To see the other types of publications on this topic, follow the link: Information warfare. Systems engineering.

Dissertations / Theses on the topic 'Information warfare. Systems engineering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Information warfare. Systems engineering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Smith, Chad M. "Optimizing Navy information warfare a systems engineering approach." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FSmith_Chad.pdf.

Full text
Abstract:
Thesis (M.S. in Information Warfare Systems Engineering)--Naval Postgraduate School, September 2008.
Thesis Advisor(s): Elliot, Raymond A. "September 2008." Description based on title screen as viewed on November 4, 2008. Includes bibliographical references (p. 61-63). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Rios, Cesar G. "Return on investment analysis of information warfare systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FRios.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McNabb, Marcus E. "Optimizing the routher configurations within a nominal Air Force base." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FMcNabb.pdf.

Full text
Abstract:
Thesis (M.S. in Information Warfare Systems Engineering and M.S. in Applied Mathematics)--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Elliott, Ray ; Rasmussen, Craig. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Network Architecture; Graph Theory; Spanning Tree; Network Security Includes bibliographical references (p. 45). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Kucukozyigit, Ali Can. "Electronic Warfare (EW) historical perspectives and its relationship to Information Operations (IO)-considerations for Turkey." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/10154.

Full text
Abstract:
The purpose of this thesis is the exploration of the relationship and interaction between Electronic Warfare (EW) and Information Operations (IO) core, supporting and related competencies. Understanding the definitions of information and its value, information superiority, and the decision making cycle provides the foundation for the thesis. Investigation of the historical transformation of EW from the U.S. Civil War to the First Gulf War, and also examining how the concept of IO has developed and evolved contributes to this study by helping to comprehend the modern day interaction between EW and each IO competency separately. This interaction is constructed upon the guidance and standards provided by the latest U.S. Joint Chiefs of Staff Publication Joint Publication 3-13 Information Operations. This study concludes that the relationship between EW and IO is increasingly interactive and consists of two aspects: limiting and interfering, and reinforcing and supporting. Also, the relationship between EW and each IO competency is not consistent between the core and supporting competencies. In addition to these conclusions, this study expresses some considerations for EW and IO applications with respect to the unique environment and requirements of the Turkish Republic.
APA, Harvard, Vancouver, ISO, and other styles
5

Petersson, Björn. "Modeling of a Retrodirective Channel With Active Antenna Arrays for Cross-Eye Jamming." Licentiate thesis, KTH, Elektroteknisk teori och konstruktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217232.

Full text
Abstract:
Cross-Eye (CE) jamming is a technique aimed at inducing false target angles in radar measurements. The potential to deceive monopulse radar, a radar type commonly used due to its angular accuracy and resilience against jamming, has captured the interest of Electronic Warfare (EW) system manufacturers. CE jamming may increase the capability of self-defense against radar guided missiles. In this thesis, a CE jammer, based on the retrodirective channel design, for use in an EW systems is modeled and analyzed. The focus of the analysis is on the non-reciprocal Active Electronically Scanned Arrays (AESA). An electrical model of the jammer system and the AESA, including variations in the electrical properties, together with three different system correction methods are used. A simulation procedure, using single frequency (CW) signals, is defined and used for estimating total level of reciprocity, which is a primary contributor to jammer performance. Reciprocity error sensitivity for variations in model parameters is simulated to indicate which AESA aspects are essential for performance. Further, the influence of characterization and calibration noise is investigated. The usability of the model is demonstrated in different types of simulations, which highlights the differences between the system correction methods. Simulations show that a relatively high level of reciprocity can be achieved when using system correction, if measurement noise and model limitations are disregarded. The expected degradation in reciprocity from differences in electrical properties between the reception and transmission branch of the AESA has been confirmed. The effect of characterization and calibration noise, for realistic levels of noise, seems to be a dominating factor in the total reciprocity error. A significant increase in reciprocity error can likely be expected when non-CW signals are used and when realistic levels of noise and non-linear effects are added.
Cross-eye (CE) är en störprincip som har potential att inducera vinkelmätfel i radar. Dess möjlighet att störa monopulsradar, en vanligt förekommande typ av radar som är motståndskraftig mot många störformer, har skapat ett intresse för metoden hos tillverkare av system för elektronisk krigföring (EW-system). Användning av CE störning i ett EW-system skulle kunna öka möjligheten till självskydd vid attack från en monopulsradarstyrd robot. Avhandlingen analyserar en modell av en retrodirektiv CE störare som är avsedd för integration i ett multifunktionellt EW-system. Fokus i analysen är på de aktiva gruppantennerna (AESA) som används i systemet. En elektrisk modell av systemet används, vilken inkluderar variationer i parametrar hos AESA samt tre olika systemkorrektionsmetoder. En simuleringsprocedur som ger möjlighet att uppskatta reciprocitetsfel och känslighet för parametervariationer i AESA är definierad. Vidare undersöks inverkan av karaktäriserings och kalibreringsbrus. Modellens användningsområden visas i olika typer av prestandasimulering där effekter av de olika systemkorrektionsmetoderna tydliggörs. Simuleringsresultat för enkelfrekvens (CW) signaler visar en relativt hög nivå av reciprocitet om brus och olinjäriteter ignoreras. Det förväntade resultatet, att elektriska skillnader mellan mottagar- och sändargrenarna orsakar en försämring i reciprocitet, bekräftas. Inverkan av karaktäriserings och kalibreringsbrus verkar vara en dominerande faktor i det totala reciprocitetsfelet då rimliga brusnivåer används. En signifikant höjning av reciprocitetsfelet kan sannolikt förväntas då signaler med en viss bandbredd används och då rimliga nivåer av brus samt olinjäriteter inkluderas.

QC 20171102

APA, Harvard, Vancouver, ISO, and other styles
6

Johnson, Allen P., Bryan Breeden, Willard Earl Duff, Paul F. Fishcer, Nathan Hornback, David C. Leiker, Parker Carlisle, et al. "Ship Anti Ballistic Missile Response (SABR)." Monterey, California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/7268.

