Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Engineering

Improving C2 Effectiveness Based On Robust Connectivity, S. Deller, A. Tolk, G. Rabadi, S. Bowling Jan 2014

Improving C2 Effectiveness Based On Robust Connectivity, S. Deller, A. Tolk, G. Rabadi, S. Bowling

Computational Modeling & Simulation Engineering Faculty Publications

This chapter describes an approach to develop an improved metric for network effectiveness through the use of Cares' (2005) Information Age Combat Model (IACM) as a context for combat (or competition) between networked forces. The IACM highlights the inadequacy of commonly used quantifiable metrics with regards to comparing networks that differ only by the placement of a few links. An agent-based simulation is used to investigate the potential value of the Perron-Frobenius Eigenvalue (λPFE) as an indicator of network effectiveness. The results validate this assumption. Another measurement is proven to be equally important, namely the robustness of a …


Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese Mar 2009

Decisive Routing And Admission Control According To Quality Of Service Constraints, Cindy C. Reese

Theses and Dissertations

This research effort examines, models, and proposes options to enhance command and control for decision makers when applied to the communications network. My goal is to research the viability of combining three students’ past research efforts and expanding and enhancing those efforts. The area of this research is predicting a snapshot of the communications network, context-aware routing between network nodes, and Quality of Service-based routing optimization in order to create an intelligent routing protocol platform. It will consolidate efforts from an Intelligent Agent Based Framework to Maximize Information Utility by Captain John Pecarina, Dialable Cryptography for Wireless Networks by Major …


Utilizing Strategic Project Management Processes And The Nato Code Of Best Practice To Improve Management Of Experimentation Events, Andreas Tolk, Rafael E. Landaeta, Robert H. Kewley, Thomas T. Litwin Jan 2009

Utilizing Strategic Project Management Processes And The Nato Code Of Best Practice To Improve Management Of Experimentation Events, Andreas Tolk, Rafael E. Landaeta, Robert H. Kewley, Thomas T. Litwin

Computational Modeling & Simulation Engineering Faculty Publications

Systems engineering and project management are two core engineering management processes supported by core quantitative disciplines within engineering management problems. Traditional approaches to systems engineering focus on a single system being engineered and managed (i.e., project managed), while challenges addressing composition of systems of systems and the reuse of systems for new solutions require a strategic management approach that promote a process flow in which the outputs of one project (e.g., deliverables, knowledge, work documents) are captured for the benefit of other projects within and outside the project-based organization. Two other core processes of engineering management are therefore critical to …


C2 Domain Ontology Within Our Lifetime, Leslie Winters, Andreas Tolk Jan 2009

C2 Domain Ontology Within Our Lifetime, Leslie Winters, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Agile Command and Control (C2) requires agile information sharing with an increasingly wide variety of military and non-military partners. While current net-centric approaches may improve information sharing within a particular niche of C2, they do not support information sharing across the larger C2 domain. Although not a silver bullet, the development and application of a C2 domain ontology to improve C2 data and service integration appears to be increasingly realistic. In fact, there are several examples of successful ontology applications in domains such as medicine, biology, and engineering, and the new discipline of Applied Ontology is emerging. C2 data, architecture, …


Evaluation Of The Applicability Of Jc3iedm Based Information Exchange Standardization Efforts To Link-16 Based Systems, Anthony Devivi Apr 2008

Evaluation Of The Applicability Of Jc3iedm Based Information Exchange Standardization Efforts To Link-16 Based Systems, Anthony Devivi

Computational Modeling & Simulation Engineering Theses & Dissertations

Command and Control (C2) systems are critical components in decision-making systems in both the military and civilian domains. These systems act as the data evaluation and dissemination tools for larger Command, Control, Computer, Communication, Intelligence, Surveillance, and Recognizance (C4ISR) systems. Typical C2 systems accept a wide variety of inputs from many sources such as radars, weapons systems, simulators, operators, and other C2 systems. The C2 system processes the input data and presents to the user information with which decisions are made. The C2 system also determines what information should be translated and disseminated to other C2 platforms.

The basis for …