首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Rome Laboratory is a U.S. Air Force laboratory within the Air Force Material Command that plans and executes an interdisciplinary program in research, development, testing, and technology transition in support of Air Force Command Control, Communications and Intelligence activities for all Air Force platforms. Rome Laboratory has conducted an extensive research and development effort into the identification and measurement of software quality characteristics for the past twenty years and is considered by most experts as the international leader in this field. The authors have built upon this foundation and their own experience as practitioners of software quality measurement via the Rome Laboratory Framework. They have successfully applied this methodology in the industrial and scientific communities for the past fifteen years. This paper describes, based on a series of lessons learned, techniques for implementing a software quality measurement (metric) program toreal software development applications in areal competitive environment. Reference is made to results obtained in past applications and to a recently released guidebook for applying the framework. Potential problem areas are defined, concerns listed, background information given, case histories discussed, and guidebook topics outlined.  相似文献   

2.
Detachment G, 849th Signal Intelligence Service, a unit comprising 4 officers and 60 enlisted men supported by the 122nd Signal Radio Intelligence Company, working round-the-clock in three 8-hour shifts daily for 22 months, decrypted an average of 10,000 European weather synoptic reports per month enciphered in three German trigram table systems. The 122nd Signal Radio Intelligence Company provided the radio intercept facilities and transmitted the decryptions to all weather stations of the 12th and 15th U. S. Air Forces, the British components of the Mediterranean Air Forces, the U. S. Fifth Army and the U. S. and British Navies operating in the Mediterranean Theater of Operations  相似文献   

3.
Umkehrwalze D was a field-rewirable reflector for the German service Enigma machine, introduced primarily on German Air Force cipher networks late in the Second World War. This article discusses the history of the device and the various techniques and machines developed by the British and American signals intelligence agencies to deal with it.  相似文献   

4.
Umkehrwalze D was a field-rewirable reflector for the German service Enigma machine, introduced primarily on German Air Force cipher networks late in the Second World War. The three parts of this article discuss the history of the device and the various techniques and machines developed by the British and American signals intelligence agencies to deal with it.  相似文献   

5.
Philip Marks 《Cryptologia》2013,37(2):101-141
Umkehrwalze D was a field-rewirable reflector for the German service Enigma machine, introduced primarily on German Air Force cipher networks late in the Second World War. The three parts of this article discuss the history of the device and the various techniques and machines developed by the wartime British and American signals intelligence agencies to deal with it.  相似文献   

6.
The United States Air Force Academy is actively involved in unmanned aircraft research across numerous departments involving many projects, aircraft, government agencies, and experimental programs. The importance of these research projects to the Academy, the faculty, the cadets, the Air Force, and to the defense of the nation cannot be understated. In an effort to be proactive in cooperating with recent concerns from the FAA about the growth and proliferation of UAS flights, the Air Force has implemented several new guidelines and requirements. Complying with these guidelines, directives, and regulations has been challenging to the researchers and research activities conducted at USAFA. Finding ways to incorporate these new guidelines effectively and efficiently is critical to research and participation in joint projects and exercises. This paper explores the nature of research at USAFA current restrictions imposed by the various regulations, the current process, short term solutions, and a long term vision for research into UAS at the Academy.  相似文献   

7.
David M. Smith 《Cryptologia》2013,37(4):298-304
German weather reports were decrypted swiftly enough to enable 15th Air Force meteorologists to use them, together with reports from Allied and neutral sources, to predict the rare times of the perfectly clear weather required to bomb targets visually in Central Europe. There was an average of only two suitable days per month and these were barely enough to complete the attacks that neutralized the Luftwaffe in time for D-Day. Without these reports there would have been many futile missions to cloud-covered targets with much loss of lives and planes.  相似文献   

8.
航空兵场站机载弹药保障的要素和环节众多,且相互影响、相互制约,通常采用计算机仿真对这类系统效能进行定量评估。本文对某航空兵场站机载弹药保障的力量构成、保障过程和特点进行了分析,并将其抽象为一个离散事件系统,建立了涵盖任务下达与执行、保障对象、保障资源以及保障过程等要素的建制单位离散事件仿真模型,并在此基础上开发了仿真系统。应用表明,该仿真模型运行正确、可靠,为某航空兵场站机载弹药保障效能评估提供了有力的分析工具。  相似文献   

9.
The Multi-Agent Distributed Goal Satisfaction (MADGS) system facilitates distributed mission planning and execution in complex dynamic environments with a focus on distributed goal planning and satisfaction and mixed-initiative interactions with the human user. By understanding the fundamental technical challenges faced by our commanders on and off the battlefield, we can help ease the burden of decision-making. MADGS lays the foundations for retrieving, analyzing, synthesizing, and disseminating information to commanders. In this paper, we present an overview of the MADGS architecture and discuss the key components that formed our initial prototype and testbed. Eugene Santos, Jr. received the B.S. degree in mathematics and Computer science and the M.S. degree in mathematics (specializing in numerical analysis) from Youngstown State University, Youngstown, OH, in 1985 and 1986, respectively, and the Sc.M. and Ph.D. degrees in computer science from Brown University, Providence, RI, in 1988 and 1992, respectively. He is currently a Professor of Engineering at the Thayer School of Engineering, Dartmouth College, Hanover, NH, and Director of the Distributed Information and Intelligence Analysis Group (DI2AG). Previously, he was faculty at the Air Force Institute of Technology, Wright-Patterson AFB and the University of Connecticut, Storrs, CT. He has over 130 refereed technical publications and specializes in modern statistical and probabilistic methods with applications to intelligent systems, multi-agent systems, uncertain reasoning, planning and optimization, and decision science. Most recently, he has pioneered new research on user and adversarial behavioral modeling. He is an Associate Editor for the IEEE Transactions on Systems, Man, and Cybernetics: Part B and the International Journal of Image and Graphics. Scott DeLoach is currently an Associate Professor in the Department of Computing and Information Sciences at Kansas State University. His current research interests include autonomous cooperative robotics, adaptive multiagent systems, and agent-oriented software engineering. Prior to coming to Kansas State, Dr. DeLoach spent 20 years in the US Air Force, with his last assignment being as an Assistant Professor of Computer Science and Engineering at the Air Force Institute of Technology. Dr. DeLoach received his BS in Computer Engineering from Iowa State University in 1982 and his MS and PhD in Computer Engineering from the Air Force Institute of Technology in 1987 and 1996. Michael T. Cox is a senior scientist in the Intelligent Distributing Computing Department of BBN Technologies, Cambridge, MA. Previous to this position, Dr. Cox was an assistant professor in the Department of Computer Science & Engineering at Wright State University, Dayton, Ohio, where he was the director of Wright State’s Collaboration and Cognition Laboratory. He received his Ph.D. in Computer Science from the Georgia Institute of Technology, Atlanta, in 1996 and his undergraduate from the same in 1986. From 1996 to 1998, he was a postdoctoral fellow in the Computer Science Department at Carnegie Mellon University in Pittsburgh working on the PRODIGY project. His research interests include case-based reasoning, collaborative mixed-initiative planning, intelligent agents, understanding (situation assessment), introspection, and learning. More specifically, he is interested in how goals interact with and influence these broader cognitive processes. His approach to research follows both artificial intelligence and cognitive science directions.  相似文献   

10.
The use of computer graphics analysis and other powerful tools to evaluate jet aircraft performance at the US Air Force Flight Test Center, Edwards Air Force Base in California, is described. As many as 14 test versions of the same aircraft model are instrumented with sophisticated sensors to allow flight-test data to be recorded on tape. The tape-recorded data points are used by flight-test engineers to review each aircraft's actual in-flight performance. It was found that computer-generated graphic displays of complicated physical relationships make the job of interpreting aircraft performance data considerably less difficult. The use of interactive graphics to boost productivity is also discussed  相似文献   

11.
A general set of conditions is given under which a property is undecidable for a family of languages. Examples are given of the application of this result to wellknown families of languages.Research sponsored in part by the Air Force cambridge Research Laboratories, Office of Aerospace Research, USAF, under Contract F1962867C0008, and by the Air Force Office of Scientific Research, Office of Aerospace Research, USAF under Grant No. AF-AFOSR-1203-67.  相似文献   

12.
An AFL is a family of sets of words closed under six basic operations. It is shown that a certain family of homomorphic images of sets in an AFL is an AFL. Then two families of sets related to tape-bounded nondeterministic Turing acceptors are shown to coincide and be an AFL.Research sponsored in part by the Air Force Cambridge Research Laboratories, Office of Aerospace Research, USAF, under contract F1962867C0008, the Air Force Office of Scientific Research, Office of Aerospace Research, USAF, under AFOSR Grant No. AF-AFOSR-1203-67A, and by the National Science Foundation, Grant No. GJ454.Part of this work was also done at the System Development Corporation, Santa Monica, Calif.  相似文献   

13.
The importance of generalizability for anomaly detection   总被引:1,自引:1,他引:0  
In security-related areas there is concern over novel “zero-day” attacks that penetrate system defenses and wreak havoc. The best methods for countering these threats are recognizing “nonself” as in an Artificial Immune System or recognizing “self” through clustering. For either case, the concern remains that something that appears similar to self could be missed. Given this situation, one could incorrectly assume that a preference for a tighter fit to self over generalizability is important for false positive reduction in this type of learning problem. This article confirms that in anomaly detection as in other forms of classification a tight fit, although important, does not supersede model generality. This is shown using three systems each with a different geometric bias in the decision space. The first two use spherical and ellipsoid clusters with a k-means algorithm modified to work on the one-class/blind classification problem. The third is based on wrapping the self points with a multidimensional convex hull (polytope) algorithm capable of learning disjunctive concepts via a thresholding constant. All three of these algorithms are tested using the Voting dataset from the UCI Machine Learning Repository, the MIT Lincoln Labs intrusion detection dataset, and the lossy-compressed steganalysis domain. Gilbert “Bert” Peterson is an Assistant Professor of Computer Engineering at the Air Force Institute of Technology. Dr. Peterson received a BS degree in Architecture, and an M.S. and Ph.D. in Computer Science at the University of Texas at Arlington. He teaches and conducts research in digital forensics and artificial intelligence. Brent McBride is a Communications and Information Systems officer in the United States Air Force. He received a B.S. in Computer Science from Brigham Young University and an M.S. in Computer Science from the Air Force Institute of Technology. He currently serves as Senior Software Engineer at the Air Force Wargaming Institute.  相似文献   

14.
B. R. Inman 《Cryptologia》2013,37(3):129-135
This paper presents the travels of a cryptological Intelligence mission through Germany near the end of World War II to locate German Signal Intelligence information documents, and equipment.  相似文献   

15.
The problem of finding a stochastic sequential machine with minimal number of states and homomorphic to a given machine is studied in various aspects. The methods used for investigating the above problem are based upon the properties of a certain convex polyhedron associated with the given machine.The research reported herein was supported by the Air Force Office of Scientific Research, Office of Aerospace Research, United States Air Force under AFOSR Grant AFAFOSR-639-67.On leave from Technion, Israel Institute of Technology, Haifa, Israel.  相似文献   

16.
航空兵塔台辅助指挥系统是为减轻飞行团塔台指挥人员的负担,提高其工作效率而研制的;针对该系统之通信分系统设计方案中的若干技术问题,包括通信协议与封装式信息块结构的确定、文件传送与接收处理、异步通信的速度匹配与双缓冲区技术等,进行了深入研究,并最终提出了解决问题的策略和方案;该分系统设计已经在航空兵塔台辅助指挥系统研究中得到了应用,并达到了良好的控制效果。  相似文献   

17.
The U.S. Air Force (USAF) created the Software Technology Support Center (STSC) at Hill AFB, Utah to enable Air Force software engineering organizations to identify, evaluate, and adopt technologies that will improve their software production. As part of this mission, the STSC collects detailed information about software tools and solicits frank assessments from tool users. Then, as a free service, the STSC provides a customized tools list to anyone within the United States, based on a user's requirements (e.g. hardware platform, operating system, etc.). This article will discuss the STSC's functional goal to act as a central repository of software information with an emphasis on the software reengineering technology domain.  相似文献   

18.
H. Kagiwada  R. Kalaba 《Calcolo》1967,4(1):11-20
The linear integral equation of convolution type of Sobolev's function ϕ is solved computationally using a new method for the numerical inversion of Laplace transforms. This research is sponsored by the United States Air Force under Project RAND —Contract No. AF 49 (638), 1700—monitored by the Directorate of Operational Requirements and Development Plans, Deputy Chief of Staff, Research and Development Hq, USAF. Views or conclusions contained in this paper should not be interpreted as representing the official opinion or policy of the United States Air Force.  相似文献   

19.
The United States Air Force civil engineering organization is responsible for the design, construction, and maintenance of over $115 billion dollars worth of facilities at bases around the world. Many civil engineering functions and offices have procured or are in the process of procuring computer-aided design and drafting (CADD) technology to assist in accomplishing their assigned tasks. Specific areas where automation is anticipated as being most helpful include maintaining facility information, design and engineering, operations and maintenance, project management, master planning, and space planning and management. The actual achievement of these capabilities is less dependent on hardware or software and relies more on a comprehensive and achievable implementation and system management plan. The Air Force civil engineering implementation and management plan consists of four separate but related sections: the benefits/needs analysis; the application/action plan; the CADD standards manual; and the CADD user's guide.  相似文献   

20.
《Ergonomics》2012,55(11):1439-1453
Abstract

1448 German Air Force pilots took part in an anonymous investigation of critical flight incidents. A 315-item questionnaire was applied, which included relevant preflight and inflight data, physiological and psychological parameters (behaviour variables, subjective state ratings before and during critical situations, pilot errors and their consequences) as well as environmental factors. Extensive data analysis revealed various human errors, which can be intepreted as a four-dimensional error-structure: vigilance errors, perception errors, information processing errors and sensorimotor errors. Determinants and background variables of human factor incidents and accidents were discussed in a model of basic man–machine system interaction patterns. Preventive measures to limit and control human factor incidents and accidents are proposed in a four-step programme.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号