Full text
Abstract:
Includes supplemental material.
Based on public law and Presidential mandate, ballistic missile defense development is a front-burner issue for homeland defense and the defense of U.S. and coalition forces abroad. Spearheaded by the Missile Defense Agency, an integrated ballistic missile defense system was initiated to create a layered defense composed of land-, air-, sea-, and space-based assets. The Ship Anti-Ballistic Response (SABR) Project is a systems engineering approach that suggests a conceptualized system solution to meet the needs of the sea portion of ballistic missile defense in the 2025-2030 timeframe. The system is a unique solution to the sea-based ballistic missile defense issue, combining the use of a railgun interceptor and a conformable aperture skin-of-the-ship radar system.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Kenny NMN. "Information warfare targeting : people and processes /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FWang.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, December 2003.
Thesis advisor(s): Dan C. Boger, Raymond Buettner. Includes bibliographical references (p. 49-52). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Tan, Peihao Raymond. "Applying systems thinking towards countering hybrid warfare." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121799.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, System Design and Management Program, 2019
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 121-124).
Carl von Clausewitz, a famous Prussian general and military theorist asserted that war's nature of being violent, interactive, and fundamentally political, does not change - only its character does. According to Clausewitz, the character of war is a dynamic phenomenon that manifests differently with the "spirit" of each age. In our current digital age, technology has heavily influenced interactions, including warfare. In addition to boosting traditional military means, technology has enabled rapid and widespread weaponization of social, information and infrastructural instruments for political coercion. A rising trend of combining national instruments of power to wage war simultaneously across the political, military, economic, social, information and infrastructural domains is a rapidly emerging threat, characteristic of modem "hybrid wars" being fought today. Traditional military-centric defense policies and strategies are ill-prepared to address such threats that deliberately operate in the "grey zone", playing on ambiguity and tailoring coercion to remain just below detection and response thresholds. In this research, a combination of literature review, descriptive study, inductive approach, normative research, case study and systems thinking are applied to analyze the hybrid warfare threat and then construct a suitable response framework, treating it as system with interrelated constituent parts, synergistically working together over time, within the wider international context, to deliver an emergent counter hybrid warfare capability.
by Peihao Raymond Tan.
S.M. in Engineering and Management
S.M.inEngineeringandManagement Massachusetts Institute of Technology, System Design and Management Program
APA, Harvard, Vancouver, ISO, and other styles
9

Oliveria, Tristan V., James W. Beaver, Pedro R. Mercado, Andrew D. Bucher, Jennifer M. Free, and Richard W. Byers. "Systems analysis of alternative architectures for Riverine Warfare in 2010." Thesis, Monterey, California, 2006. http://hdl.handle.net/10945/2361.

Full text
Abstract:
Student Integrated Project
Includes supplementary material.
This thesis analyzed the Navy's proposed Riverine Force (RF) structure and capabilities of 2006. Systems Engineering and Analysis cohort 10 (SEA10) developed a cost-effective system of systems which increased battlespace awareness and situational responsiveness for 2010. Riverine missions were decomposed into their functional, physical, and operational architectures using the detect-to-engage sequence. This analysis determined critical RF functions. Critical functions detect and engage were then physically represented by feasible force package alternatives that augmented the baseline RF. SEA10 analyzed these alternatives using agent based models to identify baseline RF capability gaps and provide insights into possible solutions. Reduction of modeling data indicated the baseline force was as effective as some upgraded force packages depending on the measure of performance (MOP) or scenario structure under scrutiny. Sensor augmentation demonstrated significant improvements to baseline performance by increasing battlespace awareness. Weapon augmentation alone did not significantly improve baseline performance by increasing situational responsiveness. Combined sensor-weapon augmentation performed well across all MOP and scenarios. The Unmanned Surface Vehicle (USV) was the most cost-effective alternative. Dedicated helicopter support demonstrated the best performance overall, but was the most costly alternative.
APA, Harvard, Vancouver, ISO, and other styles
10

Mullis, William S. "Using the acquisition process to reduce the vulnerability of future systems to information warfare." Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/9119.

Full text
Abstract:
Approved for public release; distribution is unlimited
Information warfare (IW) is a growing concern for the United States Army. The sophisticated, high-technology modern weapons systems upon which the U.S. Army heavily relies are increasing vulnerable to IW weapons and tactics. The acquisition process plays a major role in reducing defense systems IW vulnerability. This research identifies the primary IW threats to systems during the acquisition lifecycle and what factors in the acquisition environment contribute to IW vulnerability. This research also suggests a technique for integrating IW countermeasures into the defense systems acquisition process. A primary finding of this research is that while a Program Management Office (PMO) can institute a myriad of useful countermeasures, influencing the prime contractor to establish a secure development environment is the most important action it can take in reducing the vulnerability of future systems to IW
APA, Harvard, Vancouver, ISO, and other styles
11

Huffaker, Jacob A. "The benefit of 802.20 technologies on information flow in network centric warfare." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FHuffaker.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Technology (Joint Command, Control, and Communications (C3))--Naval Postgraduate School, September 2005.
Thesis Advisor(s): Alex Bordetsky, Dan Boger. Includes bibliographical references (p. 55-56). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
12

Hibbert, Kirk R. "A need for systems architecture approach for next generation mine warfare capability." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FHibbert.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, September 2006.
Thesis Advisor(s): John Osmundson, Martha Jallim Hall. "September 2006." Includes bibliographical references (p. 79-83). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
13

Ulama, Tuncay. "Frequency and polarization diversity jamming of communications in urban environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FUlama.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Diamond, Scott M. "Aerially deployed real-time targeting sensor net." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FDiamond.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kamsah, M. Z. K. "Process engineering information management systems." Thesis, Swansea University, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.637752.

Full text
Abstract:
The way engineers and engineering companies do their work has significantly changed over the past twenty years. This is mainly due to the simultaneous development of computers (particularly personal computers) and software. Most engineers are likely to use several engineering application programs and mainstream software packages. Hence, information from one application must be capable of being transferred into other packages for further processing or analysing and reporting or documentation purposes. This thesis aims to investigate aspects of data management and applications integration in process engineering design. It proposes a new method and model for data storage, manipulation and representation, on which new process design environments may be based. Several aspects of integrated process design database systems are examined, including data models, data handling, program control and integration. A system called PREMIS has been developed which uses an object-oriented approach to data management. It utilises templates which mimic specification sheets used in process industry for defining objects in a design environment. The use of methods promotes a consistent look and feel to the tools in the environment. The application of PREMIS to a real process engineering design example illustrates the benefits of object-oriented techniques to the process systems and design community. Templates can be manipulated as entities. They are displayed on the screen where they serve as the data input device for design information. Data on the templates and stored in the database can be shared and accessed directly by design programs. The dynamic nature of the object definitions encourages experimentation with the new data types and methods. The system also aims to demonstrate the advantages of employing advanced integration features of the Microsoft Windows operating system.
APA, Harvard, Vancouver, ISO, and other styles
16

Ozcan, Fuzuli. "An Approach For Defensive Information Warfare In The Turkish Land Forces Command." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/260268/index.pdf.

Full text
Abstract:
In this study, Information Warfare (IW) and Information System (IS) security concept in the Turkish Land Forces Command (TLFC) are investigated. An approach that will enhance the success for a secure Information System to alleviate experienced risks is proposed. Starting with the general overview of the literature about IW and IS security, the relation between the concepts, the future, advantages and disadvantages of security development approaches, and the requirements for security are reviewed. Then the specific problems, security risks and IW threats of the TLFC are considered. After reviewing the specific problems, a proposal for IS security in Defensive Information Warfare process in the TLFC is presented and partially applied. The proposal is evaluated within the framework of a case study. The stronger points of the proposal are reviewed by comparing the proposed approach with some other approaches actually applied.
APA, Harvard, Vancouver, ISO, and other styles
17

Walter, Paul G. "A model for effective systems engineering workforce development at Space and Naval Warfare Systems Center (SSC) Atlantic." Thesis, Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/37738.

Full text
Abstract:
Approved for public release; distribution is unlimited
This thesis describes a methodology used to develop a systems engineering (SE) competency framework for Space and Naval Warfare Systems Center (SSC) Atlantica Department of Navy organization whose vision statement is to Make IT count for the Warfighter and the Nation. This methodology defines the role of systems engineers at SSC Atlantic; establishes prioritized SE competency areas; identifies associated knowledge, skills and abilities (KSAs); identifies optimal workforce development methods for each KSA; and addresses how to assess systems engineers against a competency development model. The results of this analysis show that systems engineers require many of the same KSAs as other members of the engineering workforce, but also require unique KSAs focused on customer mission/capability areas, technology areas, SE processes/activities and leadership skills. Developmental methods for systems engineers to obtain these KSAs range from informal on-the-job training to professional certifications and degrees. The methodology established in this thesis can be used by other organizations to develop and employ their own competency framework in practically any discipline. The SE competency framework defined in this thesis can be leveraged/tailored by other SE organizations in order to establish developmental roadmaps for improving the KSAs of their workforce.
APA, Harvard, Vancouver, ISO, and other styles
18

Jones, Michael L. "Measuring customer and employee loyalty at Space and Naval Warfare Systems Center Charleston." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJones%5FMichael.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering Management)--Naval Postgraduate School, September 2005.
Thesis Advisor(s):Laurie Anderson, Carol Smith. Includes bibliographical references (p. 109-11). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
19

Vanmarcke, Lieven L. (Lieven Ludwig). "Defining flexibility for information systems." Thesis, Massachusetts Institute of Technology, 1988. http://hdl.handle.net/1721.1/14597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kang, Yun Kyu. "Information inaccuracy in inventory systems." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/36193.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2004.
Includes bibliographical references (p. 127-129).
It is critically important for inventory-carrying facilities to provide high availability of products at the minimal operating cost. To achieve this objective, many companies have automated their inventory operations and rely on the information system in critical decision makings. However, if the information is inaccurate, it may lead to high out-of-stocks and/or excess inventory. This thesis examines what the primary causes of the inaccuracy are, how and to what extent they degrade the inventory system performance, and what can be done to compensate for the inaccuracy. Analytical and simulation modelling demonstrate that the inventory system performance is highly sensitive to the inaccuracy caused by stock loss, which is the disappearance of items (such as due to theft) not detected by the information system. That is, even a small level of stock loss accumulated over time can lead to inventory inaccuracy that disrupts the replenishment process and creates severe out-of-stocks. In fact, revenue losses due to out-of-stocks can far outweigh the property losses due to the disappearing items.
(cont.) One way to deal with the inaccuracy problem is the use of RFID-based automatic product identification technology under development at the Auto-ID Center, which can provide the real-time and accurate information regarding the location and quantity of objects in supply chain. It is found that even when this technology provides imperfect measurement of the stock quantity, dramatic performance improvement can be achieved using an inventory control scheme based on dynamic programming. Various other methods of compensating for the inventory inaccuracy are presented and evaluated. Analysis of each method reveals that the inventory inaccuracy problem can be effectively treated even without automatic identification technology in some situations. However, each method has weaknesses.
by Yun Kang.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
21

Gualtier, Kenneth. "Information Operations Under International Law: A Delphi Study Into the Legal Standing of Cyber Warfare." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/320.

Full text
Abstract:
The ever-growing interconnectivity of industry and infrastructure through cyberspace has increased their vulnerability to cyber attack. The lack of any formal codification of cyber warfare has led to the development of contradictory state practices and disagreement as to the legal standing of cyber warfare, resulting in an increased risk of damage to property and loss of life. Using the just war theory as a foundation, the research questions asked at the point at which cyber attacks meet the definition of use of force or armed attack under international law and what impediments currently exist in the development of legal limitations on cyber warfare. The research design was based on using the Delphi technique with 18 scholars in the fields of cyber warfare and international law for 3 rounds of questioning to reach a consensus of opinion. The study employed qualitative content analysis of survey questions during the first round of inquiry in order to create the questions for the 2 subsequent rounds. The first round of inquiry consisted of a questionnaire composed of 9 open-ended questions. These data were inductively coded to identify themes for the subsequent questionnaires that consisted of 42 questions that allowed the participants to rank their responses on a Likert-type scale and contextualize them using written responses. Participants agreed that a computer attack is comparable to the use of force or armed attack under international law, but fell short of clearly defining the legal boundaries of cyber warfare. This study contributes to social change by providing informed opinions by experts about necessary legal reforms and, therefore, provides a basis for greater legal protections for life and property.
APA, Harvard, Vancouver, ISO, and other styles
22

Ang, Wee Horng. "Scale-free information systems networks." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/34554.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, 2006.
Includes bibliographical references (leaves 77-79).
Many real, complex networks have been shown to be scale-free. Scale-free in networks mean that their degree distribution is independent of the network size, have short path lengths and are highly clustered. We identify the qualities of scale-free networks, and discuss the mathematical derivations and numerically simulated outcomes of various deterministic scale-free models. Information Systems networks are a set of individual Information Systems that exchange meaningful data among themselves. However, for various reasons, they do not naturally grow in a scale-free manner. In this topic, we will specifically examine a technique proposed by MITRE that allows information to be exchanged in an efficient manner between Information System nodes. With this technique, we will show that a scale-free Information System Network is sound in theory and practice, state the characteristics of such networks and demonstrate how such a system can be constructed.
by Wee Hong Ang.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
23

Makhdoumi, Ali (Makhdoumi Kakhaki). "Information provision in rating systems and traffic systems." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/120426.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 133-141).
This thesis studies information provision in two contexts: online rating systems and traffic information systems. In the first part of the thesis, we develop a model of Bayesian learning from online reviews and investigate the conditions for asymptotic learning of the quality of a product. Moreover, we characterize the speed of learning under different rating systems and characterize the impact of information provision on the speed of learning. In the model, a sequence of potential customers after observing the ratings of the product, and based on their ex ante valuation, decide whether to purchase. If they purchase, the true quality of the product, their ex ante valuation and ex post valuation determine their overall satisfaction. Given the rating system of the platform, they decide to leave a review as a function of their overall satisfaction. We study learning dynamics under two classes of rating systems: full history, where customers see the full history of reviews, and summary statistics, where the platform reports some summary statistics of past reviews. In both cases, we characterize the asymptotic speed of learning and show that the incentivizes of the platform is aligned with maximizing the speed of learning. We then study the design of rating systems in terms of information collection and information provision schemes. In particular, we identify situations in which providing more information leads to slower learning. In the second part of the thesis, we develop a framework for systematically analyzing how changes in the information sets of users in a traffic network (e.g., due to route guidance systems) impact the traffic equilibrium, and show the conditions under which even those with access to additional information may suffer greater congestion. To this regard, we first introduce a new class of congestion games in which users have differing information sets about the available edges and can only use routes consisting of edges in their information set. We then define the notion of information constrained Wardrop equilibrium for this class of congestion games and establish its existence and uniqueness. Finally, we turn to our main question formulated in the forms of Informational Braess' Paradox (IBP), which extends the classic Braess' Paradox in traffic equilibria. IBP asks whether users receiving additional information can become worse off. We provide a comprehensive answer to this question by providing a tight characterization of network topologies under which IBP emerges.
by Ali Makhdoumi.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
24

Galal, Galal Hassan. "An interpretive approach to information systems engineering (using the grounded systems engineering methodology)." Thesis, Brunel University, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Shahri, Alimohammad. "Engineering motivation requirements in business information systems." Thesis, Bournemouth University, 2017. http://eprints.bournemouth.ac.uk/29960/.

Full text
Abstract:
Digital Motivation refers to the use of software-based solutions to change, boost or maintain people’s attitude and behaviour towards certain tasks, policies and regulations. Gamification, persuasive technology, and entertainment computing are example strands of such paradigm. Digital Motivation exhibits unique properties which necessitate reconsidering its design methods. This stems from the intense human factor which may make it destructive, pressuring, and a reason for negative work ethics. The emerging literature on the topic includes engineering approaches for Digital Motivation. However, their main focus is on specifying its operation, e.g., the design of rewards and levels. This thesis conducts a series of empirical studies and proposes a novel modelling framework which enables capturing Digital Motivation as an integral part of the organisational and social structure of a business. This modelling framework provides a tool which utilises the generated models to perform analysis that informs the design, introduction, and management of Digital Motivation. The modelling and analysis framework is evaluated via case studies involving novice software system analysts, expert software system analysts, and managers of a business information system. The results of the evaluation illustrate that the modelling language has a good capability to elicit and analyse motivation requirements of stakeholders of a business information system.
APA, Harvard, Vancouver, ISO, and other styles
26

Engström, Olof, and Tigerström Gabriel Lördal. "Improving usability of land warfare simulator: pathfinding and adaptive speed based on geographic data." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211551.

Full text
Abstract:
SANDIS II is a land warfare simulation and analysis tool developed by the Finnish Defence Research Agency. The Swedish Defence Research Agency has evaluated SANDIS II to have potential as a war gaming aid within education, at the Swedish Defence University. However, operating the tool is considered too difficult to avail that potential. In this report we propose a way of using geographical data for path-finding in terrain and automatically adjusting units’ speeds. We construct a cost raster from various types of geographic data, with each grid in the cost raster storing a value, representing a degree of mobility. Models using cost rasters are then created for adjusting unit speed and finding least-cost paths. We implement the models in Python as a stand-alone module, and describe the module’s internal methods, interface and how it can be used by SANDIS II.
SANDIS II är ett simuleringsoch analysverktyg utvecklat av Finska Försvarsmaktens Forskningsanstalt. Svenska Totalförsvarets forskningsinstitut har utvärderat SANDIS II och funnit ett potentiellt användningsområde för verktyget som stöd vid krigsspel, inom utbildning vid Försvarshögskolan. Verktyget anses dock vara för svårhanterligt för att uppfylla detta syfte. I denna rapport föreslås metoder för att beräkna de snabbaste förflyttningsvägarna i terräng och att automatiskt justera enheters hastighet i simulatorn, baserat på geografisk data. Vi konstruerar ett kostnadsraster av olika typer av terrängdata, där varje ruta i rastret tilldelas ett värde som representerar framkomlighet. Med kostnadsraster som grund skapar vi sedan modeller för att kunna justera enheters hastigheter och beräkna framryckningsrutter med så låg kostnad som möjligt. Vi implementerar modellerna i en separat Python-modul och beskriver modulens interna metoder, gränssnitt och hur det kan användas av SANDIS II.
APA, Harvard, Vancouver, ISO, and other styles
27

Salahat, Mohammed Hasan. "Information systems development through an integrated framework." Thesis, University of Huddersfield, 2016. http://eprints.hud.ac.uk/id/eprint/34432/.

Full text
Abstract:
Information systems are essential entities for several organizations who strive to successfully run their business operations. One of the major problems faced by the organizations is that many of these information systems fail, and thus the organizations do not achieve their required targets in time. Many of the reasons for the information system failures documented in the literature are related to development methodologies or frameworks that are unable to handle both ‘hard’ and ‘soft’ system aspects. In general, the hard issues of the system are considered more significant than the soft issues, however, all the methodologies must be able to deal with all the system and business aspects. This thesis investigates the possibility of developing and evaluating a multimethodology framework that can be used for information systems development in an academic and business environment. The research explores the applicability of such a framework that comprehends both ‘soft’ and ‘hard’ system aspects in order to eliminate information system failures. Different software development approaches are investigated, including the dominant ‘domain-driven design’ (DDD) approach. A new multimethodological framework entitled ‘Systemic Soft Domain Driven Design’ (SSDDDF) has been developed by combining ‘soft system methodology’ as a guiding methodology, ‘unified modelling language’ as a business domain modelling approach, and a domain-driven design implementation pattern. This framework is intended as an improvement of the DDD approach. Soft and hard techniques are integrated through mapping from the ‘consensus primary task model’ of the soft approach to the ‘use cases’ of the hard approach. In addition, ‘soft language’ is introduced as a complement to DDD’s ‘ubiquitous language’, for facilitating the communication between the different stakeholders of a project. The implementation pattern (e.g., Naked Objects) is included for generating code from domain models. The framework has been evaluated as an information systems development approach through different undergraduate and postgraduate projects. Feedback from the developers has been positive and encouraging for further improvements in the future. The SSDDD framework has also been compared to different ISD methodologies and frameworks among of these DDD as an approach to ISD. The results of this comparison show that SSDDDF has advantages over DDD and significant improvements to DDD have been achieved. Finally, the research suggests an agenda for further improvements of the framework, while suggesting the development of different pattern languages.
APA, Harvard, Vancouver, ISO, and other styles
28

Caithness, Ian Peter. "Management of an information systems (IS) department." Master's thesis, University of Cape Town, 1985. http://hdl.handle.net/11427/7601.

Full text
Abstract:
Bibliography: leaves 119-124.
This thesis discusses the principles relating to the management of an Information Systems (IS) department. To be effective an IS service must support the ultimate goals of the organization directly. In this regard, user acceptance of the services offered is essential. In addition, economic justification and verification of the technical feasibility of an. IS project is essential to ensuring minimum wasted effort, management's commitment to the project.
APA, Harvard, Vancouver, ISO, and other styles
29

Mathieson, John T. J. "Towards Polymorphic Systems Engineering." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28257912.

Full text
Abstract:
Systems engineering is widely regarded as a full life cycle discipline and provides methodologies and processes to support the design, development, verification, sustainment, and disposal of systems. While this cradle-to-grave concept is well documented throughout literature, there has been recent and ever-increasing emphasis on evolving and digitally transforming systems engineering methodologies, practices, and tools to a model-based discipline, not only for advancing system development, but perhaps more importantly for extending agility and adaptability through the later stages of system life cycles – through system operations and sustainment. This research adopts principles from the software engineering domain DevOps concept (a collaborative merger of system development and system operations) into a Systems Engineering DevOps Lemniscate life cycle model. This progression on traditional life cycle models lays a foundation for the continuum of model-based systems engineering artifacts during the life of a system and promotes the coexistence and symbiosis of variants throughout. This is done by facilitating a merger of model-based systems engineering processes, tools, and products into a surrogate and common modeling environment in which the operations and sustainment of a system is tied closely to the curation of a descriptive system model. This model-based approach using descriptive system models, traditionally leveraged for system development, is now expanded to include the operational support elements necessary to operate and sustain the system (i.e. executable procedures, command scripts, maintenance manuals, etc. modeled as part of the core system). This evolution on traditional systems engineering implementation, focused on digitally transforming and enhancing system operations and sustainment, capitalizes on the ability of model-based systems engineering to embrace change to improve agility in the later life cycle stages and emphasizes the existence of polymorphic systems engineering (performing a variety of systems engineering roles in simultaneously occurring life cycle stages to increase system agility). A model-based framework for applying the Systems Engineering DevOps life cycle model is introduced as a new Systems Modeling Language profile. A use-case leveraging this “Model-Based System Operations” framework demonstrates how merging operational support elements into a spacecraft system model improves adaptability of support elements in response to faults, failures, and evolving environments during system operations, exemplifying elements of a DevOps approach to cyber-physical system sustainment.
APA, Harvard, Vancouver, ISO, and other styles
30

Ambraziūnas, Martas. "Enterprise model based MDA information systems engineering method." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2014. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2014~D_20141111_114310-77387.

Full text
Abstract:
Although new methods of information systems engineering are being researched and developed, they are empirical in nature. The problem domain knowledge acquisition process relies heavily on the system analyst and user; therefore it is not clear whether the knowledge of the problem domain is comprehensive. This may lead to occurrence of logical gaps, misinterpretation of system requirements, thus causing issues for project. The research work is meant to develop new IS engineering method that will allow validation of the problem domain knowledge against formal criteria. In order to create such method basic principles of Knowledge Based ISE and Model Driven ISE were combined. By combining the two approaches Knowledge Based MDA method was created that extends traditional MDA with Enterprise Model. During the research Knowledge Based MDA tool’s prototype, that is capable of partly automating Knowledge Based MDA process, was created. The efficiency of Knowledge Based MDA method was validated by creating real life application for mobile devices. During the empirical research it was established that by using developed method software requirements quality is improved and comprehensive documentation is created (due to Enterprise Model based validation), occurrence of logical gaps between software development stakeholders is reduced, time consumption needed for creation of application for multiplatform systems is reduced (due to automated code generation and shorter testing stage).
Šiuolaikiniai IS inžinerijos metodai yra nuolat vystomi ir tobulinami, tačiau iš esmės jie yra grindžiami empiriniais procesais. Empiriškai išgautų žinių kokybė gali būti nepakankama sėkmingam projekto įgyvendinimui, nes netikslus vartotojo reikalavimų specifikavimas neigiamai įtakoja visus programinės įrangos kūrimo etapus, o tai didina projekto įgyvendinimo riziką. Disertacinis darbas skirtas sukurti IS inžinerijos metodą, kuris įgalintų empiriniais būdais surinktas dalykinės srities žinias patikrinti formalių kriterijų atžvilgiu. Metodui sukurti buvo apjungti žiniomis grindžiamos ir modeliais grindžiamos IS inžinerijos principai. Šiuo tikslu klasikinis MDA procesas buvo papildytas pagrindiniu žiniomis grindžiamos IS inžinerijos komponentu – veiklos modeliu. Darbo metu buvo sukurtas žiniomis grindžiamo MDA metodo dalykinės programos prototipas, kuris iš dalies automatizuoja siūlomo metodo procesą. Žiniomis grindžiamo MDA metodo efektyvumas buvo patikrintas jį taikant eksperimentinio tyrimo atlikimui, kurio metu buvo sukurta pašto siuntų stebėjimo programėlė. Tyrimo metu nustatyta, kad tikslinga taikyti žiniomis grindžiamą MDA metodą PĮ kūrime nes: 1) detaliau dokumentuojami vartotojo reikalavimai (tikrinami formalių kriterijų atžvilgiu); 2) sumažinama loginių trūkių atsiradimo galimybė (tarp programinės įrangos kūrimo dalyvių); 3) daugiaplatforminiuose sprendimuose sumažinamos projekto įgyvendinimo laiko sąnaudos (dėka automatinio kodo generavimo iš patikrintų modelių).
APA, Harvard, Vancouver, ISO, and other styles
31

Hosseini, Moghaddam Seyed Mahmood. "Engineering of transparency requirements in business information systems." Thesis, Bournemouth University, 2016. http://eprints.bournemouth.ac.uk/25349/.

