Literatura académica sobre el tema "Military IoT"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Military IoT".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Military IoT"

1

Sonare, Renuka Chandrakant y Dinesh V. Rojatkar. "Application OF IoT in Military Service". International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (31 de octubre de 2017): 794–97. http://dx.doi.org/10.31142/ijtsrd4629.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Toth, Andreas. "Internet of Things Vulnerabilities in Military Environments". Vojenské rozhledy 30, n.º 3 (8 de septiembre de 2021): 45–58. http://dx.doi.org/10.3849/2336-2995.30.2021.03.045-058.

Texto completo
Resumen
IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Kattimani, Miss Jyoti G. "Military Health System using IOT". International Journal for Research in Applied Science and Engineering Technology 7, n.º 4 (30 de abril de 2019): 2889–94. http://dx.doi.org/10.22214/ijraset.2019.4486.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

L., Kirubakaran, Sangeetha G., Rathna Priya y Sudharsan S. "Military Surveillance System using IOT". International Journal of Computer Applications 176, n.º 15 (15 de abril de 2020): 27–31. http://dx.doi.org/10.5120/ijca2020920067.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Lu, Ye, Chao Xie y Li Shang. "Study on the Transformation of Military Logistical of Internet of Things Era". Applied Mechanics and Materials 596 (julio de 2014): 119–22. http://dx.doi.org/10.4028/www.scientific.net/amm.596.119.

Texto completo
Resumen
The paper discussed the basic conceptions of Internet of Things (IOT), its structure and key technology. It expounded the application principle, development and practice of military IOT technology from the aspects of military logistics, asset management, materiel support, mobilization and barracks management, combined with instances. Finally, the problems in application and current developing status of the military IOT technology were expatiated upon in terms of the military IOT technology standard and RFID technology safety.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Cha, Sungyong, Seungsoo Baek, Sooyoung Kang y Seungjoo Kim. "Security Evaluation Framework for Military IoT Devices". Security and Communication Networks 2018 (3 de julio de 2018): 1–12. http://dx.doi.org/10.1155/2018/6135845.

Texto completo
Resumen
IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system’s connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT’s benefits. Coping with these cybersecurity threats nowadays, we require the implementation of “security by design” concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt “security by design” when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address cybersecurity requirements using international standard security control.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Kumar K S, Yashwanth y Dr Narasimha Murthy M S. "Design of Monitor Individuals Health using IOT A IOT Application for Military Area". International Journal of Innovative Science and Research Technology 5, n.º 6 (3 de julio de 2020): 693–98. http://dx.doi.org/10.38124/ijisrt20jun291.

Texto completo
Resumen
The universe of medical science is a developing zone that has quickened with new innovations and this is the point at which the vision of "The Internet of things (IoT)" has transformed into the real world. IoT can assume a critical job in observing indispensable organs of people in the field of National Guard. Remote wellbeing observing (utilizing IoT) is one of the potential answers for this interest. Remote wellbeing observing can be best used gave the device is wearable to encourage self checking. Right now a framework for observing of heartbeat rate, internal heat level (essential body parameters) of the individual with committed sensors and IoT. A framework is wearable and furthermore bolsters remote wellbeing observing. Remote wellbeing observing is performed by putting all the gathered information to cloud, this information can be recovered by the specialist for examination anywhere. Along with remote checking and wearability of framework, precision and cost can't be disregarded. An ideal exchange off among precision and cost of the framework is practiced by picking fitting temperature sensor and pulse rate sensor. The heart beat rate and temperature of an individual at various time moments are estimated by the sensors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Popescu, Florin. "From the IoT to the IoBT. The Path to Superior Situational Understanding". Land Forces Academy Review 24, n.º 4 (1 de diciembre de 2019): 276–82. http://dx.doi.org/10.2478/raft-2019-0034.

Texto completo
Resumen
Abstract In order to maintain and improve its competitive advantage, the ability of 21st-century armies to recognize, anticipate, adapt and manipulate IoT on the future battlefield is important. The explosive growth of innovation in the commercial sector which utilizes the integration of cloud computing, mobile communications, sensor data collection networks and artificial intelligence is a major challenge for the military. A new concept, still untapped, called the Battlefield Things Internet (IoBT) comes from here.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Jung, Seung-hoon, Jae-choon An, Jin-young Park, Yong-tae Shin y Jong-bae Kim. "An Empirical Study of the Military IoT Security Priorities". International Journal of Security and Its Applications 10, n.º 8 (31 de agosto de 2016): 13–22. http://dx.doi.org/10.14257/ijsia.2016.10.8.02.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Iyer, Brijesh y Niket Patil. "IoT enabled tracking and monitoring sensor for military applications". International Journal of System Assurance Engineering and Management 9, n.º 6 (19 de julio de 2018): 1294–301. http://dx.doi.org/10.1007/s13198-018-0727-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Military IoT"

1

Avverahalli, Ravi Darshan. "Identifying and Prioritizing Critical Information in Military IoT: Video Game Demonstration". Thesis, Virginia Tech, 2021. http://hdl.handle.net/10919/104070.

Texto completo
Resumen
Current communication and network systems are not built for delay-sensitive applications. The most obvious fact is that the communication capacity is only achievable in theory with infinitely long codes, which means infinitely long delays. One remedy for this is to use shorter codes. Conceptually, there is a deeper reason for the difficulties in such solutions: in Shannon's original 1948 paper, he started out by stating that the "semantic aspects" of information is "irrelevant" to communications. Hence, in Shannon's communication system, as well as every network built after him, we put all information into a uniform bit-stream, regardless what meanings they carry, and we transmit these bits over the network as a single type of commodity. Consequently, the network system can only provide a uniform level of error protection and latency control to all these bits. We argue that such a single measure of latency, or Age of Information (AoI), is insufficient for military Internet of Things (IoT) applications that inherently connect the communication network witha cyber-physical system. For example, a self-driving military vehicle might send to the controller a front-view image. Clearly, not everything in the image is equally important for the purpose of steering the vehicle: an approaching vehicle is a much more urgent piece of information than a tree in the background. Similar examples can be seen for other military IoT devices, such as drones and sensors. In this work, we present a new approach that inherently extarcts the most critical information in a Military Battlefield IoT scenatio by using a metric - called H-Score. This ensures the neural network to only concentrate on the most important information and ignore all background informaiton. We then carry out extensive evaluation of this a by testing it against various inputs, ranging from a vector of numbers to a 1000x1000 pixel image. Next, we introduce the concept of Manual Marginalization, which helps us to make independent decisions for each object in the image. We also develop a video game that captures the essence of a military battlefield scenario and test our developed algorithm here. Finally, we apply our approach on a simple Atari Space Invaders video game to shoot down enemies before they fire at us.
Master of Science
The IoT is transforming military and civilian environments into truly integrated cyberphysical systems (CPS), in which the dynamic physical world is tightly embedded with communication capabilities. This CPS nature of the military IoT will enable it to integrate a plethora of devices, ranging from small sensors to autonomous aerial, ground, and naval vehicles. This results in huge amount of information being transferred between the devices. However, not all the information is equally important. Broadly we can categorize information into two types: Critical and Non-Critical. For example in a military battlefield, the information about enemies is critical and information abouut the background trees is not so important. Therefore, it is essential to isolate the critical information from non-critical informaiton. This is the focus of our work. We use neural networks and some domain knowledge about the enemies to extract the critical information and use the extracted information to take control decisions. We then evalue the performance of this approach by testing it against various kinds of synthetic data sets. Finally we use an Atari Space Invaders video game to demonstrate how the extracted information can be used to make crucial decisions about enemies.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Thome, Geoffrey D. "U.S. Marine specific software interoperability requirements of the AFATDS and IOS software suites". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FThome.pdf.

Texto completo
Resumen
Thesis (M.S. in Information Technology Management and M.S. in Software Engineering)--Naval Postgraduate School, September 2002.
Thesis advisor(s): John Osmundson, Richard Riehle. Includes bibliographical references (p. 119-123). Also available online.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Gribble, Rachael Jennifer. "What's it like to have a partner in the military? : the social and psychological experiences of women". Thesis, King's College London (University of London), 2017. https://kclpure.kcl.ac.uk/portal/en/theses/whats-it-like-to-have-a-partner-in-the-military-the-social-and-psychological-experiences-of-women(89676d66-5d29-43c0-8e07-966756aa3c81).html.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

De, Villiers Daniel. "The application of new generation batteries in old tactical radios / D. de Villiers". Thesis, North-West University, 2007. http://hdl.handle.net/10394/738.

Texto completo
Resumen
The power requirement for the soldier's equipment is largely supplied by batteries. Situational awareness is critical for a soldier to perform his tasks. Therefore the radio used by the soldier is a key element in situational awareness and also consumes the most power. The South African National Defence Force (SANDF) uses the A43 tactical radio specifically designed for them. The radios are regarded as old technology but will be in use for about another five years. The radios still use non-rechargeable alkaline batteries which do not last very long and are not cost effective. The purpose of this study is to research the new generation secondary batteries as a possible replacement for the alkaline battery packs. The new generation batteries investigated in this study are the latest rechargeable batteries, also called secondary batteries. They include nickel cadmium, nickel metal hydride, lithium ion, rechargeable alkaline manganese and zinc air. The main features of rechargeable cells are covered and the cell characteristics are defined to allow the technology to be matched to the user requirement. Li-ion technology was found to be the best choice. This research also showed that international trends in battery usage are towards Li-ion. A new Li-ion battery was designed based on commercial cells. Tests showed that commercial Li-ion cells can be used in the radio and that they outperform the current battery by far. The study also examined the design of a New Generation Battery System consisting of an intelligent battery, a charger which uses a Systems Management Bus and a battery 'state of health" analyser to assist the user to maintain the batteries. Tests were done to demonstrate that the battery can withstand typical military environmental conditions. Expected military missions for a battery system were defined and used to compare the cost between the existing batteries and the new batteries system. Important usage factors which will influence the client when using a New Generation Battery System were addressed. To summarise, this study showed that by using a New Generation Battery System, the SANDF could relieve the operational cost of the A43 radio while saving on weight and enabling the soldier to carry out longer missions.
Thesis (M.Ing. (Electronical Engineering))--North-West University, Potchefstroom Campus, 2008.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Caramico, Giulia. "Le récit de bataille. Coripp. Ioh. 5*,49-396 [5,1-348 Petsch.]. Commentaire, traduction et texte latin". Thesis, Paris 4, 2010. http://www.theses.fr/2010PA040021.

Texto completo
Resumen
Cette thèse se propose d'offrir un commentaire linguistique, philologique, rhétorique des vers 49-396 [ = 1-348 Petsch.] du livre V, qui est le livre de la bataille d’Antonia Castra, et une analyse de l'œuvre, qui montre in primis son importance littéraire. Le cœur de ma thèse est l'édition du texte latin présenté selon une nouvelle numérotation et avec quelques différences par rapport au texte de Diggle-Goodyear (Cambridge 1970). Une importante découverte philologique nous a permis d'établir le véritable incipit du livre V de la Iohannis, jusqu’à présent reconnu traditionnellement dans en un endroit déterminé par une conjecture de G. Loewe, accueillie par l'édition Petschenig et après Diggle-Goodyear. Dans une riche introduction divisée en deux sections et qui précède le commentaire, on parle de la tradition du texte et on encadre historiquement l'activité du poète. Après, nous décrivons les formes d'écriture épique du livre V de la Iohannis, livre par excellence de la Bataille, entre histoire et clichés littéraires (furor bellicus comme Erinys, cohortationes des généraux aristiai, similitudes conduisent à la même idée de guerre sainte, dans une lignée héroïque et mythologique)
Subject of this thesis is the commentary to Coripp. Ioh 5*,49-396 [=5,1-348 Petsch.], that is the description of Antonia Castra’s battle. My intention is to offer a study on Corippus’ work, where first is clear its literary importance. The heart of my thesis is the edition of the Latin text that is based on a new numbering of the verses and with some differences compared with the Diggle-Goodyear’s edition (Cambridge 1970). A very important philological discovery has allowed us to establish the real beginning of Iohannis’ book V, traditionally recognized until Diggle-Goodyear in a point determined by a G. Loewe's conjecture. In a rich introduction, divided into two sections and which precedes the commentary, we talk about the tradition of the Iohannis, through the Trivultianus 686, the only surviving manuscript, and we introduce the poet's historical background. After that, we describe the epic shapes of the book V, the very book of the Battle, between concrete history and literary stereotypes (furor bellicus like Erinys, generals’ cohortationes, aristiai, similies lead us to the same idea of “crusade” ante litteram, following an heroic and mythologic line)
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Young, Mimy. "Evaluation of Non-Contact Sampling and Detection of Explosives using Receiver Operating Characteristic Curves". FIU Digital Commons, 2013. http://digitalcommons.fiu.edu/etd/994.

Texto completo
Resumen
The growing need for fast sampling of explosives in high throughput areas has increased the demand for improved technology for the trace detection of illicit compounds. Detection of the volatiles associated with the presence of the illicit compounds offer a different approach for sensitive trace detection of these compounds without increasing the false positive alarm rate. This study evaluated the performance of non-contact sampling and detection systems using statistical analysis through the construction of Receiver Operating Characteristic (ROC) curves in real-world scenarios for the detection of volatiles in the headspace of smokeless powder, used as the model system for generalizing explosives detection. A novel sorbent coated disk coined planar solid phase microextraction (PSPME) was previously used for rapid, non-contact sampling of the headspace containers. The limits of detection for the PSPME coupled to IMS detection was determined to be 0.5-24 ng for vapor sampling of volatile chemical compounds associated with illicit compounds and demonstrated an extraction efficiency of three times greater than other commercially available substrates, retaining >50% of the analyte after 30 minutes sampling of an analyte spike in comparison to a non-detect for the unmodified filters. Both static and dynamic PSPME sampling was used coupled with two ion mobility spectrometer (IMS) detection systems in which 10-500 mg quantities of smokeless powders were detected within 5-10 minutes of static sampling and 1 minute of dynamic sampling time in 1-45 L closed systems, resulting in faster sampling and analysis times in comparison to conventional solid phase microextraction-gas chromatography-mass spectrometry (SPME-GC-MS) analysis. Similar real-world scenarios were sampled in low and high clutter environments with zero false positive rates. Excellent PSPME-IMS detection of the volatile analytes were visualized from the ROC curves, resulting with areas under the curves (AUC) of 0.85-1.0 and 0.81-1.0 for portable and bench-top IMS systems, respectively. Construction of ROC curves were also developed for SPME-GC-MS resulting with AUC of 0.95-1.0, comparable with PSPME-IMS detection. The PSPME-IMS technique provides less false positive results for non-contact vapor sampling, cutting the cost and providing an effective sampling and detection needed in high-throughput scenarios, resulting in similar performance in comparison to well-established techniques with the added advantage of fast detection in the field.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Rivoir, Cabrera Ana Laura. "Estrategias Nacionales para la Sociedad de la Información y el Conocimiento en América Latina, 2000 - 2010. El caso de Uruguay". Doctoral thesis, Universitat Oberta de Catalunya, 2013. http://hdl.handle.net/10803/132089.

Texto completo
Resumen
L'objectiu de la tesi va ser conèixer els enfocaments dominants en les estratègies sobre la Societat de la Informació i el Coneixement (SIC) dels països llatinoamericans en la dècada 2000-2010. A partir d'una revisió bibliogràfica se sosté l'existència de dos enfocaments sobre la SIC, el tecnologicista i el complex. Es revisen 11 estratègies per a la SIC (agendes digitals) llatinoamericanes i s'estudia el cas uruguaià en profunditat per comprendre els factors que determinen la consolidació dels enfocaments. Basat en una estratègia d'investigació amb tècniques qualitatives, es van realitzar i analitzar noranta entrevistes a informants qualificats i actors de les polítiques i es van estudiar els documents de política.
El objetivo de la tesis fue conocer los enfoques dominantes en las estrategias sobre la Sociedad de la Información y el Conocimiento (SIC) de los países latinoamericanos en la década 2000 – 2010. A partir de una revisión bibliográfica se sostiene la existencia de dos enfoques sobre la SIC, el tecnologicista y el complejo. Se revisan once estrategias para la SIC (agendas digitales) latinoamericanas y se estudia el caso uruguayo en profundidad para comprender los factores que determinan la consolidación de los enfoques. Basado en una estrategia de investigación con técnicas cualitativas, se realizaron y analizaron noventa entrevistas a informantes calificados y actores de las políticas y se estudiaron los documentos de política.
The aim of the thesis was to determine the dominant approaches in Knowledge and Information Society (KIS) Strategies of Latin American countries in the decade from 2000 to 2010. From a literature review two approaches to the SIC were found, the “technocentric” and “complex” one. Eleven Latin American strategies for KIS (Digital Agendas) were reviewed and the Uruguayan case was studied in depth to understand the factors that determine the consolidation of the two KIS approaches. Based on a qualitative research strategy two research techniques were performed, ninety interviews with qualified informants and actors of policies and the analysis of policy documents.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Recchia, Stefano. "Limited Liability Multilateralism: The American Military, Armed Intervention, and IOs". Thesis, 2011. https://doi.org/10.7916/D8C82H8R.

Texto completo
Resumen
Under what conditions and for what reasons do American leaders seek the endorsement of relevant international organizations (IOs) such as the UN or NATO for prospective military interventions? My central hypothesis is that U.S. government efforts to obtain IO approval for prospective interventions are frequently the result of significant bureaucratic deliberations and bargaining between hawkish policy leaders who emphasize the likely positive payoffs of a prompt use of force, on the one side, and skeptical officials--with the top military brass and war veterans in senior policy positions at the forefront--who highlight its potential downsides and long-term costs, on the other. The military leaders--the chairman and vice chairman of the Joint Chiefs of Staff (JCS), the regional combatant commanders, and senior planners on the Joint Staff in Washington--are generally skeptical of humanitarian and other "idealist" interventions that aim to change the domestic politics of foreign countries; they naturally tend to consider all the potential downsides of intervention, given their operational focus; and they usually worry more than activist civilian policy officials about public and congressional support for protracted engagements. Assuming that the military leaders are not merely stooges of the civilian leadership, they are at first likely to altogether resist a prospective intervention, when they believe that no vital American interests are at stake and fear an open-ended deployment of U.S. troops. Given the military's professional expertise and their standing in American society, they come close to holding a de facto veto over prospective interventions they clearly oppose. I hypothesize that confronted with such great initial reluctance or opposition on the part of the military brass, civilian advocates of intervention from other government agencies will seek inter alia to obtain an advance endorsement from relevant IOs, so as to lock in international support and thereby reassure the military and their bureaucratic allies that the long-term costs to the United States in terms of postwar peacekeeping and stabilization will be limited. That, in turn, can be expected to help forge a winning bureaucratic coalition in Washington and persuade the president to authorize military action. United States multilateralism for military interventions is thus often a genuine policy resultant--the outcome of sustained bureaucratic deliberations and bargaining--and it may not actually reflect the initial preferences of any particular government agency or senior official.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Yüce, Cumhur. "Work engagement and job performance in military contexts: The moderator role of Individual Orientation to Collectivism (IOC)". Doctoral thesis, 2019. http://hdl.handle.net/10071/20579.

Texto completo
Resumen
This thesis examined the moderating role of individual orientation to collectivism in the relationship between work engagement and job performance in military contexts. We began by describing the work engagement and job performance literature and the relationship between them. To address the question of how and when would work engagement of military be associated with higher levels of job performance, we developed two studies. The first study was qualitative and pretended to analise what characterized a good performer in the military, as well as the strategies that militaries use to enhance their performance. Results of Study 1, with interviews to 25 staff officers or senior military leaders in active service from different military organizations, showed that although there are some similarities with the job performance model that Campbell (1990, 2012) used to describe job performance, there are some singularities of the military context. Namely, a focus on the collective had been identified as a salient factor of job performance in military contexts. Thus, we conducted a second study using a multi-source cross –sectional design with 150 military staff officers and their supervisors (N=33). In that study, we analysed the impact of individual orientation to collectivism for the relationship between staff officers’ work engagement and job performance (reported by the supervisor) in a military context. The results demonstrated that staff officers’ work engagement was positively associated with their job performance (reported by their supervisor) only when they had higher levels of orientation to collectivism. According to the results of the two studies, we argue that in order to improve individual job performance in military contexts, military managers should invest on staff officers’ orientation to collectivism by training them and reinforcing that orientation through socialization practices.
Esta tese examinou o papel moderador da orientação individual para o coletivismo na relação entre o work engagement e o desempenho no trabalho em contextos militares. Começámos por descrever a literatura do work engagement e do desempenho no trabalho e a relação entre estes. Para abordar a questão de como e quando o work engagement dos militares está associado a níveis mais elevados de desempenho no trabalho, desenvolvemos dois estudos. O primeiro estudo foi qualitativo e pretendeu analisar o que caracterizava um bom desempenho militar, bem como as estratégias que os militares usam para melhorar seu desempenho. Os resultados do Estudo 1, com entrevistas a 25 militares ou líderes militares seniores em serviço ativo, oriundos de diferentes organizações militares, mostraram que embora existam algumas semelhanças com o modelo que Campbell (1990, 2012) usou para descrever o desempenho no trabalho, existem algumas singularidades do contexto militar. Uma destas singularidades é nomeadamente uma maior focalização no coletivo como fator saliente do desempenho no trabalho em contextos militares. Assim, realizámos um segundo estudo usando um desenho cross-sectional com recurso a múltiplas fontes: 150 oficiais e os seus supervisores (N = 33). Nesse estudo, analisámos o impacto que a orientação individual para o coletivismo tem na relação entre o work engagement do oficial e o desempenho no trabalho (relatado pelo seu supervisor). Os resultados mostraram que o work engagement dos oficiais estava positivamente associado ao seu desempenho no trabalho somente quando eles tinham uma maior orientação individual para o coletivismo. De acordo com os resultados dos dois estudos, argumentamos que para melhorar o desempenho individual no trabalho em contextos militares, os gestores militares devem investir na orientação individual dos funcionários para o coletivismo, treinando-os nesse sentido e reforçando essa orientação por meio de práticas de socialização.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Matos, Pedro Miguel Pinheiro de. "Paramonitoring". Master's thesis, 2018. http://hdl.handle.net/10400.26/28590.

Texto completo
Resumen
As operações militares de paraquedismo com saltos a 35000 pés de altitude são realizadas em condições extremas e no limite da sobrevivência. Atualmente são usados métodos empíricos para controlo dos sinais vitais, baseados na observação e experiência dos operacionais. O trabalho desenvolvido neste projeto consistiu em criar uma infraestrutura de comunicação com tecnologias Low Power Wide Area Network (LPWAN), que permita a transmissão dos sinais biométricos, ambientais e de localização recolhidos. São gerados sinais de alarme em caso de emergência, é realizado o seguimento da localização de cada nó em tempo real, assim como a transmissão dos dados que são guardados para uma posterior análise especializada. Foi desenvolvida uma rede de sensores com um protótipo composto por três nós, um por cada paraquedista e por um gateway localizado remotamente. Cada nó de sensores tem a capacidade de aquisição de dados de oximetria, da pressão barométrica e da temperatura no ambiente envolvente, assim como das coordenadas de geolocalização. O sistema desenvolvido permite o envio de alertas para os outros nós, assim como o envio de mensagens dos nós para o gateway. O gateway tem a capacidade de realizar a gestão dos utilizadores, de receber e guardar os dados de cada um, assim como permitir a monitorização em tempo real da localização de cada nó em mapas offline. Foram realizados testes em laboratório e em ambiente real. Os resultados em laboratório obtidos foram bastante satisfatórios e com grande potencial, demonstrando uma grande estabilidade dos dispositivos desenvolvidos. Os testes em ambiente real foram bastante esclarecedores quanto às limitações do hardware desenvolvido tendo em conta as condições severas de operação. No entanto, os resultados foram bastante conclusivos sobre as possíveis abordagens para o desenvolvimento de uma versão do protótipo mais robusta
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Military IoT"

