Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








16,858 Hits in 6.6 sec

Military and government applications of human-machine communication by voice

C. J. Weinstein
1995 Proceedings of the National Academy of Sciences of the United States of America  
Applications that are described include (1) speech recognition and synthesis for mobile command and control; (2) speech processing for a portable multifunction soldier's computer, (3) speech-and language-based  ...  This paper describes a range ofopportunities for military and government applications of human-machine communication by voice, based on visits and contacts with numerous user organizations in the United  ...  and alerting users, and also to development of improved human-machine interfaces in the Combat Information Center.  ... 
doi:10.1073/pnas.92.22.10011 pmid:7479718 pmcid:PMC40727 fatcat:elccrqictjdsfi5ilhxbjh4zc4

Methods: Past Approaches, Current Trends and Future Requirements [chapter]

Donald A. Topmiller
1981 Manned Systems Design  
A requirement also exists for a "Trainable Command and Control Information Processing System".  ...  Certain triservice (Army, Navy and Air Force) programs including the Joint Tactical Information Display System (JTIDS), Digital Avionics Information System (DAIS) and various Command/Control programs designed  ... 
doi:10.1007/978-1-4613-3306-7_1 fatcat:wplsf6c6x5gy3lgxpbfr6ogav4

Applicable Modeling and Simulation Standards; Simulation Systems and Software; Selected Publications; Related Journals, Conferences, Workshops and Courses

I&S Monitor
2003 Information & Security An International Journal  
Defense Modeling, Simulation, and Tactical Technology Information Analysis Center (DMSTTIAC) The Defense Modeling, Simulation, and Tactical Technology Information Analysis Center collects, analyzes and  ...  Analysis Center.  ...  Modeling and Simulation Information Analysis Center (MSIAC) http://www.msiac.dmso.mil/ MSIAC is a Department of Defense Information Analysis Center sponsored by the Defense Technical Information Center  ... 
doi:10.11610/isij.1207 fatcat:ydmtwo7mnfdshg27m5hi24br6y

A leading cyber warfare strategy according to the evolution of cyber technology after the fourth industrial revolution

Sin-Kon Kim, Sang-Pil Cheon, Jung-Ho Eom
2019 International Journal of Advanced Computer Research  
First, we predict the change of cyber battlefield environment and the evolution of cyber-attack technology, according to the development level of current information & communication technology and we propose  ...  a cyber warfare strategy in aspect of strategic, operational, and tactical levels that can prevent future advanced cyber threats.  ...  Acknowledgment This paper is a revised and expanded version of a paper entitled [Offensive Cyber Security Strategy according to the Evolution of Cyber Attack Technology] presented at [IDIW2018, Jeju and  ... 
doi:10.19101/ijacr.soc6 fatcat:m46g2qnb75bgfefoycxwkgvcpy

Page 399 of Communications of the Association for Computing Machinery Vol. 3, Issue 7 [page]

1960 Communications of the Association for Computing Machinery  
In this environment, commanders must have accurate, reliable, and timely information for command decisions.  ...  This paper describes the methods developed for designing a military tactical system which is to use advanced automatic data processing equipment.  ... 

A Conceptual Model for Network Decision Support Systems

Alex Bordetsky, Daniel Dolk
2013 2013 46th Hawaii International Conference on System Sciences  
We introduce the concept of a network DSS (NWDSS) consisting of fluid, heterogeneous nodes of human and machine agents, connected by wireless technology, which may enter and leave the network at unpredictable  ...  We describe distinguishing properties of the NWDSS and propose a 3-tier conceptual model comprised of digital infrastructure, transactive memory systems and emergent collaborative decision-making.  ...  of designing, developing and controlling such systems.  ... 
doi:10.1109/hicss.2013.32 dblp:conf/hicss/BordetskyD13 fatcat:7q7d4htsxzghbeonjiz2af4et4

TVIS: Tactical Voice Interaction Services for dismounted urban operations

Thomas Massie, Duminda Wijesekera
2008 MILCOM 2008 - 2008 IEEE Military Communications Conference  
We show the utility of speech recognition technology to support the command, control and information fusion needs of dismounted soldiers engaged in specialized tactical operations.  ...  Index Terms-Command and Control (C2), Integrated Voice Response (IVR), Ontology, VoiceXML.  ...  support for natural language processing, and ontology-based modeling of complex decision-making for situational awareness, command and control, information integration and analysis.  ... 
doi:10.1109/milcom.2008.4753071 fatcat:xmxlw5xtybcatlkdlvlsy2or3y

Investigation on Works and Military Applications of Artificial Intelligence

Wei Wang, Hui Liu, Wangqun Lin, Ying Chen, Jun'an Yang
2020 IEEE Access  
Technology determines tactics, and tactics promote the development of technology.  ...  For more information, see https://creativecommons.org/licenses/by/4.0/ VOLUME 8, 2020  ...  The motivation of DL is to build a neural network to simulate the human brain for analysis and learning.  ... 
doi:10.1109/access.2020.3009840 fatcat:6yy2c2oa2ndpbfeog7gadsol3a

STATE-OF-THE-ART TECHNOLOGIES TO BE USED IN COMMAND AND CONTROL SYSTEMS

Cezar POPA, Ion MITULEȚU
2021 Bulletin of "Carol I" National Defence University  
of command and control systems.  ...  Keywords: command and control; artificial intelligence; efficiency; technologies; 'Information Technologies.  ...  The commander directs the machine-activated control system through a computer interface, assigns tasks to execute, and introduces estimates for opponents, force size, and desired effect.  ... 
doi:10.53477/2284-9378-21-06 fatcat:fm52ngb2djg4ppw4drffuzik5q

A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures [article]

Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, M. Ali Babar
2022 arXiv   pre-print
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in critical civil and military domains for achieving information superiority, operational efficacy, and greater situational  ...  For instance, tampering or intercepting confidential information in military battlefields not only damages C3I operations, but also causes irreversible consequences such as loss of human lives and mission  ...  At the start of a tactical operation, both C3I command and control systems separately collect tactical information through different data sources (e.g., sensors, field commanders and C3I systems operating  ... 
arXiv:2104.11906v2 fatcat:nvz3bssy55fwlcwqzkd7n3zism

A 1961 Compilation and Brief History of Human Factors Research in Business and Industry

Jack A. Kraft
1961 Human Factors  
and retrieval systems, Perform analysis of human factors aspects of a lunar-based control center.  ...  in Tactical Command/ Control systems, A study of the relationships between charac- teristics of complex electronic systems and down- time for repair.  ... 
doi:10.1177/001872086100300406 fatcat:e6y4umlpbjc73hyxckrcnzkfwm

Batch simulation environment for integrated batch and piloted air combat analysis

Kenneth H. Goodrich, John W. McManus, Alan R. Chappell
1995 Journal of Aircraft  
References ‘Advanced Air-to-Air System Performance Model (ASSPEM) Users Manual,” Survivability/Vulnerability Information Analysis Center, Booz-Allen & Hamilton, Inc., Nov. 1990. *Kerchner, R.  ...  The TMS serves as a tool for developing and evaluating tactical maneuvering logics.  ... 
doi:10.2514/3.46873 fatcat:ah2hmlxtd5hqlfa5m6okkd4zre

Tactical-level simulation for intelligent transportation systems

R. Sukthankar, J. Hancock, C. Thorpe
1998 Mathematical and computer modelling  
The vehicles can be equipped with simulated human drivers as well as sensors and algorithms for automated control.  ...  These features are vital in the development and evaluation of intelligent vehicle technology for ITS applications.  ...  Acknowledgements The authors wish to thank Dean Pomerleau and Shumeet Baluja for valuable discussions and comments on earlier drafts of this article.  ... 
doi:10.1016/s0895-7177(98)00062-4 fatcat:fvvep2g5a5bjdcocpj7kwiojc4

MODULAR COMMAND AND CONTROL STRUCTURES AND FORCE ORGANIZATION USABLE IN OPERATIONS AT HIGH ALTITUDES

Cezar POPA
2022 Bulletin of "Carol I" National Defence University  
Addressing these challenges in areas of operations located at high altitudes requires the existence of specific capabilities for command and control.  ...  Command and control systems should have architectural flexibility, intelligent digitised platforms and its modules should be perfectly functionall and interoperable (based on self-sufficiency ‒ extended  ...  and machine control.  ... 
doi:10.53477/2284-9378-21-49 fatcat:vlpnbc6igbgajlqnxb5ot4gcru

Modeling of Cyber Target Selection for Effective Acquisition of Cyber Weapon Systems

Ki Hoon Kim, Jung ho Eom
2016 International Journal of Security and Its Applications  
Cyber target selection is carried out with 3 components such as 'center of gravity', 'target attribute and control characteristics', and 'type and characteristics of information communication system'.  ...  the information communication system.  ...  If so, the center of gravity for the cyber-attack will be the strategic center of command and control.  ... 
doi:10.14257/ijsia.2016.10.11.24 fatcat:ybseyd6wevb6xdjrnrwpevnvey
« Previous Showing results 1 — 15 out of 16,858 results