13,882 research outputs found

    A Governance Reference Model For Service-oriented Architecture-based Common Data Initialization A Case Study Of Military Simulation Federation Systems

    Get PDF
    Military simulation and command and control federations have become large, complex distributed systems that integrate with a variety of legacy and current simulations, and real command and control systems locally as well as globally. As these systems continue to become increasingly more complex so does the data that initializes them. This increased complexity has introduced a major problem in data initialization coordination which has been handled by many organizations in various ways. Serviceoriented architecture (SOA) solutions have been introduced to promote easier data interoperability through the use of standards-based reusable services and common infrastructure. However, current SOA-based solutions do not incorporate formal governance techniques to drive the architecture in providing reliable, consistent, and timely information exchange. This dissertation identifies the need to establish governance for common data initialization service development oversight, presents current research and applicable solutions that address some aspects of SOA-based federation data service governance, and proposes a governance reference model for development of SOA-based common data initialization services in military simulation and command and control federations

    The Limits of U.S.-China Military Cooperation: Lessons from 1995-1999

    Get PDF
    "The Limits of U.S.-China Military Cooperation: Lessons from 1995-1999" (with Kurt Campbell) The Washington Quarterly 29: 1 (Winter 2005), pp. 169-186

    A Framework for Responsible Aid to Burundi

    Get PDF
    The report shows the framework of aid in Burund

    Rules and Values in Virtual Optimization of California Hydropower

    Get PDF
    Optimization models for California’s hydropower system are designed to be decision-support tools and aids for climate adaptation decision-making. In practice, they fall short of this goal. One potential explanation is that optimization models are not more successful because they are built on, and depend on, a misrepresentation of law and politics. The legal reality of California’s hydropower system is a web of networked jurisdictions of multiple federal and state agencies, with varying levels of coordination, long periods of legally obligated stability with rigid rules, and prone to conflict, but with multiple procedures for conflict resolution. Barriers to climate adaptation from that mix vary according to where a given dam is located. The virtual institutional arrangements represented in optimization models are not a simplification of existing arrangements. Instead, they are a dramatic replacement. That replacement is deliberate and reasoned. As seen in two optimization models supported by the state of California, CALVIN and INFORM, the operation of the optimization function of computer models depends on a virtual system of rules that are centrally controlled, coordinated, nimble, and without the possibility of conflict (let alone conflict resolution). But that smooth virtual system comes with a real cost. Institutional economics suggests that this mismatch between existing formal law and represented law may upend the results of models, since value is determined from institutional context

    The Dynamics of ISIS: An Emerging-State Actor

    Get PDF
    This paper explains how the Islamic State grew rapidly, answering a question of what is the Islamic State? A review of existing literature on simulation modeling of insurgencies identifies several gaps, as existing theories of non-state actors and insurgencies are inadequate to explain ISIS\u27s performance. Additionally, there are few mathematical simulation models of insurgent behavior that can reproduce ISIS results. Finally, what models exist are not detailed enough either to conduct detailed experiments testing proposed explanations of ISIS, or evaluate policy responses aimed at containing or mitigating ISIS. The paper offers several contributions. First it proposes a dynamic hypothesis that the Islamic State (ISIS) is an emerging-state actor, a new form of actor that differs from traditional non- state actors and insurgencies. Propositions are constructed and presented as an overall theory of emerging-state actor behavior. These propositions are then simulated as experiments within a detailed model parameterized with conditions very similar to what ISIS faced in Iraq and Syria 2013. The model is then run from 2013-2020, and experiment results confirm evidence of emerging- state actor behavior and allow refinement of model boundary assumptions. Second, an initial set of intervention policies are tested in a variety of conditions: best case, operationally constrained, isolated, combined, and at different timing intervals. Analysis of the results yields key dynamic insights. These insights aid policy makers in understanding the challenges posed by emerging state actors. Finally, the detailed simulation model used to test the propositions and policy analysis, including a novel approach to combat simulation with endogenous geospatial feedback, is provided in full detail in two Appendices. Appendix A provides a sector-by-sector view of model structure and equations. Appendix B provides more discussion, analysis and sources used to develop model structure, establish parameter values and determine equations for the simulation. Due to length and other considerations, Appendix B is available only upon request. The detailed simulation model can be used to refine non-state actor theories (configured for insurgencies, emerging-state actors, or other scenarios). The model can be loaded with other scenarios to simulate other actors in other geospatial terrain: ISIS in Libya, Boko Haram in Nigeria, the returning Taliban in Afghanistan, etc. Keywords: ISIS, ISIL, DAESH, insurgency, conflict, security, stability, non-state actor, emerging- state actor, combat simulator, geospatial, national security

    Examining the Roles of Army Reserve Component Forces in Military Cyberspace Operations

    Get PDF
    Cyberspace operations have become pervasive in the United States, and they enable many aspects of modern life for the average citizen, such as entertainment, communication, education, transportation, banking, and voting. The continuing development of the U.S. Army and Department of Defense (DoD) Reserve component cyberspace units can leverage the capabilities and experience of industry and academia to help protect critical information infrastructure and enhance national security. What opportunities and challenges surround the integration of these forces into a still-evolving joint cyberspace force?https://press.armywarcollege.edu/monographs/1383/thumbnail.jp

    Unconventional cyber warfare: cyber opportunities in unconventional warfare

    Get PDF
    Given the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S. will need to examine new and innovative ways to modernize its irregular warfare fighting capabilities. Within its irregular warfare capabilities, the U.S. will need to identify effective doctrine and strategies to leverage its tactical and technical advantages in the conduct of unconventional warfare. Rather than take a traditional approach to achieve unconventional warfare objectives via conventional means, this thesis proposes that unconventional warfare can evolve to achieve greater successes using the process of unconventional cyber warfare.http://archive.org/details/unconventionalcy1094542615Major, United States Army;Major, United States ArmyApproved for public release; distribution is unlimited

    Community-of-Interest (COI) Model-Based Languages Enabling Composable Net-Centric Services

    Get PDF
    Net-centric services shall be designed to collaborate with other services used within the supported Community of Interest (COI). This requires that such services not only be integratable on the technical level and interoperable on the implementation level, but also that they are composable in the sense that they are semantically and pragmatically consistent and able to exchange information in a consistent and unambiguous way. In order to support Command-and-Control with Composable Net-centric Services, the human-machine interoperation must be supported as well as the machine-machine interoperation. This paper shows that techniques of computer linguistic can support the human-machine interface by structuring human-oriented representations into machine-oriented regular expressions that implement the unambiguous data exchange between machines. Distinguishing between these two domains is essential, as some requirements are mutually exclusive. In order to get the best of both worlds, an aligned approach based on a COI model is needed. This COI model starts with the partners and their respective services and business processes, identifies the resulting infrastructure components, and derives the information exchange requirements. Model-based Data Engineering leads to the configuration of data exchange specifications between the services in form of an artificial language comprising regular expressions for the machine-machine communication. Computer linguistic methods are applied to accept and generate human-oriented representations, which potentially extend the information exchange specifications to capture new information not represented in the system requirements. The paper presents the framework that was partially applied for homeland security applications and in support of the joint rapid scenario generation activities of US Joint Forces Command.

    The Basis of Unit Self-Defense and Implications for the Use of Force

    Get PDF
    This is a reflective article, written for a volume commemorating fifty years of the school in Hyderabad, India, at which I taught for over twelve years. The 'Imli tree' in the title of the volume, refers to the 'Tamarind tree' which has stood beside the school for all these years
    corecore