1

University of Madras. Centre for South and Southeast Asian Studies, ed. India and Southeast Asia in IOR: A crystal gazing. Chennai: Centre for South and Southeast Asian Studies, University of Madras, 2013.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Lepeshinskiĭ, I. I︠U︡. Razvitie IKT-kompetentnosti studentov uchebnykh voennykh t︠s︡entrov v uslovii︠a︡kh integrat︠s︡ii bazovogo voenno-professionalʹnogo obrazovanii︠a︡: Monografii︠a︡. Omsk: Omskiĭ gos. tekhn. universitet, 2011.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Viola, Giacomo. Storie della ritirata nel Friuli della Grande Guerra: Cîl e int, diari e ricordi dell'invasione austro-tedesca. Udine: P. Gaspari, 1998.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Acțiunea politică și militară a României în 1919 in lumina corespondenței diplomatice a lui Ion I.C. Brătianu. București: Corint, 2001.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Watts, Larry. În serviciul mareșalului: Mareșalul Ion Antonescu văzut de un ofițer din cabinetul său militar ca urmare a întrevederilor avute cu Larry Watts. München: J. Dumitru, 1985.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Razov, Pavel y Sergey Evenko. The risks of social adaptation of servicemen transferred to the reserve, to the conditions of civilian life in Russia and strategies to overcome them. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1078930.

Texto completo
Resumen
It analyzes the risks of social adaptation to civil life in Russia — one of the main difficulties of servicemen transferred to the reserve — as well as strategies to overcome them. The urgency of studying this problem by sociologists due to the importance of sociological understanding of specific social adaptation of discharged military personnel and caused by the process problems, because their solution depends not only social and professional well-being of the social group, but also the status of the military in Russian society, the prestige of military service, much lower in the post-Soviet period. Designed for graduate students, researchers interested in the sociology of risk.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Varol, Ozan O. Competition and Power. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190626013.003.0014.

Texto completo
Resumen
One-partyism refers to the capture of government institutions by a single political party. This chapter explores the institutions that may be available to promote the virtues of multipartyism in a budding democracy while combating the vices of one-partyism. Specifically it argues that the military may have an incentive to combat one-partyism and, in doing so, promote political pluralism. A dominant party can spell trouble for the military. If a political party becomes too strong, it can threaten the military, cut back the military’s powers, or slash the military’s economic and social privileges. In contrast, by curbing one-partyism, the military may achieve more autonomy. Like the judiciary, the military may find more comfort in the division of political powers that comes with political pluralism. The desire to bring down the dominant party a peg or two may serve as an incentive for the military to promote competition among political parties.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Pattison, James. Military Assistance. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198755203.003.0008.

Texto completo
Resumen
This chapter considers the case for military assistance to rebels and states. It first rejects three considerations that one might think provide sufficient reason to uphold an absolute prohibition on arming rebels. To that extent, it might (exceptionally) be permissible to arm rebels. The chapter argues, though, that arming rebels should generally be eschewed. This is because of the problems raised by the ‘Rebel-Risk Objection’, the ‘Escalation Objection’, and the ‘Diffusion Objection’. The chapter also argues that many of these objections apply to arming states. In doing so, it also largely repudiates the case for arming states against non-state actors engaged in aggression and mass atrocities.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Stone, David R. The Military. Editado por Richard H. Immerman y Petra Goedde. Oxford University Press, 2013. http://dx.doi.org/10.1093/oxfordhb/9780199236961.013.0020.

Texto completo
Resumen
This chapter examines the military history of the Cold War. It explains that most military activities during this period were focused on apocalyptic nuclear war which never came and that the military aspects of the Cold War contributed to its end. The chapter suggests that while the military side of the Cold War did play a major role in ending the Cold War, it was not because of the policies of U.S. President Ronald Reagan, for there is little evidence that they were intended to produce moderation in Soviet leadership. It argues that reforms initiated by Soviet leader Mikhail Gorbachev came from the realization of the decay of Soviet military superiority and the increasing economic burden of defense spending.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Beer, Yishai. Military Strategy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190881146.003.0004.

Texto completo
Resumen
This chapter points at a paradox related to the gap between law and reality. Since it is the strategic level of war that mostly affects war’s conduct, one might have expected that the law of armed conflict—whose stated agenda is to humanize war’s arena—would focus upon it. The current law, however, generally ignores the strategic discourse and prefers to scrutinize the conduct of war through a tactical lens. This chapter challenges the current blind spot of the law: its disregard of the direct consequences of war strategy and the war aims derived from it. Ignoring reality by disregarding military strategy carries a humanitarian price that will be demonstrated in the prevailing law of targeting. The chapter asks of those who want to comprehensively reduce war’s hazards to think strategically—indeed, to face reality—and to leverage military strategy as a constraining tool.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Military IoT"

1

Huang, Tianming. "Design and Key Technology Research of Civil-Military Integration Regulations and Standards Management System". En New Developments of IT, IoT and ICT Applied to Agriculture, 201–7. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5073-7_21.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Chudzikiewicz, Jan, Tomasz Malinowski, Janusz Furtak y Zbigniew Zieliński. "The Procedure of Key Distribution in Military IoT Networks". En Computer Networks, 34–47. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21952-9_3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Chudzikiewicz, Jan, Tomasz Malinowski, Zbigniew Zieliński y Janusz Furtak. "Method for Determining Effective Diagnostic Structures Within the Military IoT Networks". En Computer Networks, 28–43. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59767-6_3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

He, Yang, Lei Wang, Sheng Hu, Changhua Yao y Xiang Zheng. "New Operators Based on Pythagorean Fuzzy Information and Their Application in Reliability Estimation of Military Sealift Transportation". En Modern Industrial IoT, Big Data and Supply Chain, 341–48. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-6141-6_37.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Zieliski, Zbigniew, Jan Chudzikiewicz y Janusz Furtak. "An Approach to Integrating Security and Fault Tolerance Mechanisms into the Military IoT". En Internet of Things, 111–28. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02807-7_6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Garay, Francisco, Giovanna Morillo y Teresa Guarda. "ICT Integration in Ecuador’s Military Education: Going Beyond PowerPoint". En Smart Innovation, Systems and Technologies, 337–50. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78605-6_29.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Tasič, Jurij F., Ana Madevska Bogdanova, Jugoslav Achkoski y Aleksandar Glavinov. "Service – Oriented Architecture Model for Blood Type Analysis (Smart I (Eye) Advisory Rescue System) in Military Environment". En ICT Innovations 2013, 149–56. Heidelberg: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-01466-1_14.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Raglin, Adrienne. "Presentation of Information Uncertainty from IoBT for Military Decision Making". En Distributed, Ambient and Pervasive Interactions, 39–47. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21935-2_4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Noera, Giorgio, Tonino Bombardini, Luca Ghetti, Claudio Camerino, Francesco Frezzetti y Antonio Gaddi. "Military ICT and Innovative Networks for the Protection of People’s Health". En TELe-Health, 79–89. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-28661-7_6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Ducheine, Paul y Peter Pijpers. "The Missing Component in Deterrence Theory: The Legal Framework". En NL ARMS, 475–500. The Hague: T.M.C. Asser Press, 2020. http://dx.doi.org/10.1007/978-94-6265-419-8_25.

Texto completo
Resumen
AbstractThis chapter takes the starting point that the power to deter consists of three components: (physical) capacities, concepts (strategy, plans, decision-making procedures) and will (moral, determination, audacity). In case one of these components is underdeveloped or not in place, (coercive) power fails. Modern technologies (e.g. ICT, AI) and strategic insights (e.g. the utility of soft and smart power) urge for a reinterpretation of the ‘physical’ component, and include cyber capacities as well as culture, knowledge or law(fare) as capacities (or power instruments), too. Moreover, and taking cyber capabilities as a test case, these developments put even more weight on the conceptual and moral components of power. This chapter focusses on the legal framework as a key, but underrated, conceptual element of deterrent power. Using cyber threats as a case, it offers a legal framework enabling decision-makers to effectively generate deterrent power by showing which legal bases (should) undergird the employment of the variety of responses available to States. In democratic rule-of-law States, the principles of legitimacy and legality demand that the use of power (instruments) by States must be based on a legal basis and should respect other institutional features too. Through two illustrative vignettes the generic value of the framework will be illustrated for the potential use of power instruments—diplomacy, information, military, economy, culture, legal, knowledge—in its various modalities, including cyber operations. This legal framework, though tailored to cyber capabilities, may be used as a starting point for conceptualising the legal framework for so-called cross domain and cross dimensional, or full spectrum deterrence.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Military IoT"

1

Gotarane, Vishal y Sandeep Raskar. "IoT Practices in Military Applications". En 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2019. http://dx.doi.org/10.1109/icoei.2019.8862559.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Fongen, Anders y Federico Mancini. "Integrity attestation in military IoT". En 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389102.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

P., Raja y Swapnil Bagwari. "IoT Based Military Assistance and Surveillance". En 2018 International Conference on Intelligent Circuits and Systems (ICICS). IEEE, 2018. http://dx.doi.org/10.1109/icics.2018.00076.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Routray, Sudhir K., Abhishek Javali, Anindita Sahoo, K. P. Sharmila y Sharath Anand. "Military Applications of Satellite Based IoT". En 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2020. http://dx.doi.org/10.1109/icssit48917.2020.9214284.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Wang, Jun, Fan Jiang y Chao Xie. "The Application of IOT to Military Logistics". En Inernational Conference of Logistics Engineering and Management 2012. Reston, VA: American Society of Civil Engineers, 2012. http://dx.doi.org/10.1061/9780784412602.0066.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Jafari, Hossein, Oluwaseyi Omotere, Damilola Adesina, Hsiang-Huang Wu y Lijun Qian. "IoT Devices Fingerprinting Using Deep Learning". En MILCOM 2018 - IEEE Military Communications Conference. IEEE, 2018. http://dx.doi.org/10.1109/milcom.2018.8599826.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Kavipriya, P., G. Jegan, Edara Venkat y Deevi Nikhil Ranganadh. "Design of IOT Based Multifunctional Camouflage Military Robot". En 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). IEEE, 2021. http://dx.doi.org/10.1109/icais50930.2021.9395991.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Utsav, Ankur, Amit Abhishek, P. Suraj y Ritesh Kr Badhai. "An IoT Based UAV Network For Military Applications". En 2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2021. http://dx.doi.org/10.1109/wispnet51692.2021.9419470.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Kambourakis, Georgios, Constantinos Kolias y Angelos Stavrou. "The Mirai botnet and the IoT Zombie Armies". En 2017 IEEE Military Communications Conference (MILCOM). IEEE, 2017. http://dx.doi.org/10.1109/milcom.2017.8170867.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Wrona, Konrad. "Securing the Internet of Things a military perspective". En 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). IEEE, 2015. http://dx.doi.org/10.1109/wf-iot.2015.7389105.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Military IoT"

