نتایج جستجو برای: command and control

تعداد نتایج: 17002502  

پایان نامه :موسسه آموزش عالی غیردولتی رودکی تنکابن - دانشکده ادبیات و زبانهای خارجی 1393

abstract this study aimed at investigating the effect of bilingual teaching of cognate words (persian-english) on iranian upper intermediate efl learners’ knowledge of lexical development. for this purpose,100 subjects participated in this study out of which 40 learners were selected for this study and they were assigned into two groups, control and experimental. cross-language cognates (wor...

پایان نامه :0 1374

having conducted the experiment and analysed the data, the researcher computed the groups mean scores and variances for the test relating to the research question. as the final atep, a t-test was conodonted for the hypothesis. as noted earlier, the significance level was determined at .05 and .01 respectively. the observed t-value was higher than the critical t-value at. 5 and .01 levels. conse...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده زبانهای خارجی 1389

abstract this study examines the effect of teaching lexical inferencing strategies on developing reading comprehension skill of iranian advanced efl learners. participants were female students of meraj and shokouh institudes of garmsar a quasi-experimental design using two intact advanced classes of efl students at meraj and shokouh institutes. as the first step, a general toefl proficiency te...

2004

The DoD develops and manages information exchange requirements and their associated business practices to support all military operations. To support the required information exchanges, messaging standards and associated business rules for information exchange among command and control systems have been developed and used for the past thirty years. These messaging standards serve a global user ...

1999

In Chapter One, we described some of the current dominant theories of command and control: control theory, organization charts, and cognitive science. In this appendix, we provide brief descriptions of other cybernetic-related or cognitive-science-related theories, discuss deviations from these dominant paradigms, and relate the cybernetic paradigm to technology development. The fundamental nee...

2010
Duc N. Nguyen Joseph B. Kopena Boon Thau Loo William C. Regli

This paper presents the development of a set of ontologies for use in messaging systems within military and emergency first responder command and control applications. These ontologies are used to annotate and subscribe to messages within a content delivery and service discovery middleware connecting sensors, services, and agents on the network. Ontologies serve an important role in this middle...

2002
David A. Wendt Mark E. Irwin Noel Cressie

Command and Control (C2) in a military setting can be epitomized in battles-of-old when commanders would seek high ground to gain superior spatial-temporal information; from this vantage point, decisions were made and relayed to units in the field. Although the fundamentals remain, technology has changed the practice of C2; for example, enemy units may be observed remotely, with instruments of ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم پایه دامغان 1389

in this thesis, ‎‎using‎‎ ‎concept‎s‎ ‎of‎ ‎wavelet‎s‎ ‎theory ‎‎‎som‎e‎ ‎methods‎‎ ‎of‎ ‎th‎e ‎solving‎‎ ‎optimal‎‎ ‎‎con‎tr‎ol‎ problems ‎(ocps)‎‎. ‎g‎overned by time-delay systems is investigated. ‎th‎is‎ thesis contains ‎tw‎o parts. ‎‎first, the method of obtaining ‎o‎f ‎the‎ ‎‎ocps‎ in time delay systems by linear legendre multiwavelets is ‎ ‎presented‎.‎‎‎‎ the main advantage of the meth...

2008
Michael Zink Eric Lyons David Westbrook David L. Pepyne Brenda Philips James F. Kurose V. Chandrasekar

Meteorological Command & Control is the software architecture that performs the main control loop of our radar sensor network in southwestern Oklahoma. In this control loop data is ingested from the radars, meteorological features are identified in this data, features are reported to end-users, and each radar's future scan strategy based on detected features and end-user requirements is determi...

Journal: :CoRR 2014
Joseph Gardiner Marco Cova Shishir Nagaraja

One of the leading problems in cyber security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools, sometimes referred to as Advanced Persistent Threats (APTs). These attacks target specific organisations or individuals and aim at establishing a continuous and undetected presence in the targeted infrastructure. The goal of these attacks is often...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید