Command and Control Research Program最新文献

筛选
英文 中文
Intelligent Nodes in Knowledge Centric Warfare 知识中心战中的智能节点
Command and Control Research Program Pub Date : 2002-06-01 DOI: 10.21236/ada461953
E. Dawidowicz, Albert Rodríguez, J. Langston
{"title":"Intelligent Nodes in Knowledge Centric Warfare","authors":"E. Dawidowicz, Albert Rodríguez, J. Langston","doi":"10.21236/ada461953","DOIUrl":"https://doi.org/10.21236/ada461953","url":null,"abstract":"Abstract : With the continuous increase in complexity and tempo on the modern battlefield, new demands are placed on information dissemination. The volume of information available to the user becomes larger while the time necessary to correctly interpret and understand this information becomes prohibitively smaller. Cognitive processing of information at the user nodes is proposed as a potential solution to this information overflow problem. These nodes we will call Intelligent Nodes [Dawidowicz, 2001]. This paper will introduce the architecture of an Intelligent Node and will demonstrate its hierarchical scalability across all echelons and Battlefield Functional Areas. This technology is directly applicable to the Objective Force and Future Combat Systems.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132950861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Training Program Review: Theater Battle Management Core Systems (TBMCS) Training Program Evaluation 训练计划审查:战区战斗管理核心系统(TBMCS)训练计划评估
Command and Control Research Program Pub Date : 2002-05-01 DOI: 10.21236/ada402336
Marcie E. Zaharee
{"title":"Training Program Review: Theater Battle Management Core Systems (TBMCS) Training Program Evaluation","authors":"Marcie E. Zaharee","doi":"10.21236/ada402336","DOIUrl":"https://doi.org/10.21236/ada402336","url":null,"abstract":"Abstract : This report provided an in-depth analysis to assist future decision makers in determining the conditions necessary for effective distributed learning for future C2 systems. A synopsis of findings are presented in terms of: (a) a summative evaluation that identifies strengths, weaknesses, lessons learned; (b) best practices of the TBMCS training program, and (c) a holistic view of the TBMCS distributed training program that shows the impact of training not only on the individual but on the USAF as well.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123461044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Complexity, Networking, & Effects-Based Approaches to Operations 复杂性、网络化和基于效果的操作方法
Command and Control Research Program Pub Date : 1900-01-01 DOI: 10.21236/ada457293
Edward A. Smith
{"title":"Complexity, Networking, & Effects-Based Approaches to Operations","authors":"Edward A. Smith","doi":"10.21236/ada457293","DOIUrl":"https://doi.org/10.21236/ada457293","url":null,"abstract":"Abstract : Our world is a myriad of ever-changing, interdependent variables whose courses we can never entirely predict. The strength of an effects-based approach to operations is that it squarely addresses these complexities by concentrating on their most nonlinear aspects: humans, their institutions, and their actions. Indeed, the entire effects-based approach can be characterized by four things: a focus on the human dimension of competition and conflict; the consideration of a full spectrum of actions whether in peace, crisis, or hostilities; a multifaceted, whole-of-nation concept of power; and the recognition of the complex interconnected nature of the actors and challenges involved. The human dimension arises because all effects-based approaches are ultimately about shaping human perceptions and behavior, and because they depend heavily on human beings to make the complex estimates and decisions involved. The focus on an entire spectrum of actions means thinking holistically across a peace-crisis-hostilities spectrum. Finally, any effects-based approach must proceed from the recognition that all actions and the reactions they provoke are inextricably linked in a system of ever-changing and adapting human systems whose complexity shapes both the nature of the problem and the task of assessing, planning, and executing any operation. The central tenet of an effects-based approach to operations is that we can somehow purposefully shape the interactions of the actors in this complex security environment. Living systems theory offers a way of approaching this complexity. It sees the world in biological and sociological terms as an interlocking multilevel system of complex adaptive systems from which no individual system can be extracted without changing both its character and that of the system as a whole. In the model, interactions occur simultaneously on many different levels with each interaction tending to proceed at a pace dictated by local circumstances.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131220253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Dynamic Strike Force Asset Reallocation for Time Critical Targeting 针对时间关键目标的动态打击力量资产再分配
Command and Control Research Program Pub Date : 1900-01-01 DOI: 10.21236/ada457981
J. McDonnell, N. Gizzi
{"title":"Dynamic Strike Force Asset Reallocation for Time Critical Targeting","authors":"J. McDonnell, N. Gizzi","doi":"10.21236/ada457981","DOIUrl":"https://doi.org/10.21236/ada457981","url":null,"abstract":"Abstract : This paper describes decision support tools that are being developed to support dynamic reallocation of tactical air assets in particular and the strike force assets in general. Tools that support situation awareness, risk assessment, and weapon-target paring options generation in an integrated architecture are discussed. Preliminary work is presented on each tool and its usage as a decision-aid component.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123479563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A 'Trust But Verify' Design for Course of Action Displays “信任但需验证”的操作过程显示设计
Command and Control Research Program Pub Date : 1900-01-01 DOI: 10.21236/ada461061
M. John, D. Manes, G. Osga
{"title":"A 'Trust But Verify' Design for Course of Action Displays","authors":"M. John, D. Manes, G. Osga","doi":"10.21236/ada461061","DOIUrl":"https://doi.org/10.21236/ada461061","url":null,"abstract":"Abstract : Automation, particularly of complex cognitive tasks, is bound to be incomplete, simplistic, or otherwise less than completely reliable. Recently, we have begun developing Trust but Verify techniques for increasing the effectiveness of even unreliable automation. The user's trust should be conditioned on known situational factors that affect the reliability of the automation, and users should be able to verify the automation results and operation to various qualitative degrees as the level of trust dictates. Here, we describe our preliminary work on these concepts in the domain of Course of Action (COA) selection for an Intruder Interception Task. This task involves deciding which of several available aircraft should be chosen to perform an interception of an unknown aircraft intruding into the air space. Based on repeated interviews with four subject matter experts, we identified and then distilled a set of factors essential to evaluating the optimal COA. We then designed a set of alternative displays to illustrate the factors based on the Trust but Verify concept and general human factors display guidance. Here we analyze the benefits and costs of two major design decisions: whether to display the COA factors using a tabular or graphic organization, and whether or how to integrate the COAs with the map or with each other in a common table.","PeriodicalId":333539,"journal":{"name":"Command and Control Research Program","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131222537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信