1

Gaines, Robert J. Future Information Operations (IO) in the Military: Is It Time for an 'IO CINC'. Fort Belvoir, VA: Defense Technical Information Center, abril de 2000. http://dx.doi.org/10.21236/ada388433.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Keogh, Susan. Is It Genocide? The Military Implications. Fort Belvoir, VA: Defense Technical Information Center, enero de 1998. http://dx.doi.org/10.21236/ada442834.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Faires, Jack, Joseph Whitley, Bruce Wilson y Richard Pyatt. Military Retirement -- Is it Time to Change? Fort Belvoir, VA: Defense Technical Information Center, mayo de 1998. http://dx.doi.org/10.21236/ada351369.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Tart, Randal G. Civil-Military Relations and Gen. Maxwell Taylor: Getting It Right and Getting It Wrong! Fort Belvoir, VA: Defense Technical Information Center, abril de 1997. http://dx.doi.org/10.21236/ada326488.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Mullen, III y William F. The Civil-Military Gap: Why It Exists And What Should Be Done About It. Fort Belvoir, VA: Defense Technical Information Center, mayo de 2002. http://dx.doi.org/10.21236/ada511234.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Konaev, Margarita, Husanjot Chahal, Ryan Fedsiuk, Tina Huang y Ilya Rahkovsky. U.S. Military Investments in Autonomy and AI: A Strategic Assessment. Center for Security and Emerging Technology, octubre de 2020. http://dx.doi.org/10.51593/20190044.

Texto completo
Resumen
This brief examines how the Pentagon’s investments in autonomy and AI may affect its military capabilities and strategic interests. It proposes that DOD invest in improving its understanding of trust in human-machine teams and leverage existing AI technologies to enhance military readiness and endurance. In the long term, investments in reliable, trustworthy, and resilient AI systems are critical for ensuring sustained military, technological, and strategic advantages.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Nunley, Robert E. Judicial Privilege: Does It Have a Role in Military Courts-Martial. Fort Belvoir, VA: Defense Technical Information Center, abril de 1992. http://dx.doi.org/10.21236/ada456578.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Printz, Scott A. U.S. Military Presence in a Post-Unified Korea: Is It Required. Fort Belvoir, VA: Defense Technical Information Center, febrero de 2006. http://dx.doi.org/10.21236/ada448748.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Sittnick, Stephen M. The Civil-Military Thing: How Does a Soldier Get It Right. Fort Belvoir, VA: Defense Technical Information Center, marzo de 1999. http://dx.doi.org/10.21236/ada363886.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Chervinchuk, Alina. THE CONCEPT OF ENEMY: REPRESENTATION IN THE UKRAINIAN MILITARY DOCUMENTARIES. Ivan Franko National University of Lviv, febrero de 2021. http://dx.doi.org/10.30970/vjo.2021.49.11063.

Texto completo
Resumen
Research methodology. The following methods were used in this research: general scientific methods (descriptive, analysis, synthesis, comparison) and special (structural, hermeneutic, narrative, method of content analysis). We identified words related to the concept of the enemy and determined the context in which they are used by the authors of the collections Results. The formats of reflection of military reality in collections of military documentaries are investigated. It is emphasized that the authors-observers of events as professional communicators form a vision of events based on categories understandable to the audience – «own» and «others». Instead, the authors-participants go events have more creative space and pay more attention to their own emotional state and reflections. It is defined how the enemy is depicted and what place he occupies in the military reality represented by the authors. It is emphasized that the authors reflect the enemy in different ways. In particular, the authors-observers of the events tried to form a comprehensive vision of the events, and therefore paid much attention to the opposite side of the military conflict. Authors-participants of the events tend to show the enemy as a mass to be opposed. In such collections, the enemy is specified only in the presence of evidence confirming the presence of Russians or militants. Novelty. The research for the first time investigates the methods of representation of mi­litary activity in the collections of Ukrainian military documentaries. The article is devoted to the analysis of how the authors represent the enemy. Practical importance. The analysis of collections of military documentaries will allow to study the phenomenon of war and to trace the peculiarities of the authors’ representation of military reality.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía