Academic literature on the topic 'Military IoT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Military IoT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Military IoT"
Sonare, Renuka Chandrakant, and Dinesh V. Rojatkar. "Application OF IoT in Military Service." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 794–97. http://dx.doi.org/10.31142/ijtsrd4629.
Full textToth, Andreas. "Internet of Things Vulnerabilities in Military Environments." Vojenské rozhledy 30, no. 3 (September 8, 2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.
Full textKattimani, Miss Jyoti G. "Military Health System using IOT." International Journal for Research in Applied Science and Engineering Technology 7, no. 4 (April 30, 2019): 2889–94. http://dx.doi.org/10.22214/ijraset.2019.4486.
Full textL., Kirubakaran, Sangeetha G., Rathna Priya, and Sudharsan S. "Military Surveillance System using IOT." International Journal of Computer Applications 176, no. 15 (April 15, 2020): 27–31. http://dx.doi.org/10.5120/ijca2020920067.
Full textLu, Ye, Chao Xie, and Li Shang. "Study on the Transformation of Military Logistical of Internet of Things Era." Applied Mechanics and Materials 596 (July 2014): 119–22. http://dx.doi.org/10.4028/www.scientific.net/amm.596.119.
Full textCha, Sungyong, Seungsoo Baek, Sooyoung Kang, and Seungjoo Kim. "Security Evaluation Framework for Military IoT Devices." Security and Communication Networks 2018 (July 3, 2018): 1–12. http://dx.doi.org/10.1155/2018/6135845.
Full textKumar K S, Yashwanth, and Dr Narasimha Murthy M S. "Design of Monitor Individuals Health using IOT A IOT Application for Military Area." International Journal of Innovative Science and Research Technology 5, no. 6 (July 3, 2020): 693–98. http://dx.doi.org/10.38124/ijisrt20jun291.
Full textPopescu, Florin. "From the IoT to the IoBT. The Path to Superior Situational Understanding." Land Forces Academy Review 24, no. 4 (December 1, 2019): 276–82. http://dx.doi.org/10.2478/raft-2019-0034.
Full textJung, Seung-hoon, Jae-choon An, Jin-young Park, Yong-tae Shin, and Jong-bae Kim. "An Empirical Study of the Military IoT Security Priorities." International Journal of Security and Its Applications 10, no. 8 (August 31, 2016): 13–22. http://dx.doi.org/10.14257/ijsia.2016.10.8.02.
Full textIyer, Brijesh, and Niket Patil. "IoT enabled tracking and monitoring sensor for military applications." International Journal of System Assurance Engineering and Management 9, no. 6 (July 19, 2018): 1294–301. http://dx.doi.org/10.1007/s13198-018-0727-8.
Full textDissertations / Theses on the topic "Military IoT"
Avverahalli, Ravi Darshan. "Identifying and Prioritizing Critical Information in Military IoT: Video Game Demonstration." Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104070.
Full textMaster of Science
The IoT is transforming military and civilian environments into truly integrated cyberphysical systems (CPS), in which the dynamic physical world is tightly embedded with communication capabilities. This CPS nature of the military IoT will enable it to integrate a plethora of devices, ranging from small sensors to autonomous aerial, ground, and naval vehicles. This results in huge amount of information being transferred between the devices. However, not all the information is equally important. Broadly we can categorize information into two types: Critical and Non-Critical. For example in a military battlefield, the information about enemies is critical and information abouut the background trees is not so important. Therefore, it is essential to isolate the critical information from non-critical informaiton. This is the focus of our work. We use neural networks and some domain knowledge about the enemies to extract the critical information and use the extracted information to take control decisions. We then evalue the performance of this approach by testing it against various kinds of synthetic data sets. Finally we use an Atari Space Invaders video game to demonstrate how the extracted information can be used to make crucial decisions about enemies.
Thome, Geoffrey D. "U.S. Marine specific software interoperability requirements of the AFATDS and IOS software suites." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FThome.pdf.
Full textThesis advisor(s): John Osmundson, Richard Riehle. Includes bibliographical references (p. 119-123). Also available online.
Gribble, Rachael Jennifer. "What's it like to have a partner in the military? : the social and psychological experiences of women." Thesis, King's College London (University of London), 2017. https://kclpure.kcl.ac.uk/portal/en/theses/whats-it-like-to-have-a-partner-in-the-military-the-social-and-psychological-experiences-of-women(89676d66-5d29-43c0-8e07-966756aa3c81).html.
Full textDe, Villiers Daniel. "The application of new generation batteries in old tactical radios / D. de Villiers." Thesis, North-West University, 2007. http://hdl.handle.net/10394/738.
Full textThesis (M.Ing. (Electronical Engineering))--North-West University, Potchefstroom Campus, 2008.
Caramico, Giulia. "Le récit de bataille. Coripp. Ioh. 5*,49-396 [5,1-348 Petsch.]. Commentaire, traduction et texte latin." Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040021.
Full textSubject of this thesis is the commentary to Coripp. Ioh 5*,49-396 [=5,1-348 Petsch.], that is the description of Antonia Castra’s battle. My intention is to offer a study on Corippus’ work, where first is clear its literary importance. The heart of my thesis is the edition of the Latin text that is based on a new numbering of the verses and with some differences compared with the Diggle-Goodyear’s edition (Cambridge 1970). A very important philological discovery has allowed us to establish the real beginning of Iohannis’ book V, traditionally recognized until Diggle-Goodyear in a point determined by a G. Loewe's conjecture. In a rich introduction, divided into two sections and which precedes the commentary, we talk about the tradition of the Iohannis, through the Trivultianus 686, the only surviving manuscript, and we introduce the poet's historical background. After that, we describe the epic shapes of the book V, the very book of the Battle, between concrete history and literary stereotypes (furor bellicus like Erinys, generals’ cohortationes, aristiai, similies lead us to the same idea of “crusade” ante litteram, following an heroic and mythologic line)
Young, Mimy. "Evaluation of Non-Contact Sampling and Detection of Explosives using Receiver Operating Characteristic Curves." FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/994.
Full textRivoir, Cabrera Ana Laura. "Estrategias Nacionales para la Sociedad de la Información y el Conocimiento en América Latina, 2000 - 2010. El caso de Uruguay." Doctoral thesis, Universitat Oberta de Catalunya, 2013. http://hdl.handle.net/10803/132089.
Full textEl objetivo de la tesis fue conocer los enfoques dominantes en las estrategias sobre la Sociedad de la Información y el Conocimiento (SIC) de los países latinoamericanos en la década 2000 – 2010. A partir de una revisión bibliográfica se sostiene la existencia de dos enfoques sobre la SIC, el tecnologicista y el complejo. Se revisan once estrategias para la SIC (agendas digitales) latinoamericanas y se estudia el caso uruguayo en profundidad para comprender los factores que determinan la consolidación de los enfoques. Basado en una estrategia de investigación con técnicas cualitativas, se realizaron y analizaron noventa entrevistas a informantes calificados y actores de las políticas y se estudiaron los documentos de política.
The aim of the thesis was to determine the dominant approaches in Knowledge and Information Society (KIS) Strategies of Latin American countries in the decade from 2000 to 2010. From a literature review two approaches to the SIC were found, the “technocentric” and “complex” one. Eleven Latin American strategies for KIS (Digital Agendas) were reviewed and the Uruguayan case was studied in depth to understand the factors that determine the consolidation of the two KIS approaches. Based on a qualitative research strategy two research techniques were performed, ninety interviews with qualified informants and actors of policies and the analysis of policy documents.
Recchia, Stefano. "Limited Liability Multilateralism: The American Military, Armed Intervention, and IOs." Thesis, 2011. https://doi.org/10.7916/D8C82H8R.
Full textYüce, Cumhur. "Work engagement and job performance in military contexts: The moderator role of Individual Orientation to Collectivism (IOC)." Doctoral thesis, 2019. http://hdl.handle.net/10071/20579.
Full textEsta tese examinou o papel moderador da orientação individual para o coletivismo na relação entre o work engagement e o desempenho no trabalho em contextos militares. Começámos por descrever a literatura do work engagement e do desempenho no trabalho e a relação entre estes. Para abordar a questão de como e quando o work engagement dos militares está associado a níveis mais elevados de desempenho no trabalho, desenvolvemos dois estudos. O primeiro estudo foi qualitativo e pretendeu analisar o que caracterizava um bom desempenho militar, bem como as estratégias que os militares usam para melhorar seu desempenho. Os resultados do Estudo 1, com entrevistas a 25 militares ou líderes militares seniores em serviço ativo, oriundos de diferentes organizações militares, mostraram que embora existam algumas semelhanças com o modelo que Campbell (1990, 2012) usou para descrever o desempenho no trabalho, existem algumas singularidades do contexto militar. Uma destas singularidades é nomeadamente uma maior focalização no coletivo como fator saliente do desempenho no trabalho em contextos militares. Assim, realizámos um segundo estudo usando um desenho cross-sectional com recurso a múltiplas fontes: 150 oficiais e os seus supervisores (N = 33). Nesse estudo, analisámos o impacto que a orientação individual para o coletivismo tem na relação entre o work engagement do oficial e o desempenho no trabalho (relatado pelo seu supervisor). Os resultados mostraram que o work engagement dos oficiais estava positivamente associado ao seu desempenho no trabalho somente quando eles tinham uma maior orientação individual para o coletivismo. De acordo com os resultados dos dois estudos, argumentamos que para melhorar o desempenho individual no trabalho em contextos militares, os gestores militares devem investir na orientação individual dos funcionários para o coletivismo, treinando-os nesse sentido e reforçando essa orientação por meio de práticas de socialização.
Matos, Pedro Miguel Pinheiro de. "Paramonitoring." Master's thesis, 2018. http://hdl.handle.net/10400.26/28590.
Full textBooks on the topic "Military IoT"
University of Madras. Centre for South and Southeast Asian Studies, ed. India and Southeast Asia in IOR: A crystal gazing. Chennai: Centre for South and Southeast Asian Studies, University of Madras, 2013.
Find full textLepeshinskiĭ, I. I︠U︡. Razvitie IKT-kompetentnosti studentov uchebnykh voennykh t︠s︡entrov v uslovii︠a︡kh integrat︠s︡ii bazovogo voenno-professionalʹnogo obrazovanii︠a︡: Monografii︠a︡. Omsk: Omskiĭ gos. tekhn. universitet, 2011.
Find full textViola, Giacomo. Storie della ritirata nel Friuli della Grande Guerra: Cîl e int, diari e ricordi dell'invasione austro-tedesca. Udine: P. Gaspari, 1998.
Find full textAcțiunea politică și militară a României în 1919 in lumina corespondenței diplomatice a lui Ion I.C. Brătianu. București: Corint, 2001.
Find full textWatts, Larry. În serviciul mareșalului: Mareșalul Ion Antonescu văzut de un ofițer din cabinetul său militar ca urmare a întrevederilor avute cu Larry Watts. München: J. Dumitru, 1985.
Find full textRazov, Pavel, and Sergey Evenko. The risks of social adaptation of servicemen transferred to the reserve, to the conditions of civilian life in Russia and strategies to overcome them. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1078930.
Full textVarol, Ozan O. Competition and Power. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190626013.003.0014.
Full textPattison, James. Military Assistance. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198755203.003.0008.
Full textStone, David R. The Military. Edited by Richard H. Immerman and Petra Goedde. Oxford University Press, 2013. http://dx.doi.org/10.1093/oxfordhb/9780199236961.013.0020.
Full textBeer, Yishai. Military Strategy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190881146.003.0004.
Full textBook chapters on the topic "Military IoT"
Huang, Tianming. "Design and Key Technology Research of Civil-Military Integration Regulations and Standards Management System." In New Developments of IT, IoT and ICT Applied to Agriculture, 201–7. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5073-7_21.
Full textChudzikiewicz, Jan, Tomasz Malinowski, Janusz Furtak, and Zbigniew Zieliński. "The Procedure of Key Distribution in Military IoT Networks." In Computer Networks, 34–47. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21952-9_3.
Full textChudzikiewicz, Jan, Tomasz Malinowski, Zbigniew Zieliński, and Janusz Furtak. "Method for Determining Effective Diagnostic Structures Within the Military IoT Networks." In Computer Networks, 28–43. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59767-6_3.
Full textHe, Yang, Lei Wang, Sheng Hu, Changhua Yao, and Xiang Zheng. "New Operators Based on Pythagorean Fuzzy Information and Their Application in Reliability Estimation of Military Sealift Transportation." In Modern Industrial IoT, Big Data and Supply Chain, 341–48. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6141-6_37.
Full textZieliski, Zbigniew, Jan Chudzikiewicz, and Janusz Furtak. "An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT." In Internet of Things, 111–28. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02807-7_6.
Full textGaray, Francisco, Giovanna Morillo, and Teresa Guarda. "ICT Integration in Ecuador’s Military Education: Going Beyond PowerPoint." In Smart Innovation, Systems and Technologies, 337–50. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78605-6_29.
Full textTasič, Jurij F., Ana Madevska Bogdanova, Jugoslav Achkoski, and Aleksandar Glavinov. "Service – Oriented Architecture Model for Blood Type Analysis (Smart I (Eye) Advisory Rescue System) in Military Environment." In ICT Innovations 2013, 149–56. Heidelberg: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-01466-1_14.
Full textRaglin, Adrienne. "Presentation of Information Uncertainty from IoBT for Military Decision Making." In Distributed, Ambient and Pervasive Interactions, 39–47. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21935-2_4.
Full textNoera, Giorgio, Tonino Bombardini, Luca Ghetti, Claudio Camerino, Francesco Frezzetti, and Antonio Gaddi. "Military ICT and Innovative Networks for the Protection of People’s Health." In TELe-Health, 79–89. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-28661-7_6.
Full textDucheine, Paul, and Peter Pijpers. "The Missing Component in Deterrence Theory: The Legal Framework." In NL ARMS, 475–500. The Hague: T.M.C. Asser Press, 2020. http://dx.doi.org/10.1007/978-94-6265-419-8_25.
Full textConference papers on the topic "Military IoT"
Gotarane, Vishal, and Sandeep Raskar. "IoT Practices in Military Applications." In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2019. http://dx.doi.org/10.1109/icoei.2019.8862559.
Full textFongen, Anders, and Federico Mancini. "Integrity attestation in military IoT." In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389102.
Full textP., Raja, and Swapnil Bagwari. "IoT Based Military Assistance and Surveillance." In 2018 International Conference on Intelligent Circuits and Systems (ICICS). IEEE, 2018. http://dx.doi.org/10.1109/icics.2018.00076.
Full textRoutray, Sudhir K., Abhishek Javali, Anindita Sahoo, K. P. Sharmila, and Sharath Anand. "Military Applications of Satellite Based IoT." In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2020. http://dx.doi.org/10.1109/icssit48917.2020.9214284.
Full textWang, Jun, Fan Jiang, and Chao Xie. "The Application of IOT to Military Logistics." In Inernational Conference of Logistics Engineering and Management 2012. Reston, VA: American Society of Civil Engineers, 2012. http://dx.doi.org/10.1061/9780784412602.0066.
Full textJafari, Hossein, Oluwaseyi Omotere, Damilola Adesina, Hsiang-Huang Wu, and Lijun Qian. "IoT Devices Fingerprinting Using Deep Learning." In MILCOM 2018 - IEEE Military Communications Conference. IEEE, 2018. http://dx.doi.org/10.1109/milcom.2018.8599826.
Full textKavipriya, P., G. Jegan, Edara Venkat, and Deevi Nikhil Ranganadh. "Design of IOT Based Multifunctional Camouflage Military Robot." In 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). IEEE, 2021. http://dx.doi.org/10.1109/icais50930.2021.9395991.
Full textUtsav, Ankur, Amit Abhishek, P. Suraj, and Ritesh Kr Badhai. "An IoT Based UAV Network For Military Applications." In 2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2021. http://dx.doi.org/10.1109/wispnet51692.2021.9419470.
Full textKambourakis, Georgios, Constantinos Kolias, and Angelos Stavrou. "The Mirai botnet and the IoT Zombie Armies." In 2017 IEEE Military Communications Conference (MILCOM). IEEE, 2017. http://dx.doi.org/10.1109/milcom.2017.8170867.
Full textWrona, Konrad. "Securing the Internet of Things a military perspective." In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389105.
Full textReports on the topic "Military IoT"
Gaines, Robert J. Future Information Operations (IO) in the Military: Is It Time for an 'IO CINC'. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada388433.
Full textKeogh, Susan. Is It Genocide? The Military Implications. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada442834.
Full textFaires, Jack, Joseph Whitley, Bruce Wilson, and Richard Pyatt. Military Retirement -- Is it Time to Change? Fort Belvoir, VA: Defense Technical Information Center, May 1998. http://dx.doi.org/10.21236/ada351369.
Full textTart, Randal G. Civil-Military Relations and Gen. Maxwell Taylor: Getting It Right and Getting It Wrong! Fort Belvoir, VA: Defense Technical Information Center, April 1997. http://dx.doi.org/10.21236/ada326488.
Full textMullen, III, and William F. The Civil-Military Gap: Why It Exists And What Should Be Done About It. Fort Belvoir, VA: Defense Technical Information Center, May 2002. http://dx.doi.org/10.21236/ada511234.
Full textKonaev, Margarita, Husanjot Chahal, Ryan Fedsiuk, Tina Huang, and Ilya Rahkovsky. U.S. Military Investments in Autonomy and AI: A Strategic Assessment. Center for Security and Emerging Technology, October 2020. http://dx.doi.org/10.51593/20190044.
Full textNunley, Robert E. Judicial Privilege: Does It Have a Role in Military Courts-Martial. Fort Belvoir, VA: Defense Technical Information Center, April 1992. http://dx.doi.org/10.21236/ada456578.
Full textPrintz, Scott A. U.S. Military Presence in a Post-Unified Korea: Is It Required. Fort Belvoir, VA: Defense Technical Information Center, February 2006. http://dx.doi.org/10.21236/ada448748.
Full textSittnick, Stephen M. The Civil-Military Thing: How Does a Soldier Get It Right. Fort Belvoir, VA: Defense Technical Information Center, March 1999. http://dx.doi.org/10.21236/ada363886.
Full textChervinchuk, Alina. THE CONCEPT OF ENEMY: REPRESENTATION IN THE UKRAINIAN MILITARY DOCUMENTARIES. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11063.
Full text