Literatura académica sobre el tema "Military IoT"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Military IoT".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Military IoT"
Sonare, Renuka Chandrakant y Dinesh V. Rojatkar. "Application OF IoT in Military Service". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31 de octubre de 2017): 794–97. http://dx.doi.org/10.31142/ijtsrd4629.
Texto completoToth, Andreas. "Internet of Things Vulnerabilities in Military Environments". Vojenské rozhledy 30, n.º 3 (8 de septiembre de 2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.
Texto completoKattimani, Miss Jyoti G. "Military Health System using IOT". International Journal for Research in Applied Science and Engineering Technology 7, n.º 4 (30 de abril de 2019): 2889–94. http://dx.doi.org/10.22214/ijraset.2019.4486.
Texto completoL., Kirubakaran, Sangeetha G., Rathna Priya y Sudharsan S. "Military Surveillance System using IOT". International Journal of Computer Applications 176, n.º 15 (15 de abril de 2020): 27–31. http://dx.doi.org/10.5120/ijca2020920067.
Texto completoLu, Ye, Chao Xie y Li Shang. "Study on the Transformation of Military Logistical of Internet of Things Era". Applied Mechanics and Materials 596 (julio de 2014): 119–22. http://dx.doi.org/10.4028/www.scientific.net/amm.596.119.
Texto completoCha, Sungyong, Seungsoo Baek, Sooyoung Kang y Seungjoo Kim. "Security Evaluation Framework for Military IoT Devices". Security and Communication Networks 2018 (3 de julio de 2018): 1–12. http://dx.doi.org/10.1155/2018/6135845.
Texto completoKumar K S, Yashwanth y Dr Narasimha Murthy M S. "Design of Monitor Individuals Health using IOT A IOT Application for Military Area". International Journal of Innovative Science and Research Technology 5, n.º 6 (3 de julio de 2020): 693–98. http://dx.doi.org/10.38124/ijisrt20jun291.
Texto completoPopescu, Florin. "From the IoT to the IoBT. The Path to Superior Situational Understanding". Land Forces Academy Review 24, n.º 4 (1 de diciembre de 2019): 276–82. http://dx.doi.org/10.2478/raft-2019-0034.
Texto completoJung, Seung-hoon, Jae-choon An, Jin-young Park, Yong-tae Shin y Jong-bae Kim. "An Empirical Study of the Military IoT Security Priorities". International Journal of Security and Its Applications 10, n.º 8 (31 de agosto de 2016): 13–22. http://dx.doi.org/10.14257/ijsia.2016.10.8.02.
Texto completoIyer, Brijesh y Niket Patil. "IoT enabled tracking and monitoring sensor for military applications". International Journal of System Assurance Engineering and Management 9, n.º 6 (19 de julio de 2018): 1294–301. http://dx.doi.org/10.1007/s13198-018-0727-8.
Texto completoTesis sobre el tema "Military IoT"
Avverahalli, Ravi Darshan. "Identifying and Prioritizing Critical Information in Military IoT: Video Game Demonstration". Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104070.
Texto completoMaster of Science
The IoT is transforming military and civilian environments into truly integrated cyberphysical systems (CPS), in which the dynamic physical world is tightly embedded with communication capabilities. This CPS nature of the military IoT will enable it to integrate a plethora of devices, ranging from small sensors to autonomous aerial, ground, and naval vehicles. This results in huge amount of information being transferred between the devices. However, not all the information is equally important. Broadly we can categorize information into two types: Critical and Non-Critical. For example in a military battlefield, the information about enemies is critical and information abouut the background trees is not so important. Therefore, it is essential to isolate the critical information from non-critical informaiton. This is the focus of our work. We use neural networks and some domain knowledge about the enemies to extract the critical information and use the extracted information to take control decisions. We then evalue the performance of this approach by testing it against various kinds of synthetic data sets. Finally we use an Atari Space Invaders video game to demonstrate how the extracted information can be used to make crucial decisions about enemies.
Thome, Geoffrey D. "U.S. Marine specific software interoperability requirements of the AFATDS and IOS software suites". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FThome.pdf.
Texto completoThesis advisor(s): John Osmundson, Richard Riehle. Includes bibliographical references (p. 119-123). Also available online.
Gribble, Rachael Jennifer. "What's it like to have a partner in the military? : the social and psychological experiences of women". Thesis, King's College London (University of London), 2017. https://kclpure.kcl.ac.uk/portal/en/theses/whats-it-like-to-have-a-partner-in-the-military-the-social-and-psychological-experiences-of-women(89676d66-5d29-43c0-8e07-966756aa3c81).html.
Texto completoDe, Villiers Daniel. "The application of new generation batteries in old tactical radios / D. de Villiers". Thesis, North-West University, 2007. http://hdl.handle.net/10394/738.
Texto completoThesis (M.Ing. (Electronical Engineering))--North-West University, Potchefstroom Campus, 2008.
Caramico, Giulia. "Le récit de bataille. Coripp. Ioh. 5*,49-396 [5,1-348 Petsch.]. Commentaire, traduction et texte latin". Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040021.
Texto completoSubject of this thesis is the commentary to Coripp. Ioh 5*,49-396 [=5,1-348 Petsch.], that is the description of Antonia Castra’s battle. My intention is to offer a study on Corippus’ work, where first is clear its literary importance. The heart of my thesis is the edition of the Latin text that is based on a new numbering of the verses and with some differences compared with the Diggle-Goodyear’s edition (Cambridge 1970). A very important philological discovery has allowed us to establish the real beginning of Iohannis’ book V, traditionally recognized until Diggle-Goodyear in a point determined by a G. Loewe's conjecture. In a rich introduction, divided into two sections and which precedes the commentary, we talk about the tradition of the Iohannis, through the Trivultianus 686, the only surviving manuscript, and we introduce the poet's historical background. After that, we describe the epic shapes of the book V, the very book of the Battle, between concrete history and literary stereotypes (furor bellicus like Erinys, generals’ cohortationes, aristiai, similies lead us to the same idea of “crusade” ante litteram, following an heroic and mythologic line)
Young, Mimy. "Evaluation of Non-Contact Sampling and Detection of Explosives using Receiver Operating Characteristic Curves". FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/994.
Texto completoRivoir, Cabrera Ana Laura. "Estrategias Nacionales para la Sociedad de la Información y el Conocimiento en América Latina, 2000 - 2010. El caso de Uruguay". Doctoral thesis, Universitat Oberta de Catalunya, 2013. http://hdl.handle.net/10803/132089.
Texto completoEl objetivo de la tesis fue conocer los enfoques dominantes en las estrategias sobre la Sociedad de la Información y el Conocimiento (SIC) de los países latinoamericanos en la década 2000 – 2010. A partir de una revisión bibliográfica se sostiene la existencia de dos enfoques sobre la SIC, el tecnologicista y el complejo. Se revisan once estrategias para la SIC (agendas digitales) latinoamericanas y se estudia el caso uruguayo en profundidad para comprender los factores que determinan la consolidación de los enfoques. Basado en una estrategia de investigación con técnicas cualitativas, se realizaron y analizaron noventa entrevistas a informantes calificados y actores de las políticas y se estudiaron los documentos de política.
The aim of the thesis was to determine the dominant approaches in Knowledge and Information Society (KIS) Strategies of Latin American countries in the decade from 2000 to 2010. From a literature review two approaches to the SIC were found, the “technocentric” and “complex” one. Eleven Latin American strategies for KIS (Digital Agendas) were reviewed and the Uruguayan case was studied in depth to understand the factors that determine the consolidation of the two KIS approaches. Based on a qualitative research strategy two research techniques were performed, ninety interviews with qualified informants and actors of policies and the analysis of policy documents.
Recchia, Stefano. "Limited Liability Multilateralism: The American Military, Armed Intervention, and IOs". Thesis, 2011. https://doi.org/10.7916/D8C82H8R.
Texto completoYüce, Cumhur. "Work engagement and job performance in military contexts: The moderator role of Individual Orientation to Collectivism (IOC)". Doctoral thesis, 2019. http://hdl.handle.net/10071/20579.
Texto completoEsta tese examinou o papel moderador da orientação individual para o coletivismo na relação entre o work engagement e o desempenho no trabalho em contextos militares. Começámos por descrever a literatura do work engagement e do desempenho no trabalho e a relação entre estes. Para abordar a questão de como e quando o work engagement dos militares está associado a níveis mais elevados de desempenho no trabalho, desenvolvemos dois estudos. O primeiro estudo foi qualitativo e pretendeu analisar o que caracterizava um bom desempenho militar, bem como as estratégias que os militares usam para melhorar seu desempenho. Os resultados do Estudo 1, com entrevistas a 25 militares ou líderes militares seniores em serviço ativo, oriundos de diferentes organizações militares, mostraram que embora existam algumas semelhanças com o modelo que Campbell (1990, 2012) usou para descrever o desempenho no trabalho, existem algumas singularidades do contexto militar. Uma destas singularidades é nomeadamente uma maior focalização no coletivo como fator saliente do desempenho no trabalho em contextos militares. Assim, realizámos um segundo estudo usando um desenho cross-sectional com recurso a múltiplas fontes: 150 oficiais e os seus supervisores (N = 33). Nesse estudo, analisámos o impacto que a orientação individual para o coletivismo tem na relação entre o work engagement do oficial e o desempenho no trabalho (relatado pelo seu supervisor). Os resultados mostraram que o work engagement dos oficiais estava positivamente associado ao seu desempenho no trabalho somente quando eles tinham uma maior orientação individual para o coletivismo. De acordo com os resultados dos dois estudos, argumentamos que para melhorar o desempenho individual no trabalho em contextos militares, os gestores militares devem investir na orientação individual dos funcionários para o coletivismo, treinando-os nesse sentido e reforçando essa orientação por meio de práticas de socialização.
Matos, Pedro Miguel Pinheiro de. "Paramonitoring". Master's thesis, 2018. http://hdl.handle.net/10400.26/28590.
Texto completoLibros sobre el tema "Military IoT"
University of Madras. Centre for South and Southeast Asian Studies, ed. India and Southeast Asia in IOR: A crystal gazing. Chennai: Centre for South and Southeast Asian Studies, University of Madras, 2013.
Buscar texto completoLepeshinskiĭ, I. I︠U︡. Razvitie IKT-kompetentnosti studentov uchebnykh voennykh t︠s︡entrov v uslovii︠a︡kh integrat︠s︡ii bazovogo voenno-professionalʹnogo obrazovanii︠a︡: Monografii︠a︡. Omsk: Omskiĭ gos. tekhn. universitet, 2011.
Buscar texto completoViola, Giacomo. Storie della ritirata nel Friuli della Grande Guerra: Cîl e int, diari e ricordi dell'invasione austro-tedesca. Udine: P. Gaspari, 1998.
Buscar texto completoAcțiunea politică și militară a României în 1919 in lumina corespondenței diplomatice a lui Ion I.C. Brătianu. București: Corint, 2001.
Buscar texto completoWatts, Larry. În serviciul mareșalului: Mareșalul Ion Antonescu văzut de un ofițer din cabinetul său militar ca urmare a întrevederilor avute cu Larry Watts. München: J. Dumitru, 1985.
Buscar texto completoRazov, Pavel y Sergey Evenko. The risks of social adaptation of servicemen transferred to the reserve, to the conditions of civilian life in Russia and strategies to overcome them. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1078930.
Texto completoVarol, Ozan O. Competition and Power. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190626013.003.0014.
Texto completoPattison, James. Military Assistance. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198755203.003.0008.
Texto completoStone, David R. The Military. Editado por Richard H. Immerman y Petra Goedde. Oxford University Press, 2013. http://dx.doi.org/10.1093/oxfordhb/9780199236961.013.0020.
Texto completoBeer, Yishai. Military Strategy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190881146.003.0004.
Texto completoCapítulos de libros sobre el tema "Military IoT"
Huang, Tianming. "Design and Key Technology Research of Civil-Military Integration Regulations and Standards Management System". En New Developments of IT, IoT and ICT Applied to Agriculture, 201–7. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5073-7_21.
Texto completoChudzikiewicz, Jan, Tomasz Malinowski, Janusz Furtak y Zbigniew Zieliński. "The Procedure of Key Distribution in Military IoT Networks". En Computer Networks, 34–47. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21952-9_3.
Texto completoChudzikiewicz, Jan, Tomasz Malinowski, Zbigniew Zieliński y Janusz Furtak. "Method for Determining Effective Diagnostic Structures Within the Military IoT Networks". En Computer Networks, 28–43. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59767-6_3.
Texto completoHe, Yang, Lei Wang, Sheng Hu, Changhua Yao y Xiang Zheng. "New Operators Based on Pythagorean Fuzzy Information and Their Application in Reliability Estimation of Military Sealift Transportation". En Modern Industrial IoT, Big Data and Supply Chain, 341–48. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6141-6_37.
Texto completoZieliski, Zbigniew, Jan Chudzikiewicz y Janusz Furtak. "An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT". En Internet of Things, 111–28. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02807-7_6.
Texto completoGaray, Francisco, Giovanna Morillo y Teresa Guarda. "ICT Integration in Ecuador’s Military Education: Going Beyond PowerPoint". En Smart Innovation, Systems and Technologies, 337–50. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78605-6_29.
Texto completoTasič, Jurij F., Ana Madevska Bogdanova, Jugoslav Achkoski y Aleksandar Glavinov. "Service – Oriented Architecture Model for Blood Type Analysis (Smart I (Eye) Advisory Rescue System) in Military Environment". En ICT Innovations 2013, 149–56. Heidelberg: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-01466-1_14.
Texto completoRaglin, Adrienne. "Presentation of Information Uncertainty from IoBT for Military Decision Making". En Distributed, Ambient and Pervasive Interactions, 39–47. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21935-2_4.
Texto completoNoera, Giorgio, Tonino Bombardini, Luca Ghetti, Claudio Camerino, Francesco Frezzetti y Antonio Gaddi. "Military ICT and Innovative Networks for the Protection of People’s Health". En TELe-Health, 79–89. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-28661-7_6.
Texto completoDucheine, Paul y Peter Pijpers. "The Missing Component in Deterrence Theory: The Legal Framework". En NL ARMS, 475–500. The Hague: T.M.C. Asser Press, 2020. http://dx.doi.org/10.1007/978-94-6265-419-8_25.
Texto completoActas de conferencias sobre el tema "Military IoT"
Gotarane, Vishal y Sandeep Raskar. "IoT Practices in Military Applications". En 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2019. http://dx.doi.org/10.1109/icoei.2019.8862559.
Texto completoFongen, Anders y Federico Mancini. "Integrity attestation in military IoT". En 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389102.
Texto completoP., Raja y Swapnil Bagwari. "IoT Based Military Assistance and Surveillance". En 2018 International Conference on Intelligent Circuits and Systems (ICICS). IEEE, 2018. http://dx.doi.org/10.1109/icics.2018.00076.
Texto completoRoutray, Sudhir K., Abhishek Javali, Anindita Sahoo, K. P. Sharmila y Sharath Anand. "Military Applications of Satellite Based IoT". En 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2020. http://dx.doi.org/10.1109/icssit48917.2020.9214284.
Texto completoWang, Jun, Fan Jiang y Chao Xie. "The Application of IOT to Military Logistics". En Inernational Conference of Logistics Engineering and Management 2012. Reston, VA: American Society of Civil Engineers, 2012. http://dx.doi.org/10.1061/9780784412602.0066.
Texto completoJafari, Hossein, Oluwaseyi Omotere, Damilola Adesina, Hsiang-Huang Wu y Lijun Qian. "IoT Devices Fingerprinting Using Deep Learning". En MILCOM 2018 - IEEE Military Communications Conference. IEEE, 2018. http://dx.doi.org/10.1109/milcom.2018.8599826.
Texto completoKavipriya, P., G. Jegan, Edara Venkat y Deevi Nikhil Ranganadh. "Design of IOT Based Multifunctional Camouflage Military Robot". En 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). IEEE, 2021. http://dx.doi.org/10.1109/icais50930.2021.9395991.
Texto completoUtsav, Ankur, Amit Abhishek, P. Suraj y Ritesh Kr Badhai. "An IoT Based UAV Network For Military Applications". En 2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2021. http://dx.doi.org/10.1109/wispnet51692.2021.9419470.
Texto completoKambourakis, Georgios, Constantinos Kolias y Angelos Stavrou. "The Mirai botnet and the IoT Zombie Armies". En 2017 IEEE Military Communications Conference (MILCOM). IEEE, 2017. http://dx.doi.org/10.1109/milcom.2017.8170867.
Texto completoWrona, Konrad. "Securing the Internet of Things a military perspective". En 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389105.
Texto completoInformes sobre el tema "Military IoT"
Gaines, Robert J. Future Information Operations (IO) in the Military: Is It Time for an 'IO CINC'. Fort Belvoir, VA: Defense Technical Information Center, abril de 2000. http://dx.doi.org/10.21236/ada388433.
Texto completoKeogh, Susan. Is It Genocide? The Military Implications. Fort Belvoir, VA: Defense Technical Information Center, enero de 1998. http://dx.doi.org/10.21236/ada442834.
Texto completoFaires, Jack, Joseph Whitley, Bruce Wilson y Richard Pyatt. Military Retirement -- Is it Time to Change? Fort Belvoir, VA: Defense Technical Information Center, mayo de 1998. http://dx.doi.org/10.21236/ada351369.
Texto completoTart, Randal G. Civil-Military Relations and Gen. Maxwell Taylor: Getting It Right and Getting It Wrong! Fort Belvoir, VA: Defense Technical Information Center, abril de 1997. http://dx.doi.org/10.21236/ada326488.
Texto completoMullen, III y William F. The Civil-Military Gap: Why It Exists And What Should Be Done About It. Fort Belvoir, VA: Defense Technical Information Center, mayo de 2002. http://dx.doi.org/10.21236/ada511234.
Texto completoKonaev, Margarita, Husanjot Chahal, Ryan Fedsiuk, Tina Huang y Ilya Rahkovsky. U.S. Military Investments in Autonomy and AI: A Strategic Assessment. Center for Security and Emerging Technology, octubre de 2020. http://dx.doi.org/10.51593/20190044.
Texto completoNunley, Robert E. Judicial Privilege: Does It Have a Role in Military Courts-Martial. Fort Belvoir, VA: Defense Technical Information Center, abril de 1992. http://dx.doi.org/10.21236/ada456578.
Texto completoPrintz, Scott A. U.S. Military Presence in a Post-Unified Korea: Is It Required. Fort Belvoir, VA: Defense Technical Information Center, febrero de 2006. http://dx.doi.org/10.21236/ada448748.
Texto completoSittnick, Stephen M. The Civil-Military Thing: How Does a Soldier Get It Right. Fort Belvoir, VA: Defense Technical Information Center, marzo de 1999. http://dx.doi.org/10.21236/ada363886.
Texto completoChervinchuk, Alina. THE CONCEPT OF ENEMY: REPRESENTATION IN THE UKRAINIAN MILITARY DOCUMENTARIES. Ivan Franko National University of Lviv, febrero de 2021. http://dx.doi.org/10.30970/vjo.2021.49.11063.
Texto completo