1,359 research outputs found

    A Cascading Failure Model for Command and Control Networks with Hierarchy Structure

    Get PDF
    Cascading failures in the command and control networks (C2 networks) could substantially affect the network invulnerability to some extent. In particular, without considering the characteristics of hierarchy structure, it is quite misleading to employ the existing cascading failure models and effectively analyze the invulnerability of C2 networks. Therefore, a novel cascading failure model for command and control networks with hierarchy structure is proposed in this paper. Firstly, a method of defining the node’s initial load in C2 networks based on hierarchy-degree is proposed. By applying the method, the impact of organizational positions and the degree of the node on its initial load could be highlighted. Secondly, a nonuniform adjustable load redistribution strategy (NALR strategy) is put forward in this paper. More specifically, adjusting the redistribution coefficient could allocate the load from failure nodes to the higher and the same level neighboring nodes according to different proportions. It could be demonstrated by simulation results that the robustness of C2 networks against cascading failures could be dramatically improved by adjusting the initial load adjustment coefficient, the tolerance parameter, and the load redistribution coefficient. And finally, comparisons with other relational models are provided to verify the rationality and effectiveness of the model proposed in this paper. Subsequently, the invulnerability of C2 networks could be enhanced

    Combat Network Synchronization of UCAV Formation Based on RTBA Model

    Get PDF
    The paper aims at developing an efficient method to acquire a proper UCAV formation structure with robust and synchronized features. Here we introduce the RTBA (Route Temporary Blindness Avoidance) model to keep the structure stable and the HPSO (hybrid particle swarm optimization) method is given to find an optimal synchronized formation. The major contributions include the following: (1) setting up the dynamic hierarchy topologic structure of UCAV formation; (2) the RTB phenomenon is described and the RTBA model is put forward; (3) the node choosing rules are used to keep the invulnerability of the formation and the detective information quantifying method is given to measure the effectiveness of the connected nodes; and (4) the hybrid particle swarm optimization method is given to find an optimal synchronized topologic structure. According to the related principles and models, the simulations are given in the end, and the results show that the simplification of the model is available in engineering, and the RTBA model is useful to solve the real problems in combat in some degree

    Ku-band signal design study

    Get PDF
    Analytical tools, methods and techniques for assessing the design and performance of the space shuttle orbiter data processing system (DPS) are provided. The computer data processing network is evaluated in the key areas of queueing behavior synchronization and network reliability. The structure of the data processing network is described as well as the system operation principles and the network configuration. The characteristics of the computer systems are indicated. System reliability measures are defined and studied. System and network invulnerability measures are computed. Communication path and network failure analysis techniques are included

    An operational effectiveness evaluation method of the swarming UAVs air combat system

    Get PDF
    In this paper, we propose an operational effectiveness evaluation method of the swarming UAVs air combat system. The system network model is firstly established before the evaluation. We divide the edges in the network into nine types according to the Generalized Operation Loop and give the edge attribute of operational information entropy based on node attributes. When calculating the system operational effectiveness, we focus on the striking ability and propose the concept of Operation Loop Capability to represent the target-attack effectiveness of a certain operational loop, which can be calculated from the edge operational information entropies. We can get the combat effectiveness to a certain target from the Operation Loop Capability, and the combat effectiveness of the swarming UAVs air combat system is represented by the sum of the striking capabilities to all targets. Finally, the scene of swarming UAVs air combat is taken as a case study to apply and verify our evaluation method. This paper gives a quantitative perspective on swarming UAVs combat system assessment and can help to analyze the contribution of UAVs and other weapons in the system

    Second-Strike Nuclear Forces and Neorealist Theory: Unit-Level Challenge or Balance-of-Power Politics as Usual?

    Get PDF
    ABSTRACT: What are the implications of second-strike nuclear forces for neorealism? The end of the Cold War yielded a unipolar structure of international politics defined by the military, economic, and political preponderance of the United States. According to balance-of-power theory, which lies at the heart of neorealism, unipolarity has a short life span as secondary states waste little time in rectifying the global imbalance of power. Thus far, America remains unbalanced. Are we to take this as a refutation of balance-of-power theory? My thesis argues that second-strike arsenals render void the need to balance superior American military power. But because state survival is contingent not only upon military invulnerability (for which nuclear weapons are a sure guarantee), but also upon economic invulnerability (for which there is no absolute remedy), nuclear-weapon states are impelled to balance superior economic power for security reasons. By recasting balance-of-power theory in light of these assumptions, one can make sense of the great-power politics of the post-Cold War era.N/ADepartment of Government and International Relation

    Aeronautical Decision Making in Helicopter Emergency Medical Systems (HEMS): The Effect of Mission Orientation and Local Base Finances on the Go/No Go Decision

    Get PDF
    Helicopter Emergency Medical Services (HEMS) is among the most dangerous type of flying in the United States today. In 2008 it was safer to fly medical evacuation missions in Iraq and Afghanistan than in the Continental United States. This study is designed to test whether the financial performance of the local base and a hyper mission orientation have a negative effect on aeronautical decision making among HEMS crews. A Likert type survey was administered to HEMS pilots and medical crews to ascertain their thoughts and feelings regarding the two questions under investigation. While the data clearly showed that poor financial performance at the base level and an acute desire to complete the mission do not have a negative effect on aeronautical decision making among HEMS crews, it did reveal a distinct divide among attitudes between pilots and medical crews

    ENERGY RESILIENCE IMPACT OF SUPPLY CHAIN NETWORK DISRUPTION TO MILITARY MICROGRIDS

    Get PDF
    The ability to provide uninterrupted power to military installations is paramount in executing a country's national defense strategy. Microgrid architectures increase installation energy resilience through redundant local generation sources and the capability for grid independence. However, deliberate attacks from near-peer competitors can disrupt the associated supply chain network, thereby affecting mission-critical loads. Utilizing an integrated discrete-time Markov chain and dynamic Bayesian network approach, we investigate disruption propagation throughout a supply chain network and quantify its mission impact on an islanded microgrid. We propose a novel methodology and an associated metric we term "energy resilience impact" to identify and address supply-chain disruption risks to energy security. A case study of a fictional military installation is presented to demonstrate how installation energy managers can adopt this methodology for the design and improvement of military microgrids.Outstanding ThesisLieutenant, United States NavyApproved for public release. Distribution is unlimited

    Cyber Deterrence

    Get PDF
    Cyber operations by both state actors and non-state actors are increasing in frequency and severity. As nations struggle to defend their networks and infrastructure, their ability to apply the principles of deterrence to cyber activities correspondingly increases in importance. Cyber deterrence offers much more flexibility and increased options from traditional deterrence methodologies developed in the Cold War’s nuclear age. In addition to traditional retaliation, cyber deterrence includes options such as taking legal action; and making networks invisible, resilient, and interdependent. It also presents new ways to view and apply accepted methodologies such as invulnerability. As the U.S. continues to develop and implement cyber deterrence strategies and capabilities, there are important legal issues that require consideration, including international law, the law of armed conflict, and U.S. domestic law. This paper will identify and discuss six prominent theories of cyber deterrence and briefly analyze legal issues associated with this vital area of national security. The law not only provides important factors that must be considered as cyber deterrence doctrine is solidified, but it also provides significant insights into how these theories of cyber deterrence can best be utilized to support national strategic goals

    An Evaluation Of The Relationships Between Resilient Safety Culture, Safety Risk Parameters, And Mindfulness In The International Air Show Community

    Get PDF
    A convergent mixed-methods approach with data triangulation was utilized to assess the strength of relationships between operational risk factors, hazardous attitude, and resilient safety culture when mediated by mindfulness in the international air show community. An anonymous online survey of respondents’ perceptions, semi-structured interviews of air show experts, focus-group on air show performers, field observation at an air show, and a documentary analysis of air show safety event data was used to collect data. The quantitative findings suggest a good fit of a hypothesized structural model showing the relationships between study variables using structural equation modeling (SEM). Mindfulness (MF) significantly mediates the predictive relationship between hazardous attitudes (HA), risk perception (RP), risk tolerance (RT), and resilient safety culture (RSC) with a high effect size. There was significant predictive relationship between MF and RSC with medium effect size. Demographically, married respondents had significantly lower mean scores on MF compared to single and divorced while single respondents had higher mean scores on RT than married or divorced. The qualitative findings indicate that the RSC of air show performers has a negative correlation with RT and HA. The triangulation suggests military air show background was strongly correlated with RSC, MF, and a negative correlation to HA. This study provides a validated measurement model to assess the relationships between the study variables and fills a gap in the literature related to resilient safety culture in the airshow community. Theoretical and practical implications of this study provide a framework for continuous improvement of safety in the air show community

    Drones and Support for the Use of Force

    Get PDF
    Drones and Support for the Use of Force utilizes experimental research to analyze the effects of combat drones on Americans’ support for the use of force. The authors develop expectations drawn from social science theory and then assess these conjectures using a series of survey experiments. Their findings—that drones have had important but nuanced effects on support for the use of force—have implications for democratic control of military action and civil-military relations, and provide insight into how the development and proliferation of current and future military technologies influence the domestic politics of foreign policy
    • …
    corecore