Full text
Abstract:
Transparency is defined as the open flow of high quality information in a meaningful and useful manner amongst stakeholders in a business information system. Therefore transparency is a requirement of businesses and their information systems. It is typically linked to positive ethical and economic attributes, such as trust and accountability. Despite its importance, transparency is often studied as a secondary concept and viewed through the lenses of adjacent concepts such as security, privacy and regulatory requirements. This has led to a reduced ability to manage transparency and deal with its peculiarities as a first-class requirement. Ad-hoc introduction of transparency may have adverse effects, such as information overload and reduced collaboration. The thesis contributes to the knowledge on transparency requirements by proposing the following. First, this thesis proposes four reference models for transparency. These reference models are based on an extensive literature study in multiple disciplines and provide a foundation for the engineering of transparency requirements in a business information system. Second, this thesis proposes a modelling language for modelling and analysing transparency requirements amongst stakeholders in a business information system. This modelling language is based on the proposed four reference models for transparency. Third, this thesis proposes a method for the elicitation and adaptation of transparency requirements in a business information system. It covers the entire life cycle of transparency requirements and utilises the transparency modelling language for modelling and analysis of transparency requirements. It benefits from three concepts of crowdsourcing, structured feedback acquisition and social adaptation for the elicitation and adaptation of transparency requirements. The thesis also evaluates the transparency modelling language in terms of its usefulness and quality using two different case studies. Then, the feedback acquisition section in the transparency elicitation and adaptation method is evaluated using a third case study. The results of these case studies illustrate the potentials and applicability of both the modelling language and the method in the engineering of transparency requirements in business information systems.
APA, Harvard, Vancouver, ISO, and other styles
32

Panokarren, Clifford L. "Information model for engineering change management." FIU Digital Commons, 2004. https://digitalcommons.fiu.edu/etd/3949.

Full text
Abstract:
Managing engineering changes is a critical task for organizations to remain competitive. In a manufacturing organization there are innumerable engineering change requests. This thesis is focused on the development of an information model that defines the engineering change process. This research developed an activity model in IDEF0, an object model in IDEF1X and a dynamic model using state diagrams. The activity model captures the business process for executing an engineering change in terms of its constituting activities and sub-activities. The object model defines each object and its attributes identified in the activity model. The dynamic model captures the status change of each object in the engineering change process. This study concludes with a summary, implementation issues and future work that can be done in the direction of implementing a system based \ on the information model developed.
APA, Harvard, Vancouver, ISO, and other styles
33

Cohen, Aaron Seth 1974. "Information theoretic analysis of watermarking systems." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/16791.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 185-193).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Watermarking models a copyright protection mechanism where an original data sequence is modified before distribution to the public in order to embed some extra information. The embedding should be transparent (i.e., the modified data should be similar to the original data) and robust (i.e., the information should be recoverable even if the data is modified further). In this thesis, we describe the information-theoretic capacity of such a system as a function of the statistics of the data to be watermarked and the desired level of transparency and robustness. That is, we view watermarking from a communication perspective and describe the maximum bit-rate that can be reliably transmitted from encoder to decoder. We make the conservative assumption that there is a malicious attacker who knows how the watermarking system works and who attempts to design a forgery that is similar to the original data but that does not contain the watermark. Conversely, the watermarking system must meet its performance criteria for any feasible attacker and would like to force the attacker to effectively destroy the data in order to remove the watermark. Watermarking can thus be viewed as a dynamic game between these two players who are trying to minimize and maximize, respectively, the amount of information that can be reliably embedded. We compute the capacity for several scenarios, focusing largely on Gaussian data and a squared difference similarity measure.
(cont.) In contrast to many suggested watermarking techniques that view the original data as interference, we find that the capacity increases with the uncertainty in the original data. Indeed, we find that out of all distributions with the same variance, a Gaussian distribution on the original data results in the highest capacity. Furthermore, for Gaussian data, the capacity increases with its variance. One surprising result is that with Gaussian data the capacity does not increase if the original data can be used to decode the watermark. This is reminiscent of a similar model, Costa's "writing on dirty paper", in which the attacker simply adds independent Gaussian noise. Unlike with a more sophisticated attacker, we show that the capacity does not change for Costa's model if the original data is not Gaussian.
by Aaron Seth Cohen.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
34

Heitmann, Dawn M. (Dawn Marie). "An analysis of community information systems." Thesis, Massachusetts Institute of Technology, 1987. http://hdl.handle.net/1721.1/115042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Louie, Raymond (Raymond T. ). 1976. "Hybrid intelligent systems integration into complex multi-source information systems." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86533.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.
Includes bibliographical references (leaves 98-100).
by Raymond Louie.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
36

Ortolan, Riccardo. "Software engineering of Arduino based art systems." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14138.

Full text
Abstract:
The approaching of user satisfaction in Digital Media is raising new questions andchallenges in the interactivity relationship between creator and audience. In this workinteractivity is defined as a technology attribute that endows a media environmentwith the capability of reciprocal communication amidst user and technology throughthe technology. What are the key focus extents for managing technology based artproject? What I propose is a new layer of interaction, in which the user is viewed aspart of the interactive installation, being prompted by its pro-active behavior, redefininghim as a creative source. In this dimension, in addition to the language of the artist,what changes is also the perspective of use of the Work of Art: The user is now a livingpart of every creation, contributing to change each time the characteristics. Thanks totechnology, it becomes possible to completely revolutionize the way we conceive anddesign any type of cultural experience and to create spaces for an absolutely innovativeuse. This thesis will engineer the artistic Arduino based installation ArTime inorder to make it into a stable system that can function in museums and exhibitions,experimenting the new layer of interaction with scientific approaches.
APA, Harvard, Vancouver, ISO, and other styles
37

Scudieri, Paul Anthony. "Information in Complex Product Systems." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1236698805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lee, Sungjoon. "Evaluation of real-time bus arrival information systems /." The Ohio State University, 2000. http://rave.ohiolink.edu/etdc/view?acc_num=osu1488191667181044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Almalohi, Mussaad. "Implementing Health Information Exchange System: Saudi Arabia." Digital Commons at Loyola Marymount University and Loyola Law School, 2015. https://digitalcommons.lmu.edu/etd/350.

Full text
Abstract:
In Saudi Arabia, medical errors are at an alarming level. Lack of a Health Information Exchange (HIE) system is one the greatest reasons for medical errors in the Kingdom. Health care in many countries has evolved with the invention of electronic health information exchange system, henceforth HIE. This research paper purposes to implement HIE in Saudi Arabia, which entirely does not have a system of the sort. It is imperative instill HIE in the health care system in Saudi to allow physicians, nurses, health care facilities as well as patients to electronically share medical information in a safe and secure manner. Many countries such as United States, New Zealand and Germany have had great success with the HIE system and have reported vast benefits. Benefits of HIE are such as reduction of health care cost as well as decreasing medical errors. For Saudi Arabia to reach the same heights, many stakeholders will be involved in the triumph of the HIE system in the Kingdom of Saudi Arabia. The biggest contributor will be the Ministry of Health, which will be in charge of implementing as well as making the system mandatory in the main four hospitals in the country: Shomasy, Kind Saud University Hospital, Ministry of interior Hospital and Ministry of Defense Hospital. Each hospital having their own current medical information recording system, will now have one universal system that is made sure to be secure and safe for patients as well as other participating organizations who have access to the HIE system. The main concentration of the HIE system in Saudi Arabia will be in the emergency care of these four hospitals. It is crucial to have an organized and controlled way of recording as well as accessing patient medical records electronically, in a fast and effective way. This paper proposes that an HIE system in Saudi Arabia will reduce the cost of medical care and decrease medical errors. Through the use of Lean thinking and the use of quality tools, the HIE system will be able to change and increase the reliably as well as effectiveness of Urgent Care in the country and therefore have consequent benefits as well. Also, understanding who is going to play a great role in the triumph of the HIE system, such as the Ministry of Health and knowing what stakeholders will need to be affiliated and contribute will lead the project to a better success.
APA, Harvard, Vancouver, ISO, and other styles
40

Burstein, Leah. "Legacy Student Information System: Replacement or Enhancement?" Digital Commons at Loyola Marymount University and Loyola Law School, 2016. https://digitalcommons.lmu.edu/etd/376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hamstra, Eric J. "Information operations in Iraq the Mufsiddoon versus the U.S. and Coalition forces /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491182.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Cappellaro, Paola. "Quantum information processing in multi-spin systems." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/41282.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Nuclear Science and Engineering, 2006.
Includes bibliographical references (p. 133-142).
Coherence and entanglement in multi-spin systems are valuable resources for quantum information processing. In this thesis, I explore the manipulation of quantum information in complex multi-spin systems, with particular reference to Nuclear Magnetic Resonance implementations. In systems with a few spins, such as molecules in the liquid phase, the use of multi-spin coherent states provides a hedge against the noise, via the encoding of information in logical degrees of freedom distributed over several spins. Manipulating multi-spin coherent states also increases the complexity of quantum operations required in a quantum processor. Here I present schemes to mitigate this problem, both in the state initialization, with particular attention to bulk ensemble quantum information processing, and in the coherent control and gate implementations. In the many-body limit provided by nuclear spins in single crystals, the limitations in the available control increase the complexity of manipulating the system; also, the equations of motion are no longer exactly solvable even in the closed-system limit. Entanglement and multi-spin coherences are essential for extending the control and the accessible information on the system. I employ entanglement in a large ensemble of spins in order to obtain an amplification of the small perturbation created by a single spin on the spin ensemble, in a scheme for the measurement of a single nuclear spin state. I furthermore use multiple quantum coherences in mixed multi-spin states as a tool to explore many-body behavior of linear chain of spins, showing their ability to perform quantum information processing tasks such as simulations and transport of information.
(cont.) The theoretical and experimental results of this thesis suggest that although coherent multi-spin states are particularly fragile and complex to control they could make possible the execution of quantum information processing tasks that have no classical counterparts.
by Paola Cappellaro.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
43

Velasco, Diego. "Full spectrum information operations and the information professional officer intermediate qualification process : filling the gap to ensure the continued leadership of the information professional community in the area of information dominance /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FVelasco.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Mycroft, Matthew. "An Information System for Health Care Quality Measures." Digital Commons at Loyola Marymount University and Loyola Law School, 2016. https://digitalcommons.lmu.edu/etd/426.

Full text
Abstract:
The Patient Protection and Affordable Care Act (PPACA) is slowly transforming the U.S. Health Care System from a fee-for-service structure, which reimburses providers based on the quantity of patient encounters, to a new structure that emphasizes the value of care. Since value can be interpreted differently among various stakeholders, quality measures have been established by government and nonprofit sources. These quality measures serve as agreed-upon criteria by which to measure the achievement of value in health care. While these measures help to improve the quality of health care, they can also be burdensome to physicians and health care organizations. Implementation of quality measurement programs requires the involvement of highly intelligent people who think about what to measure, what to focus on, and how to accomplish outcomes. Thus, the process of selecting measures and compiling recommendations (reports) can be time consuming, complicated, and expensive. Applying SELP coursework fundamentals, key process activities outlined by INCOSE, and the DoD Architectural Framework, a quality measure information system was developed. The primary business objective (top level requirement) of the project was to reduce the cost and improve the quality of the measure selection and report generation processes. First, fundamental systems engineering principles were applied to understand the problem, conduct a lean analysis, identify stakeholders' needs, and derive a set of requirements to meet the primary business objective. Subsequently, five alternative solutions were evaluated to identify a preferred solution that could best meet the primary business objective while minimizing risk. The DoD Architectural Framework and course material from Integration of Hybrid Hardware and Software Systems (SELP 560) was then applied to develop, represent, and understand the information system architecture. Finally, leveraging Management Information Systems Coursework (MBAA 609), a system prototype was created utilizing Microsoft Access. The system prototype demonstrated a capability to reduce the cost and improve the quality of the health care quality measure selection and report generation processes. Utilizing pre-selected associations between various quality measures and categories of care, comprehensive quality measure reports can be generated in a matter of seconds for many categories of medical care. These comprehensive reports serve to educate users about various quality measures and to aid administrators in the development of comprehensive quality measurement programs. In one particular example, health care organizations will utilize the generated quality measure reports for the purpose of redesigning compensation and incentive pay for physicians and health care executives. In this particular example, estimates show that the system prototype is expected to reduce the labor associated with measure research and selection by approximately 49%, resulting in thousands of dollars of estimated savings. Additionally, the system will automate complicated measure search processes, which will increase the quality and consistency of the reported data.
APA, Harvard, Vancouver, ISO, and other styles
45

McCamant, Stephen. "Quantitative information-flow tracking for real systems." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44903.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 99-105).
An information-flow security policy constrains a computer system's end-to-end use of information, even as it is transformed in computation. For instance, a policy would not just restrict what secret data could be revealed directly, but restrict any output that might allow inferences about the secret. Expressing such a policy quantitatively, in terms of a specific number of bits of information, is often an effective program independent way of distinguishing what scenarios should be allowed and disallowed. This thesis describes a family of new techniques for measuring how much information about a program's secret inputs is revealed by its public outputs on a particular execution, in order to check a quantitative policy on realistic systems. Our approach builds on dynamic tainting, tracking at runtime which bits might contain secret in formation, and also uses static control-flow regions to soundly account for implicit flows via branches and pointer operations. We introduce a new graph model that bounds information flow by the maximum flow between inputs and outputs in a flow network representation of an execution. The flow bounds obtained with maximum flow are much more precise than those based on tainting alone (which is equivalent to graph reachability). The bounds are a conservative estimate of channel capacity: the amount of information that could be transmitted by an adversary making an arbitrary choice of secret inputs. We describe an implementation named Flowcheck, built using the Valgrind framework for x86/Linux binaries, and use it to perform case studies on six real C, C++, and Objective C programs, three of which have more than 250,000 lines of code. We used the tool to check the confidentiality of a different kind of information appropriate to each program. Its results either verified that the information was appropriately kept secret on the examined executions, or revealed unacceptable leaks, in one case due to a previously unknown bug.
by Stephen Andrew McCamant.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
46

Lee, Hyun Seop. "Requirement analysis framework of naval military system for expeditionary warfare." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/50403.

Full text
Abstract:
Military systems are getting more complex due to the demands of various types of missions, rapidly evolving technologies, and budgetary constraints. In order to support complex military systems, there is a need to develop a new naval logistic asset that can respond to global missions effectively. This development is based on the requirement which must be satisfice-able within the budgetary constraints, address pressing real world needs, and allow designers to innovate. This research is conducted to produce feasible and viable requirements for naval logistic assets in complex military systems. The process to find these requirements has diverse uncertainties about logistics, environment and missions. To understand and address these uncertainties, this research includes instability analysis, operational analysis, sea state analysis and disembarkation analysis. By the adaptive Monte-Carlo simulation with maximum entropy, uncertainties are considered with corresponding probabilistic distribution. From Monte-Carlo simulation, the concept of Probabilistic Logistic Utility (PLU) was created as a measure of logistic ability. To demonstrate the usability of this research, this procedure is applied to a Medium Exploratory Connector (MEC) which is an Office of Naval Research (ONR) innovative naval prototype. Finally, the preliminary design and multi-criteria decision-making method become capable of including requirements considering uncertainties.
APA, Harvard, Vancouver, ISO, and other styles
47

Hasegawa, Marnie Tardieu. "Systems engineering design for operations directorate administrative information system." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-10242009-020024/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hodges, Jonathan Stuart. "Engineering coherent control of quantum information in spin systems." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/44781.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Nuclear Science and Engineering, 2007.
Includes bibliographical references (p. 151-161).
Quantum Information Processing (QIP) promises increased efficiency in computation. A key step in QIP is implementing quantum logic gates by engineering the dynamics of a quantum system. This thesis explores the requirements and methods of coherent control in the context of magnetic resonance for: (i) nuclear spins of small molecules in solution and (ii) nuclear and electron spins in single crystals. The power of QIP is compromised in the presence of decoherence. One method of protecting information from collective decoherence is to limit the quantum states to those respecting the symmetry of the noise. These decoherence-free subspaces (DFS) encode one logical quantum bit (qubit) within multiple physical qubits. In many cases, such as nuclear magnetic resonance (NMR), the control Hamiltonians required for gate engineering leak the information outside the DFS, whereby protection is lost: It is shown how one can still perform universal logic among encoded qubits in the presence of leakage. These ideas are demonstrated on four carbon-13 spins of a small molecule in solution. Liquid phase NMR has shortcomings for QIP, like the lack of strong measurement and low polarization. These two problems can be addressed by moving to solid-state spin systems and incorporating electron spins. If the hyperfine interaction has an anisotropic character, it is proven that the composite system of one electron and N nuclear spins (le-Nn) is completely controllable by addressing only to the electron spin. This 'electron spin actuator' allows for faster gates between the nuclear spins than would be achievable in its absence. In addition, a scheme using logical qubit encodings is proposed for removing the added decoherence due to the electron spin. Lastly, this thesis exemplifies arbitrary gate engineering in a le-ln ensemble solid-sate spin system using a home-built ESR spectrometer designed specifically for engineering high-fidelity quantum control.
by Jonathan Stuart Hodges.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
49

Unciano, Conrad Vance. "The systems engineering development of an intelligence information system." Master's thesis, Virginia Tech, 1996. http://hdl.handle.net/10919/46376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Rajaram, Srinath. "Multilayer Nanomagnetic Systems for Information Processing." Scholar Commons, 2014. http://scholarcommons.usf.edu/etd/5109.

Full text
Abstract:
The Spin-Transfer Torque Magnetoresistive Random Access Memory (STT-MRAM) has opened new doors as an emerging technology with high potential to replace traditional CMOS-based memory technology. This has come true due to the density, speed and non- volatility that have been demonstrated. The STT-MRAM uses Magnetic Tunnel Junction (MTJ) elements as non-volatile memory storage devices because of the recent discovery of spin-torque phenomenon for switching the magnetization states. The magnetization of the free layer in STT-MRAM can be switched from logic "1" to logic "0" by the use of a spin-transfer torque. However, the STT-MRAMs have till now only been used as universal memory. As a result, STT-MRAMs are not yet commercially used as computing elements, though they have the potential to be used as Logic-In-Memory computation applications. In order to advance this STT-MRAM technology for computation, we have used different MRAM devices that are available as memory elements with different geometries, to use it as computing elements. This dissertation presents design and implementation of such devices using different multilayer magnetic material stacks for computation. Currently, the design of STT-MRAMs is limited to only memory architectures, and there have been no proposals on the viability of STT-MRAMs as computational devices. In the present work, we have developed a design, which could be implemented for universal logic computation. We have utilized the majority gate architecture, which uses the magneto-static interaction between the freelayers of the multilayer nanomagnets, to perform computation. Furthermore, the present work demonstrates the study of dipolar interaction between nanomagnetic disks, where we observed multiple magnetization states for a nanomagnetic disk with respect to its interaction energy with its neighboring nanomagnets. This was achieved by implementing a single layer nanomagnetic disk with critical dimension selected from the phase plot of single domain state (SDS) and vortex state (VS). In addition, we found that when the interaction energy between the nanomagnetic disks with critical dimension decreases (increase in center-to-center distance) the magnetization state of the nanomagnetic disks changes from single domain state to vortex state within the same dimension. We were able to observe this effect due to interaction between the neighboring nanomagnets. Finally, we have presented the design and implementation of a Spin-Torque driven Re- configurable Array of Nanomagnets (STRAN) that could perform Boolean and non-Boolean computation. The nanomagnets are located at every intersection of a very large crossbar array structure. We have placed these nanomagnets in such a way that the ferromagnetic free layers couple with each other. The reconfigurable array design consists of an in-plane (IP) free layer and a fixed polarizer [magnetized out-of-plane (OP)]. The cells that need to be deselected from the array are taken to a non-computing oscillating state.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography