk teori och konstruktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217232.
Full textCross-eye (CE) är en störprincip som har potential att inducera vinkelmätfel i radar. Dess möjlighet att störa monopulsradar, en vanligt förekommande typ av radar som är motståndskraftig mot många störformer, har skapat ett intresse för metoden hos tillverkare av system för elektronisk krigföring (EW-system). Användning av CE störning i ett EW-system skulle kunna öka möjligheten till självskydd vid attack från en monopulsradarstyrd robot. Avhandlingen analyserar en modell av en retrodirektiv CE störare som är avsedd för integration i ett multifunktionellt EW-system. Fokus i analysen är på de aktiva gruppantennerna (AESA) som används i systemet. En elektrisk modell av systemet används, vilken inkluderar variationer i parametrar hos AESA samt tre olika systemkorrektionsmetoder. En simuleringsprocedur som ger möjlighet att uppskatta reciprocitetsfel och känslighet för parametervariationer i AESA är definierad. Vidare undersöks inverkan av karaktäriserings och kalibreringsbrus. Modellens användningsområden visas i olika typer av prestandasimulering där effekter av de olika systemkorrektionsmetoderna tydliggörs. Simuleringsresultat för enkelfrekvens (CW) signaler visar en relativt hög nivå av reciprocitet om brus och olinjäriteter ignoreras. Det förväntade resultatet, att elektriska skillnader mellan mottagar- och sändargrenarna orsakar en försämring i reciprocitet, bekräftas. Inverkan av karaktäriserings och kalibreringsbrus verkar vara en dominerande faktor i det totala reciprocitetsfelet då rimliga brusnivåer används. En signifikant höjning av reciprocitetsfelet kan sannolikt förväntas då signaler med en viss bandbredd används och då rimliga nivåer av brus samt olinjäriteter inkluderas.
QC 20171102
Johnson, Allen P., Bryan Breeden, Willard Earl Duff, Paul F. Fishcer, Nathan Hornback, David C. Leiker, Parker Carlisle, et al. "Ship Anti Ballistic Missile Response (SABR)." Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/7268.
Full textBased on public law and Presidential mandate, ballistic missile defense development is a front-burner issue for homeland defense and the defense of U.S. and coalition forces abroad. Spearheaded by the Missile Defense Agency, an integrated ballistic missile defense system was initiated to create a layered defense composed of land-, air-, sea-, and space-based assets. The Ship Anti-Ballistic Response (SABR) Project is a systems engineering approach that suggests a conceptualized system solution to meet the needs of the sea portion of ballistic missile defense in the 2025-2030 timeframe. The system is a unique solution to the sea-based ballistic missile defense issue, combining the use of a railgun interceptor and a conformable aperture skin-of-the-ship radar system.
Wang, Kenny NMN. "Information warfare targeting : people and processes /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FWang.pdf.
Full textThesis advisor(s): Dan C. Boger, Raymond Buettner. Includes bibliographical references (p. 49-52). Also available online.
Tan, Peihao Raymond. "Applying systems thinking towards countering hybrid warfare." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121799.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 121-124).
Carl von Clausewitz, a famous Prussian general and military theorist asserted that war's nature of being violent, interactive, and fundamentally political, does not change - only its character does. According to Clausewitz, the character of war is a dynamic phenomenon that manifests differently with the "spirit" of each age. In our current digital age, technology has heavily influenced interactions, including warfare. In addition to boosting traditional military means, technology has enabled rapid and widespread weaponization of social, information and infrastructural instruments for political coercion. A rising trend of combining national instruments of power to wage war simultaneously across the political, military, economic, social, information and infrastructural domains is a rapidly emerging threat, characteristic of modem "hybrid wars" being fought today. Traditional military-centric defense policies and strategies are ill-prepared to address such threats that deliberately operate in the "grey zone", playing on ambiguity and tailoring coercion to remain just below detection and response thresholds. In this research, a combination of literature review, descriptive study, inductive approach, normative research, case study and systems thinking are applied to analyze the hybrid warfare threat and then construct a suitable response framework, treating it as system with interrelated constituent parts, synergistically working together over time, within the wider international context, to deliver an emergent counter hybrid warfare capability.
by Peihao Raymond Tan.
S.M. in Engineering and Management
S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program
Oliveria, Tristan V., James W. Beaver, Pedro R. Mercado, Andrew D. Bucher, Jennifer M. Free, and Richard W. Byers. "Systems analysis of alternative architectures for Riverine Warfare in 2010." Thesis, Monterey, California, 2006. http://hdl.handle.net/10945/2361.
Full textIncludes supplementary material.
This thesis analyzed the Navy's proposed Riverine Force (RF) structure and capabilities of 2006. Systems Engineering and Analysis cohort 10 (SEA10) developed a cost-effective system of systems which increased battlespace awareness and situational responsiveness for 2010. Riverine missions were decomposed into their functional, physical, and operational architectures using the detect-to-engage sequence. This analysis determined critical RF functions. Critical functions detect and engage were then physically represented by feasible force package alternatives that augmented the baseline RF. SEA10 analyzed these alternatives using agent based models to identify baseline RF capability gaps and provide insights into possible solutions. Reduction of modeling data indicated the baseline force was as effective as some upgraded force packages depending on the measure of performance (MOP) or scenario structure under scrutiny. Sensor augmentation demonstrated significant improvements to baseline performance by increasing battlespace awareness. Weapon augmentation alone did not significantly improve baseline performance by increasing situational responsiveness. Combined sensor-weapon augmentation performed well across all MOP and scenarios. The Unmanned Surface Vehicle (USV) was the most cost-effective alternative. Dedicated helicopter support demonstrated the best performance overall, but was the most costly alternative.
Mullis, William S. "Using the acquisition process to reduce the vulnerability of future systems to information warfare." Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/9119.
Full textInformation warfare (IW) is a growing concern for the United States Army. The sophisticated, high-technology modern weapons systems upon which the U.S. Army heavily relies are increasing vulnerable to IW weapons and tactics. The acquisition process plays a major role in reducing defense systems IW vulnerability. This research identifies the primary IW threats to systems during the acquisition lifecycle and what factors in the acquisition environment contribute to IW vulnerability. This research also suggests a technique for integrating IW countermeasures into the defense systems acquisition process. A primary finding of this research is that while a Program Management Office (PMO) can institute a myriad of useful countermeasures, influencing the prime contractor to establish a secure development environment is the most important action it can take in reducing the vulnerability of future systems to IW
Huffaker, Jacob A. "The benefit of 802.20 technologies on information flow in network centric warfare." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FHuffaker.pdf.
Full textThesis Advisor(s): Alex Bordetsky, Dan Boger. Includes bibliographical references (p. 55-56). Also available online.
Hibbert, Kirk R. "A need for systems architecture approach for next generation mine warfare capability." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FHibbert.pdf.
Full textThesis Advisor(s): John Osmundson, Martha Jallim Hall. "September 2006." Includes bibliographical references (p. 79-83). Also available in print.
Ulama, Tuncay. "Frequency and polarization diversity jamming of communications in urban environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FUlama.pdf.
Full textDiamond, Scott M. "Aerially deployed real-time targeting sensor net." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FDiamond.pdf.
Full textKamsah, M. Z. K. "Process engineering information management systems." Thesis, Swansea University, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637752.
Full textOzcan, Fuzuli. "An Approach For Defensive Information Warfare In The Turkish Land Forces Command." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/260268/index.pdf.
Full textWalter, Paul G. "A model for effective systems engineering workforce development at Space and Naval Warfare Systems Center (SSC) Atlantic." Thesis, Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37738.
Full textThis thesis describes a methodology used to develop a systems engineering (SE) competency framework for Space and Naval Warfare Systems Center (SSC) Atlantica Department of Navy organization whose vision statement is to Make IT count for the Warfighter and the Nation. This methodology defines the role of systems engineers at SSC Atlantic; establishes prioritized SE competency areas; identifies associated knowledge, skills and abilities (KSAs); identifies optimal workforce development methods for each KSA; and addresses how to assess systems engineers against a competency development model. The results of this analysis show that systems engineers require many of the same KSAs as other members of the engineering workforce, but also require unique KSAs focused on customer mission/capability areas, technology areas, SE processes/activities and leadership skills. Developmental methods for systems engineers to obtain these KSAs range from informal on-the-job training to professional certifications and degrees. The methodology established in this thesis can be used by other organizations to develop and employ their own competency framework in practically any discipline. The SE competency framework defined in this thesis can be leveraged/tailored by other SE organizations in order to establish developmental roadmaps for improving the KSAs of their workforce.
Jones, Michael L. "Measuring customer and employee loyalty at Space and Naval Warfare Systems Center Charleston." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJones%5FMichael.pdf.
Full textThesis Advisor(s):Laurie Anderson, Carol Smith. Includes bibliographical references (p. 109-11). Also available online.
Vanmarcke, Lieven L. (Lieven Ludwig). "Defining flexibility for information systems." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/14597.
Full textKang, Yun Kyu. "Information inaccuracy in inventory systems." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/36193.
Full textIncludes bibliographical references (p. 127-129).
It is critically important for inventory-carrying facilities to provide high availability of products at the minimal operating cost. To achieve this objective, many companies have automated their inventory operations and rely on the information system in critical decision makings. However, if the information is inaccurate, it may lead to high out-of-stocks and/or excess inventory. This thesis examines what the primary causes of the inaccuracy are, how and to what extent they degrade the inventory system performance, and what can be done to compensate for the inaccuracy. Analytical and simulation modelling demonstrate that the inventory system performance is highly sensitive to the inaccuracy caused by stock loss, which is the disappearance of items (such as due to theft) not detected by the information system. That is, even a small level of stock loss accumulated over time can lead to inventory inaccuracy that disrupts the replenishment process and creates severe out-of-stocks. In fact, revenue losses due to out-of-stocks can far outweigh the property losses due to the disappearing items.
(cont.) One way to deal with the inaccuracy problem is the use of RFID-based automatic product identification technology under development at the Auto-ID Center, which can provide the real-time and accurate information regarding the location and quantity of objects in supply chain. It is found that even when this technology provides imperfect measurement of the stock quantity, dramatic performance improvement can be achieved using an inventory control scheme based on dynamic programming. Various other methods of compensating for the inventory inaccuracy are presented and evaluated. Analysis of each method reveals that the inventory inaccuracy problem can be effectively treated even without automatic identification technology in some situations. However, each method has weaknesses.
by Yun Kang.
Ph.D.
Gualtier, Kenneth. "Information Operations Under International Law: A Delphi Study Into the Legal Standing of Cyber Warfare." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/320.
Full textAng, Wee Horng. "Scale-free information systems networks." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/34554.
Full textIncludes bibliographical references (leaves 77-79).
Many real, complex networks have been shown to be scale-free. Scale-free in networks mean that their degree distribution is independent of the network size, have short path lengths and are highly clustered. We identify the qualities of scale-free networks, and discuss the mathematical derivations and numerically simulated outcomes of various deterministic scale-free models. Information Systems networks are a set of individual Information Systems that exchange meaningful data among themselves. However, for various reasons, they do not naturally grow in a scale-free manner. In this topic, we will specifically examine a technique proposed by MITRE that allows information to be exchanged in an efficient manner between Information System nodes. With this technique, we will show that a scale-free Information System Network is sound in theory and practice, state the characteristics of such networks and demonstrate how such a system can be constructed.
by Wee Hong Ang.
S.M.
Makhdoumi, Ali (Makhdoumi Kakhaki). "Information provision in rating systems and traffic systems." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/120426.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 133-141).
This thesis studies information provision in two contexts: online rating systems and traffic information systems. In the first part of the thesis, we develop a model of Bayesian learning from online reviews and investigate the conditions for asymptotic learning of the quality of a product. Moreover, we characterize the speed of learning under different rating systems and characterize the impact of information provision on the speed of learning. In the model, a sequence of potential customers after observing the ratings of the product, and based on their ex ante valuation, decide whether to purchase. If they purchase, the true quality of the product, their ex ante valuation and ex post valuation determine their overall satisfaction. Given the rating system of the platform, they decide to leave a review as a function of their overall satisfaction. We study learning dynamics under two classes of rating systems: full history, where customers see the full history of reviews, and summary statistics, where the platform reports some summary statistics of past reviews. In both cases, we characterize the asymptotic speed of learning and show that the incentivizes of the platform is aligned with maximizing the speed of learning. We then study the design of rating systems in terms of information collection and information provision schemes. In particular, we identify situations in which providing more information leads to slower learning. In the second part of the thesis, we develop a framework for systematically analyzing how changes in the information sets of users in a traffic network (e.g., due to route guidance systems) impact the traffic equilibrium, and show the conditions under which even those with access to additional information may suffer greater congestion. To this regard, we first introduce a new class of congestion games in which users have differing information sets about the available edges and can only use routes consisting of edges in their information set. We then define the notion of information constrained Wardrop equilibrium for this class of congestion games and establish its existence and uniqueness. Finally, we turn to our main question formulated in the forms of Informational Braess' Paradox (IBP), which extends the classic Braess' Paradox in traffic equilibria. IBP asks whether users receiving additional information can become worse off. We provide a comprehensive answer to this question by providing a tight characterization of network topologies under which IBP emerges.
by Ali Makhdoumi.
Ph. D.
Galal, Galal Hassan. "An interpretive approach to information systems engineering (using the grounded systems engineering methodology)." Thesis, Brunel University, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285051.
Full textShahri, Alimohammad. "Engineering motivation requirements in business information systems." Thesis, Bournemouth University, 2017. http://eprints.bournemouth.ac.uk/29960/.
Full textEngström, Olof, and Tigerström Gabriel Lördal. "Improving usability of land warfare simulator: pathfinding and adaptive speed based on geographic data." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211551.
Full textSANDIS II är ett simuleringsoch analysverktyg utvecklat av Finska Försvarsmaktens Forskningsanstalt. Svenska Totalförsvarets forskningsinstitut har utvärderat SANDIS II och funnit ett potentiellt användningsområde för verktyget som stöd vid krigsspel, inom utbildning vid Försvarshögskolan. Verktyget anses dock vara för svårhanterligt för att uppfylla detta syfte. I denna rapport föreslås metoder för att beräkna de snabbaste förflyttningsvägarna i terräng och att automatiskt justera enheters hastighet i simulatorn, baserat på geografisk data. Vi konstruerar ett kostnadsraster av olika typer av terrängdata, där varje ruta i rastret tilldelas ett värde som representerar framkomlighet. Med kostnadsraster som grund skapar vi sedan modeller för att kunna justera enheters hastigheter och beräkna framryckningsrutter med så låg kostnad som möjligt. Vi implementerar modellerna i en separat Python-modul och beskriver modulens interna metoder, gränssnitt och hur det kan användas av SANDIS II.
Salahat, Mohammed Hasan. "Information systems development through an integrated framework." Thesis, University of Huddersfield, 2016. http://eprints.hud.ac.uk/id/eprint/34432/.
Full textCaithness, Ian Peter. "Management of an information systems (IS) department." Master's thesis, University of Cape Town, 1985. http://hdl.handle.net/11427/7601.
Full textThis thesis discusses the principles relating to the management of an Information Systems (IS) department. To be effective an IS service must support the ultimate goals of the organization directly. In this regard, user acceptance of the services offered is essential. In addition, economic justification and verification of the technical feasibility of an. IS project is essential to ensuring minimum wasted effort, management's commitment to the project.
Mathieson, John T. J. "Towards Polymorphic Systems Engineering." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28257912.
Full textAmbraziūnas, Martas. "Enterprise model based MDA information systems engineering method." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20141111_114310-77387.
Full textŠiuolaikiniai IS inžinerijos metodai yra nuolat vystomi ir tobulinami, tačiau iš esmės jie yra grindžiami empiriniais procesais. Empiriškai išgautų žinių kokybė gali būti nepakankama sėkmingam projekto įgyvendinimui, nes netikslus vartotojo reikalavimų specifikavimas neigiamai įtakoja visus programinės įrangos kūrimo etapus, o tai didina projekto įgyvendinimo riziką. Disertacinis darbas skirtas sukurti IS inžinerijos metodą, kuris įgalintų empiriniais būdais surinktas dalykinės srities žinias patikrinti formalių kriterijų atžvilgiu. Metodui sukurti buvo apjungti žiniomis grindžiamos ir modeliais grindžiamos IS inžinerijos principai. Šiuo tikslu klasikinis MDA procesas buvo papildytas pagrindiniu žiniomis grindžiamos IS inžinerijos komponentu – veiklos modeliu. Darbo metu buvo sukurtas žiniomis grindžiamo MDA metodo dalykinės programos prototipas, kuris iš dalies automatizuoja siūlomo metodo procesą. Žiniomis grindžiamo MDA metodo efektyvumas buvo patikrintas jį taikant eksperimentinio tyrimo atlikimui, kurio metu buvo sukurta pašto siuntų stebėjimo programėlė. Tyrimo metu nustatyta, kad tikslinga taikyti žiniomis grindžiamą MDA metodą PĮ kūrime nes: 1) detaliau dokumentuojami vartotojo reikalavimai (tikrinami formalių kriterijų atžvilgiu); 2) sumažinama loginių trūkių atsiradimo galimybė (tarp programinės įrangos kūrimo dalyvių); 3) daugiaplatforminiuose sprendimuose sumažinamos projekto įgyvendinimo laiko sąnaudos (dėka automatinio kodo generavimo iš patikrintų modelių).
Hosseini, Moghaddam Seyed Mahmood. "Engineering of transparency requirements in business information systems." Thesis, Bournemouth University, 2016. http://eprints.bournemouth.ac.uk/25349/.
Full textPanokarren, Clifford L. "Information model for engineering change management." FIU Digital Commons, 2004. https://digitalcommons.fiu.edu/etd/3949.
Full textCohen, Aaron Seth 1974. "Information theoretic analysis of watermarking systems." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/16791.
Full textIncludes bibliographical references (p. 185-193).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Watermarking models a copyright protection mechanism where an original data sequence is modified before distribution to the public in order to embed some extra information. The embedding should be transparent (i.e., the modified data should be similar to the original data) and robust (i.e., the information should be recoverable even if the data is modified further). In this thesis, we describe the information-theoretic capacity of such a system as a function of the statistics of the data to be watermarked and the desired level of transparency and robustness. That is, we view watermarking from a communication perspective and describe the maximum bit-rate that can be reliably transmitted from encoder to decoder. We make the conservative assumption that there is a malicious attacker who knows how the watermarking system works and who attempts to design a forgery that is similar to the original data but that does not contain the watermark. Conversely, the watermarking system must meet its performance criteria for any feasible attacker and would like to force the attacker to effectively destroy the data in order to remove the watermark. Watermarking can thus be viewed as a dynamic game between these two players who are trying to minimize and maximize, respectively, the amount of information that can be reliably embedded. We compute the capacity for several scenarios, focusing largely on Gaussian data and a squared difference similarity measure.
(cont.) In contrast to many suggested watermarking techniques that view the original data as interference, we find that the capacity increases with the uncertainty in the original data. Indeed, we find that out of all distributions with the same variance, a Gaussian distribution on the original data results in the highest capacity. Furthermore, for Gaussian data, the capacity increases with its variance. One surprising result is that with Gaussian data the capacity does not increase if the original data can be used to decode the watermark. This is reminiscent of a similar model, Costa's "writing on dirty paper", in which the attacker simply adds independent Gaussian noise. Unlike with a more sophisticated attacker, we show that the capacity does not change for Costa's model if the original data is not Gaussian.
by Aaron Seth Cohen.
Ph.D.
Heitmann, Dawn M. (Dawn Marie). "An analysis of community information systems." Thesis, Massachusetts Institute of Technology, 1987. http://hdl.handle.net/1721.1/115042.
Full textLouie, Raymond (Raymond T. ). 1976. "Hybrid intelligent systems integration into complex multi-source information systems." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86533.
Full textIncludes bibliographical references (leaves 98-100).
by Raymond Louie.
S.B.and M.Eng.
Ortolan, Riccardo. "Software engineering of Arduino based art systems." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14138.
Full textScudieri, Paul Anthony. "Information in Complex Product Systems." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1236698805.
Full textLee, Sungjoon. "Evaluation of real-time bus arrival information systems /." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488191667181044.
Full textAlmalohi, Mussaad. "Implementing Health Information Exchange System: Saudi Arabia." Digital Commons at Loyola Marymount University and Loyola Law School, 2015. https://digitalcommons.lmu.edu/etd/350.
Full textBurstein, Leah. "Legacy Student Information System: Replacement or Enhancement?" Digital Commons at Loyola Marymount University and Loyola Law School, 2016. https://digitalcommons.lmu.edu/etd/376.
Full textHamstra, Eric J. "Information operations in Iraq the Mufsiddoon versus the U.S. and Coalition forces /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491182.
Full textCappellaro, Paola. "Quantum information processing in multi-spin systems." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/41282.
Full textIncludes bibliographical references (p. 133-142).
Coherence and entanglement in multi-spin systems are valuable resources for quantum information processing. In this thesis, I explore the manipulation of quantum information in complex multi-spin systems, with particular reference to Nuclear Magnetic Resonance implementations. In systems with a few spins, such as molecules in the liquid phase, the use of multi-spin coherent states provides a hedge against the noise, via the encoding of information in logical degrees of freedom distributed over several spins. Manipulating multi-spin coherent states also increases the complexity of quantum operations required in a quantum processor. Here I present schemes to mitigate this problem, both in the state initialization, with particular attention to bulk ensemble quantum information processing, and in the coherent control and gate implementations. In the many-body limit provided by nuclear spins in single crystals, the limitations in the available control increase the complexity of manipulating the system; also, the equations of motion are no longer exactly solvable even in the closed-system limit. Entanglement and multi-spin coherences are essential for extending the control and the accessible information on the system. I employ entanglement in a large ensemble of spins in order to obtain an amplification of the small perturbation created by a single spin on the spin ensemble, in a scheme for the measurement of a single nuclear spin state. I furthermore use multiple quantum coherences in mixed multi-spin states as a tool to explore many-body behavior of linear chain of spins, showing their ability to perform quantum information processing tasks such as simulations and transport of information.
(cont.) The theoretical and experimental results of this thesis suggest that although coherent multi-spin states are particularly fragile and complex to control they could make possible the execution of quantum information processing tasks that have no classical counterparts.
by Paola Cappellaro.
Ph.D.
Velasco, Diego. "Full spectrum information operations and the information professional officer intermediate qualification process : filling the gap to ensure the continued leadership of the information professional community in the area of information dominance /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FVelasco.pdf.
Full textMycroft, Matthew. "An Information System for Health Care Quality Measures." Digital Commons at Loyola Marymount University and Loyola Law School, 2016. https://digitalcommons.lmu.edu/etd/426.
Full textMcCamant, Stephen. "Quantitative information-flow tracking for real systems." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44903.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 99-105).
An information-flow security policy constrains a computer system's end-to-end use of information, even as it is transformed in computation. For instance, a policy would not just restrict what secret data could be revealed directly, but restrict any output that might allow inferences about the secret. Expressing such a policy quantitatively, in terms of a specific number of bits of information, is often an effective program independent way of distinguishing what scenarios should be allowed and disallowed. This thesis describes a family of new techniques for measuring how much information about a program's secret inputs is revealed by its public outputs on a particular execution, in order to check a quantitative policy on realistic systems. Our approach builds on dynamic tainting, tracking at runtime which bits might contain secret in formation, and also uses static control-flow regions to soundly account for implicit flows via branches and pointer operations. We introduce a new graph model that bounds information flow by the maximum flow between inputs and outputs in a flow network representation of an execution. The flow bounds obtained with maximum flow are much more precise than those based on tainting alone (which is equivalent to graph reachability). The bounds are a conservative estimate of channel capacity: the amount of information that could be transmitted by an adversary making an arbitrary choice of secret inputs. We describe an implementation named Flowcheck, built using the Valgrind framework for x86/Linux binaries, and use it to perform case studies on six real C, C++, and Objective C programs, three of which have more than 250,000 lines of code. We used the tool to check the confidentiality of a different kind of information appropriate to each program. Its results either verified that the information was appropriately kept secret on the examined executions, or revealed unacceptable leaks, in one case due to a previously unknown bug.
by Stephen Andrew McCamant.
Ph.D.
Lee, Hyun Seop. "Requirement analysis framework of naval military system for expeditionary warfare." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50403.
Full textHasegawa, Marnie Tardieu. "Systems engineering design for operations directorate administrative information system." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-10242009-020024/.
Full textHodges, Jonathan Stuart. "Engineering coherent control of quantum information in spin systems." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/44781.
Full textIncludes bibliographical references (p. 151-161).
Quantum Information Processing (QIP) promises increased efficiency in computation. A key step in QIP is implementing quantum logic gates by engineering the dynamics of a quantum system. This thesis explores the requirements and methods of coherent control in the context of magnetic resonance for: (i) nuclear spins of small molecules in solution and (ii) nuclear and electron spins in single crystals. The power of QIP is compromised in the presence of decoherence. One method of protecting information from collective decoherence is to limit the quantum states to those respecting the symmetry of the noise. These decoherence-free subspaces (DFS) encode one logical quantum bit (qubit) within multiple physical qubits. In many cases, such as nuclear magnetic resonance (NMR), the control Hamiltonians required for gate engineering leak the information outside the DFS, whereby protection is lost: It is shown how one can still perform universal logic among encoded qubits in the presence of leakage. These ideas are demonstrated on four carbon-13 spins of a small molecule in solution. Liquid phase NMR has shortcomings for QIP, like the lack of strong measurement and low polarization. These two problems can be addressed by moving to solid-state spin systems and incorporating electron spins. If the hyperfine interaction has an anisotropic character, it is proven that the composite system of one electron and N nuclear spins (le-Nn) is completely controllable by addressing only to the electron spin. This 'electron spin actuator' allows for faster gates between the nuclear spins than would be achievable in its absence. In addition, a scheme using logical qubit encodings is proposed for removing the added decoherence due to the electron spin. Lastly, this thesis exemplifies arbitrary gate engineering in a le-ln ensemble solid-sate spin system using a home-built ESR spectrometer designed specifically for engineering high-fidelity quantum control.
by Jonathan Stuart Hodges.
Ph.D.
Unciano, Conrad Vance. "The systems engineering development of an intelligence information system." Master's thesis, Virginia Tech, 1996. http://hdl.handle.net/10919/46376.
Full textRajaram, Srinath. "Multilayer Nanomagnetic Systems for Information Processing." Scholar Commons, 2014. http://scholarcommons.usf.edu/etd/5109.
Full text