Current Search: Defense (x)
Pages
-
-
Title
-
The illusion of civil defense: A talk at the Commonwealth club, San Francisco, California, 10 November, 1961.
-
Creator
-
Piel, Gerard
-
Date Issued
-
1961
-
Identifier
-
363429, CFDT363429, ucf:5324
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/FCLA/DT/363429
-
-
Title
-
Bonus for murder: Washington's plot to rearm Western Germany.
-
Creator
-
Kahn, Arthur David
-
Date Issued
-
1951
-
Identifier
-
363250, CFDT363250, ucf:5277
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/FCLA/DT/363250
-
-
Title
-
America rearms: The citizen's guide to national defense.
-
Creator
-
Stone, William Treadwell
-
Date Issued
-
1941
-
Identifier
-
369654, CFDT369654, ucf:5467
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/FCLA/DT/369654
-
-
Title
-
DEFENSE TRADE-OFFS IN THE EVOLUTION OF THE FRUITS AND FLOWERS OF GENUS CORNUS.
-
Creator
-
De La Pascua, Danielle R, Mason, Chase, University of Central Florida
-
Abstract / Description
-
The optimal defense hypothesis predicts that the allocation of plant defenses across plant organs is proportional to the importance of a given organ to plant fitness. Despite this, much less work has been devoted to the study of reproductive defenses in plants relative to vegetative structures like leaves. This study examines the apparancy hypothesis and the resource availability hypothesis using a phylogenetic comparative approach within the genus Cornus. During the 2016 growing season,...
Show moreThe optimal defense hypothesis predicts that the allocation of plant defenses across plant organs is proportional to the importance of a given organ to plant fitness. Despite this, much less work has been devoted to the study of reproductive defenses in plants relative to vegetative structures like leaves. This study examines the apparancy hypothesis and the resource availability hypothesis using a phylogenetic comparative approach within the genus Cornus. During the 2016 growing season, plants of 25 species of Cornus were tracked for flower and fruit phenology as well as sampled for floral and fruit tissue in a common garden experiment at the Arnold Arboretum of Harvard University. This tissue was used to quantify floral and fruit defensive chemistry (e.g. tannin activity, total phenolics, total flavonoids, titratable acidity), and fruit palatability traits (e.g. water, sugar, lipid, and protein content), and the color of reproductive structure using reflectance spectroscopy. Native habitat environmental data was obtained using digitized herbarium records and publicly available environmental data layers. Trait-trait and trait-environment relationships were assessed with phylogenetic generalized least squares regression. The evolution of later flowering phenology was correlated with increased floral phenolics and tannins, and the evolution of increased fruiting duration was correlated with increased fruit tannins, both supporting the apparancy hypothesis. Additionally, the evolution of higher fruit sugar content was correlated with higher fruit tannins, and a strong evolutionary trade-off between the production of tannins and the production of flavonoids was observed. With respect to habitat, floral and fruit flavonoids and tannins were consistently lower in species native to warmer environments, while fruit phenolics and was higher in drier environments, which may support the resource availability hypothesis.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFH2000508, ucf:45674
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH2000508
-
-
Title
-
THE DISPARITY OF MILITARY POWER BETWEEN THE UNITED STATES, EUROPE AND ITS EFFECT ON TRANSTALANTIC DEFENSE PROJECT COOPERATION.
-
Creator
-
Johnson, John-Michael, Houghton, David, University of Central Florida
-
Abstract / Description
-
This study investigated what determines successful transatlantic defense policy cooperation and how that cooperation can reduce the military capability gap between the United States and its European NATO allies. It examines the differing defense policies and defense capabilities between the United States and its European NATO allies. Several theories in International Relations were also used as a foundation for the argument that cooperation is needed. The approach to defense policy is very...
Show moreThis study investigated what determines successful transatlantic defense policy cooperation and how that cooperation can reduce the military capability gap between the United States and its European NATO allies. It examines the differing defense policies and defense capabilities between the United States and its European NATO allies. Several theories in International Relations were also used as a foundation for the argument that cooperation is needed. The approach to defense policy is very different between the United States and Europe. The strategic vision of the world of both parties differs as well. Policy, doctrine and defense projects are all taken into consideration and analyzed. Based on the results of the analysis of policy and doctrines, the policy recommendation is that there should be more cooperation on defense policy planning, military doctrine and defense projects conducted in the effective fashion of current successful cases. The European NATO members will also need to cooperate on such policy if the military capability gap is to be lessened.
Show less
-
Date Issued
-
2008
-
Identifier
-
CFE0002417, ucf:47762
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002417
-
-
Title
-
Civil defense: Both red and dead.
-
Creator
-
Waskow, Arthur I., American Friends Service Committee
-
Date Issued
-
c1961
-
Identifier
-
671276, CFDT671276, ucf:5526
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/FCLA/DT/671276
-
-
Title
-
GRAPH THEORETIC MODELING: CASE STUDIES IN REDUNDANT ARRAYS OF INDEPENDENT DISKS AND NETWORK DEFENSE.
-
Creator
-
Nanda, Sanjeeb, Deo, Narsingh, University of Central Florida
-
Abstract / Description
-
Graph theoretic modeling has served as an invaluable tool for solving a variety of problems since its introduction in Euler's paper on the Bridges of Königsberg in 1736 . Two amongst them of contemporary interest are the modeling of Redundant Arrays of Inexpensive Disks (RAID), and the identification of network attacks. While the former is vital to the protection and uninterrupted availability of data, the latter is crucial to the integrity of systems comprising networks. Both are of...
Show moreGraph theoretic modeling has served as an invaluable tool for solving a variety of problems since its introduction in Euler's paper on the Bridges of Königsberg in 1736 . Two amongst them of contemporary interest are the modeling of Redundant Arrays of Inexpensive Disks (RAID), and the identification of network attacks. While the former is vital to the protection and uninterrupted availability of data, the latter is crucial to the integrity of systems comprising networks. Both are of practical importance due to the continuing growth of data and its demand at increasing numbers of geographically distributed locations through the use of networks such as the Internet. The popularity of RAID has soared because of the enhanced I/O bandwidths and large capacities they offer at low cost. However, the demand for bigger capacities has led to the use of larger arrays with increased probability of random disk failures. This has motivated the need for RAID systems to tolerate two or more disk failures, without sacrificing performance or storage space. To this end, we shall first perform a comparative study of the existing techniques that achieve this objective. Next, we shall devise novel graph-theoretic algorithms for placing data and parity in arrays of n disks (n ≥ 3) that can recover from two random disk failures, for n = p 1, n = p and n = 2p 2, where p is a prime number. Each shall be shown to utilize an optimal ratio of space for storing parity. We shall also show how to extend the algorithms to arrays with an arbitrary number of disks, albeit with non-optimal values for the aforementioned ratio. The growth of the Internet has led to the increased proliferation of malignant applications seeking to breach the security of networked systems. Hence, considerable effort has been focused on detecting and predicting the attacks they perpetrate. However, the enormity of the Internet poses a challenge to representing and analyzing them by using scalable models. Furthermore, forecasting the systems that they are likely to exploit in the future is difficult due to the unavailability of complete information on network vulnerabilities. We shall present a technique that identifies attacks on large networks using a scalable model, while filtering for false positives and negatives. Furthermore, it also forecasts the propagation of security failures proliferated by attacks over time and their likely targets in the future.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001919, ucf:47475
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001919
-
-
Title
-
Colossal deception: Analysis of the shelter program.
-
Creator
-
Pauling, Linus
-
Date Issued
-
1961
-
Identifier
-
363255, CFDT363255, ucf:5281
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/FCLA/DT/363255
-
-
Title
-
DEVELOPMEMNT OF A MODELING AND SIMULATION TRAINING NEEDS MODEL FOR SELECTED DEFENSE ACQUISITION WORKFORCE COMMUNITIES.
-
Creator
-
PEH, LIK CHUN, PROCTOR, MICHAEL, University of Central Florida
-
Abstract / Description
-
The DoD Modeling and Simulation Steering Committee (M&S SC) identified Modeling and Simulation (M&S) as an educational objective for the Acquisition, Technology and Logistics (AT&L) workforce. Notably, past usages of M&S in system acquisitions for both DoD and commercial industry have demonstrated improvements in efficiency and effectiveness over traditional acquisition techniques. However, to achieve expected and consistent performance by this workforce in these new techniques, the M&S...
Show moreThe DoD Modeling and Simulation Steering Committee (M&S SC) identified Modeling and Simulation (M&S) as an educational objective for the Acquisition, Technology and Logistics (AT&L) workforce. Notably, past usages of M&S in system acquisitions for both DoD and commercial industry have demonstrated improvements in efficiency and effectiveness over traditional acquisition techniques. However, to achieve expected and consistent performance by this workforce in these new techniques, the M&S essential skill requirements for this workforce may be extensive. This research aims to validate the content and level of competency in selected M&S tools and technology necessary for consistent workforce performance. The notion here is to achieve greater efficiency and effectiveness in the acquisition process through thresholds of competency that must be resident in or available to the acquisition workforce. This research proposes a matrix of training objectives and levels of competency for portions of the AT&L workforce that was validated through survey by individuals who are leading experts in both M&S and acquisition. This effort combines rigorously defined learning objectives and parameters by academia with practical learning insights from the military and industry ground perspectives. The resultant Joint Learning Model aims to identify the workforce educational foundations necessary to achieve more widespread efficiency and effectiveness in current and future DoD acquisitions.
Show less
-
Date Issued
-
2008
-
Identifier
-
CFE0002110, ucf:47536
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002110
-
-
Title
-
SENSORY EXPERIENCES OF CHILDREN WITH AN AUTISM SPECTRUM DISORDER AND NURSING INTERVENTIONS FOR OVER STIMULATION.
-
Creator
-
Ballentine, Felicia, Waldrop, Julee, University of Central Florida
-
Abstract / Description
-
Background: Autism spectrum disorders (ASD) are a group of neuro-developmental disorders that are characterized by impaired social interaction, communication, and restricted or repetitive behavior. Children with an ASD also display significant sensory experiences due to sensory disintegration. This integrative review of literature examines the sensory experiences of children with an ASD and determines nursing interventions that will enable them to better cope within the hospital setting....
Show moreBackground: Autism spectrum disorders (ASD) are a group of neuro-developmental disorders that are characterized by impaired social interaction, communication, and restricted or repetitive behavior. Children with an ASD also display significant sensory experiences due to sensory disintegration. This integrative review of literature examines the sensory experiences of children with an ASD and determines nursing interventions that will enable them to better cope within the hospital setting. Method: an extensive search of databases and current literature on sensory experiences of children with an ASD and interventions that facilitate coping. Results: Children with an ASD experience a wide range of sensitivity and defensiveness toward stimuli that differs on an individual basis. There is no current research that reflects nursing interventions for children with an ASD, therefore interventions from other heath care occupations were examined and applied to nursing. Conclusion: Further research is needed to better understand sensory defensiveness and research is needed in the area of nursing interventions to enable the best nursing care of children with an ASD.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFH0004063, ucf:44795
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004063
-
-
Title
-
SOUTHERN HONOR: AN ANALYSIS OF STAND YOUR GROUND LAWS IN SOUTHERN JURISDICTIONS.
-
Creator
-
Glinton, Jr., Vaughn, Beckman, James, University of Central Florida
-
Abstract / Description
-
In 2005, Florida became the first state to pass the heavily National Rifle Association , NRA, supported "Stand Your Ground" law. The most notable components of the law were abolishing the duty to retreat for someone who is not engaged in lawful activity and is in a place where he has the right to be, granting civil and criminal immunity to those using lawful force, and presuming that a person who is attacked in his dwelling, residence, and occupied vehicle has a reasonable fear of death or...
Show moreIn 2005, Florida became the first state to pass the heavily National Rifle Association , NRA, supported "Stand Your Ground" law. The most notable components of the law were abolishing the duty to retreat for someone who is not engaged in lawful activity and is in a place where he has the right to be, granting civil and criminal immunity to those using lawful force, and presuming that a person who is attacked in his dwelling, residence, and occupied vehicle has a reasonable fear of death or great bodily harm. The law was subject to a substantial amount of criticism because it was a significant departure from Florida's more than a century old common law principles regarding self-defense. Possibly due to Florida not having any precedents for these cases, Florida courts would have conflicting decisions in these matters and law enforcement agencies would enforce the law differently in similar incidents. Regardless of the issues faced by Florida, over twenty states would adopt their own versions. A significant number of these states are in the Southeastern region of the United States and are neighbors to Florida or border Florida's neighbors, such as Mississippi, Alabama, Georgia, North Carolina, South Carolina, Tennessee, and Louisiana. Because of this interesting pattern, the study examines the idea of southern culture playing a role in the passage of "Stand Your Ground" via the "Culture of Honor" theory and the researcher decided to use these jurisdictions and Florida as this study's sample. The researcher also wanted to include these jurisdictions because the existing "Stand Your Ground" literature mainly focuses on Florida and the researcher wanted to add something new to the discussion. The intent of this study to examine Florida's influence on the other jurisdictions, note any commonalties between the statutes of the jurisdictions, compare justifiable homicide statistics for the jurisdictions that provided such data, predict the future of these laws, and explore the "Culture of Honor" Theory as a possible explanation for "Stand Your Ground" laws in the states discussed. The study accomplished these goals by examining how each jurisdiction handled self-defense before "Stand Your Ground," looking at the motives behind the jurisdictions adopting "Stand Your Ground," comparing justifiable homicides in the four jurisdictions that provided them in the years immediate preceding the passage of "Stand Your Ground" to the subsequent years, and looking at amendments and proposals that were presented after the passage of "Stand Your Ground." The results uncovered that all the jurisdictions, except for Georgia and Tennessee, show a very strong Florida influence based on their similarities to Florida's law and legislators in the jurisdictions clearly mentioning Florida as their inspiration for proposing their own versions. In the jurisdictions that provided justifiable homicides, all showed an increase in the number of justifiable homicides after the passage of "Stand Your Ground." The jurisdictions in this study have also shown a strong resistance to any amendments or the complete repeal of this law. Therefore, any drastic amendment or the complete repeal seems unlikely in the future. The "Culture of Honor" Theory does explain why a few of the jurisdictions in the study adopted "Stand Your Ground" but Florida and the NRA's influence explain why others chose this course of action.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFH0004507, ucf:45219
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004507
-
-
Title
-
FINDING DUD VERTICES IN DEFENSIVE ALLIANCES AND SECURE SETS USING COMPUTATIONAL TOOLS.
-
Creator
-
Worley, George, Zhao, Yue, University of Central Florida
-
Abstract / Description
-
Defensive alliances are a way of using graphs to model the defense of resources (people, buildings, countries, etc.) against attacks where the number of potential attackers against each resource is known. The initial study of defensive alliances focused on questions of minimal defensive alliances in a graph and the minimum possible size of a defensive alliance in a graph, but in order to apply defensive alliances in modeling real-world situations, additional considerations are important. In...
Show moreDefensive alliances are a way of using graphs to model the defense of resources (people, buildings, countries, etc.) against attacks where the number of potential attackers against each resource is known. The initial study of defensive alliances focused on questions of minimal defensive alliances in a graph and the minimum possible size of a defensive alliance in a graph, but in order to apply defensive alliances in modeling real-world situations, additional considerations are important. In particular, since each vertex in a defensive alliance represents some real-world object that has a cost associated with remaining in the defensive alliance, it is important to consider the value each vertex adds to the defensive alliance. In this thesis we consider a method of assessing the efficiency of a defensive alliance, including the special case of secure sets.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0004010, ucf:49166
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004010
-
-
Title
-
Critical Success Factors for Evolutionary Acquisition Implementation.
-
Creator
-
Bjorn, Brig, Kotnour, Timothy, Karwowski, Waldemar, Mollaghasemi, Mansooreh, Farr, John, University of Central Florida
-
Abstract / Description
-
Due to extensive challenges to the efficient development and fielding of operationally effective and affordable weapon systems, the U.S. employs a complex management framework to govern defense acquisition programs. The Department of Defense and Congress recently modified this process to improve the levels of knowledge available at key decision points in order to reduce lifecycle cost, schedule, and technical risk to programs. This exploratory research study employed multiple methods to...
Show moreDue to extensive challenges to the efficient development and fielding of operationally effective and affordable weapon systems, the U.S. employs a complex management framework to govern defense acquisition programs. The Department of Defense and Congress recently modified this process to improve the levels of knowledge available at key decision points in order to reduce lifecycle cost, schedule, and technical risk to programs. This exploratory research study employed multiple methods to examine the impact of systems engineering reviews, competitive prototyping, and the application of a Modular Open Systems Approach on knowledge and risk prior to funding system implementation and production. In-depth case studies of two recent Major Defense Acquisition Programs were conducted to verify the existence and relationships of the proposed constructs and identify potential barriers to program success introduced by the new process. The case studies included program documentation analysis as well as interviews with contractor personnel holding multiple roles on the program. A questionnaire-based survey of contractor personnel from a larger set of programs was executed to test the case study findings against a larger data set. The study results indicate that while some changes adversely affected program risk levels, the recent modifications to the acquisition process generally had a positive impact on levels of critical knowledge at the key Milestone B decision point. Based on the results of this study it is recommended that the Government improve its ability to communicate with contractors during competitive phases, particularly with regard to requirements management, and establish verifiable criteria for compliance with theModular Open Systems Approach. Additionally, the Government should clarify the intent of competitive prototyping and develop a strategy to better manage the inevitable gaps between program phases. Contractors are recommended to present more requirements trade-offs and focus less on prototype development during the Technology Development phases of programs. The results of this study may be used by policy makers to shape future acquisition reforms; by Government personnel to improve the implementation of the current regulations; and by contractors to shape strategies and processes for more effective system development. This research may be used by the Government to improve the execution of acquisition programs under this new paradigm. The defense industrial base can use this research to better understand the impacts of the new process and improve strategic planning processes. The research methodology may be applied to new and different types of programs to assess improvement in the execution process over time.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004358, ucf:49442
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004358
-
-
Title
-
Application of Modeling and Simulation to Reduce Costs of Acquisition within Triple Constraints.
-
Creator
-
Mohammad, Syed, Kincaid, John, Shumaker, Randall, Wiegand, Rudolf, Richardson, Paul, University of Central Florida
-
Abstract / Description
-
A key component of defense acquisition programs operating using the Integrated Defense Acquisition, Technology, and Logistics Life Cycle Management System is the reliance on the triple constraints of cost, schedule, and performance. While the use of Modeling and Simulation tools and capabilities is prevalent and well established in the Research and Development, Analysis, and Training domains, acquisition programs have been reluctant to use Modeling and Simulation in any great depth due to...
Show moreA key component of defense acquisition programs operating using the Integrated Defense Acquisition, Technology, and Logistics Life Cycle Management System is the reliance on the triple constraints of cost, schedule, and performance. While the use of Modeling and Simulation tools and capabilities is prevalent and well established in the Research and Development, Analysis, and Training domains, acquisition programs have been reluctant to use Modeling and Simulation in any great depth due to inaccessibility of tools, Subject Matter Experts, and implications to cost and schedule. This presents a unique Simulation Management challenge which requires an in-depth understanding of the technical capabilities available within an organization, their applicability to support immediate needs, and the flexibility to utilize these capabilities within the programmatic environment to provide a value added service. The focus of this dissertation is to study the use of Modeling and Simulation in the Defense arena, and to review the applicability of Modeling and Simulation within programmatic acquisition environments which are constrained by cost, schedule, and performance. This research draws comparisons between Modeling and Simulation to other Process Improvement initiatives, such as Lean and Six Sigma, and reviews case studies involving the application of Modeling and Simulation within triple constrained environments. The development of alternate scenarios allows cost benefit analysis to be conducted for each scenario and alternate scenario, developing a case for whether or not the application of Modeling and Simulation within the triple constrained environment delivered any consequential benefit to the acquisition process. Observations are made regarding the level of Modeling and Simulation as applied within each case study, and generalized recommendations are made for the inclusion of cost benefit analysis methodologies for analyzing proposed Modeling and Simulation activities within acquisition programs. Limitations and shortcomings of the research activity are discussed, along with recommendations for potential future work in the Simulation Management field, both with respect to the specific case studies reviewed in this study and the general field.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004415, ucf:49396
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004415
-
-
Title
-
FACTORS AFFECTING BREEDING TERRITORY SIZE AND PLACEMENT OF THE FLORIDA GRASSHOPPER SPARROW (AMMODRAMUS SAVANNARUM FLORIDANUS).
-
Creator
-
Aldredge, Jill, Noss, Reed, University of Central Florida
-
Abstract / Description
-
For most taxa, maximizing fitness depends on maintaining access to adequate resources. Territories provide exclusive use of resources for an individual or a family group, thus facilitating successful reproduction. The economic defensibility of a territory depends on the quality, abundance, and distribution of its resources as well as the amount of competition that an individual must endure to maintain exclusive access. The benefits of defense must outweigh the costs for territoriality to be...
Show moreFor most taxa, maximizing fitness depends on maintaining access to adequate resources. Territories provide exclusive use of resources for an individual or a family group, thus facilitating successful reproduction. The economic defensibility of a territory depends on the quality, abundance, and distribution of its resources as well as the amount of competition that an individual must endure to maintain exclusive access. The benefits of defense must outweigh the costs for territoriality to be profitable. Territory owners may benefit from territories with high quality resources, but they also may incur greater costs defending these resources from competitors. In contrast, territories with poor quality resources provide fewer benefits to an owner but also may have fewer competitors vying for those resources. Resource quality may change over time, especially in habitats in which periodic ecological disturbances, such as fire, occur. As a result, the cost-benefit equation of defensibility also changes over time. The Florida Grasshopper Sparrow (Ammodramus savannarum floridanus), an Endangered subspecies, is a habitat specialist endemic to the Florida dry prairie, a pyrogenic ecosystem found only in south-central Florida. As a result A. s. floridanus has evolved with frequent fires and its demography is strongly influenced by the structural habitat characteristics, such as sparse woody vegetation and large amounts of bare ground that occur with frequent fire. The objective of my study was to determine what factors associated with fire (i.e. habitat structure and prey abundance) affected the "decisions" of male A. s. floridanus to defend a territory. I hypothesized that fire and the resources resulting from fire would have an impact on territory size and placement. I predicted that territories in more recently burned habitat would be of higher quality and that sparrows would avoid areas with a longer time since fire. I conducted my study at Kissimmee Prairie Preserve State Park in Okeechobee County, FL. One half of my 100-ha study plot had experienced two growing seasons since the last fire and the remaining half had experienced only a single growing season since fire at the start of my study. I mapped territories of all males within my study plot twice over the breeding season; once during the early season (nest building and incubation) and once during the late season (nestling and fledgling stages). In addition, during each survey I collected arthropods and surveyed vegetation composition within territories and at random, unoccupied points within the study plot. I compared the differences between the habitat characteristics of territories and unoccupied areas, the differences between the territories of the males that occupied the two-year rough and those in the one-year rough, males that abandoned their territories mid-season and those that remained in the study plot, and the seasonal changes in territory characteristics between the early and late season territories of males that persisted. My results indicate that A. s. floridanus selects certain habitat characteristics in which to place territories. Males preferred areas with fewer shrubs and more bare ground, which is consistent with previous studies. Prey biomass did not differ between territories and unoccupied areas. Nonetheless, although the mean mass of individual arthropods was larger in unoccupied areas, the numerical abundance of orthopterans, damselflies, and spiders was significantly higher in territories than in unoccupied areas. Sparrows were more likely to abandon their territories if they occurred in the two-year rough as opposed to the one-year rough. Territories in the two-year rough were significantly larger, had poorer quality habitat, and tended to have less prey than those in the one-year rough. The sparrows that persisted throughout the season significantly increased their territory size in the late season; however, very little spatial shift occurred, suggesting that they merely increased their territory size rather than moved to new sites. Early-season territories in the one-year rough were completely exclusive, but late season territories showed considerable overlap, suggesting lack of defense and a shift toward home ranges as opposed to exclusive territories. The habitat quality in late-season territories decreased (more shrubs, less bare ground) from the early season. Unexpectedly, however, the biomass of prey increased. This increase coincides with an increased demand for prey because sparrows are provisioning young. It seems likely that the costs of defense increase at this time because time and energy spent in defense come at the expense of time spent provisioning young. Because prey increases in the late season, the need to defend exclusive territories may decline.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002766, ucf:48135
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002766
-
-
Title
-
THE APPLICATION OF "CRASHING" A PROJECT NETWORK TO SOLVE THE TIME/COST TRADEOFF IN RECAPITALIZATION OF THE UH-60A HELICOPTER.
-
Creator
-
Fortier, Gregory, Reilly, Charles, University of Central Florida
-
Abstract / Description
-
Since the beginning of project management, people have been asked to perform "more with less" in expeditious time while attempting to balance the inevitable challenge of the time/cost tradeoff. This is especially true within the Department of Defense today in prosecuting the Global War on Terrorism both in Afghanistan and Iraq. An unprecedented and consistent level of Operational Tempo has generated heavy demands on current equipment and has subsequently forced the need to recapitalize...
Show moreSince the beginning of project management, people have been asked to perform "more with less" in expeditious time while attempting to balance the inevitable challenge of the time/cost tradeoff. This is especially true within the Department of Defense today in prosecuting the Global War on Terrorism both in Afghanistan and Iraq. An unprecedented and consistent level of Operational Tempo has generated heavy demands on current equipment and has subsequently forced the need to recapitalize several legacy systems until suitable replacements can be implemented. This paper targets the UH-60A:A Recapitalization Program based at the Corpus Christi Army Depot in Corpus Christi, Texas. More specifically, we examine one of the nine existing project sub-networks within the UH-60A:A program, the structural/electrical upgrade phase. In crashing (i.e. adding manpower or labor hours) the network, we determine the minimal cost required to reduce the total completion time of the 68 activities within the network before a target completion time. A linear programming model is formulated and then solved for alternative scenarios. The first scenario is prescribed by the program manager and consists of simply hiring additional contractors to augment the existing personnel. The second and third scenarios consist of examining the effects of overtime, both in an aggressive situation (with limited longevity) and a more moderate situation (displaying greater sustainability over time). The initial linear programming model (Scenario 1) is crashed using estimates given from the program scheduler. The overtime models are crashed using reduced-time crash estimates. For Scenarios 2 and 3, the crashable times themselves are reduced by 50% and 75%, respectively. Initial results indicate that a completion time of 79.5 days is possible without crashing any activities in the network. The five-year historical average completion time is 156 days for this network. We continue to crash the network in each of the three scenarios and determine that the absolute shortest feasible completion times, 73 days for Scenario 1, 76 days for Scenario 2, and 77.5 days for Scenario 3. We further examine the models to observe similarities and differences in which activities get targeted for crashing and how that reduction affects the critical path of the network. These results suggests an in-depth study of using linear programming and applying it to project networks to grant project managers more critical insight that may help them better achieve their respective objectives. This work may also be useful as the groundwork for further refinement and application for maintenance managers conducting day-to-day unit level maintenance operations.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0001381, ucf:47008
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001381
-
-
Title
-
AN IMPACT EVALUATION OF U.S. ARMS EXPORT CONTROLS ON THE U.S. DEFENSE INDUSTRIAL BASE: AN INTERRUPTED TIME-SERIES ANALYSIS.
-
Creator
-
Condron, Aaron, Sweo, Robert, University of Central Florida
-
Abstract / Description
-
The United States Defense Industrial Base (USDIB) is an essential industry to both the economic prosperity of the US and its strategic control over many advanced military systems and technologies. The USDIB, which encompasses the industries of aerospace and defense, is a volatile industry - prone to many internal and external factors that cause demand to ebb and flow widely year over year. Among the factors that influence the volume of systems the USDIB delivers to its international customers...
Show moreThe United States Defense Industrial Base (USDIB) is an essential industry to both the economic prosperity of the US and its strategic control over many advanced military systems and technologies. The USDIB, which encompasses the industries of aerospace and defense, is a volatile industry - prone to many internal and external factors that cause demand to ebb and flow widely year over year. Among the factors that influence the volume of systems the USDIB delivers to its international customers are the arms export controls of the US. These controls impose a divergence from the historical US foreign policy of furthering an open exchange of ideas and liberalized trade. These controls, imposed by the Departments of Commerce, Defense, and State rigidly control all international presence of the Industry. The overlapping controls create an inability to conform to rapidly changing realpolitiks, leaving these controls in an archaic state. This, in turn, imposes a great deal of anxiety and expense upon managers within and outside of the USDIB. Using autoregressive integrated moving average time-series analyses, this paper confirms that the implementation of or amendment to broad arms export controls correlates to significant and near immediate declines in USDIB export volumes. In the context of the US's share of world arms exports, these controls impose up to a 20% decline in export volume.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFH0004064, ucf:44785
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004064
-
-
Title
-
Ideas, Beliefs, Strategic Culture, and Foreign Policy: Understanding Brazil's Geopolitical Thought.
-
Creator
-
Rosas Degaut Pontes, Marcos, Handberg, Roger, Mousseau, Michael, Mirilovic, Nikola, Dantas, George Felipe De Lima, University of Central Florida
-
Abstract / Description
-
Brazil is an important player both at regional and global levels, figuring prominently in almost all lists of emerging states and regional powers. It is one of the world's largest democracies, the fifth most populous country in the world, the world's seventh-largest economy, and Latin America's largest economy, accounting for approximately 60% of South America's GDP, 47% of South America's territory and 49% of South American population, a G20 member, and an active contributor to United...
Show moreBrazil is an important player both at regional and global levels, figuring prominently in almost all lists of emerging states and regional powers. It is one of the world's largest democracies, the fifth most populous country in the world, the world's seventh-largest economy, and Latin America's largest economy, accounting for approximately 60% of South America's GDP, 47% of South America's territory and 49% of South American population, a G20 member, and an active contributor to United Nations peacekeeping operations. However, despite being usually depicted as a "monster country" which would help shape global affairs, Brazil has never been able to match its geographic, territorial and demographic assets with global geostrategic clout, and military, political, and economic power. This research seeks to explain how a rising power such as Brazil has historically behaved, reacted and constructed a discourse that, at the same time, constrains/motivates its decisions, explains its actions, and legitimizes its behavior. More specifically, the puzzle to be solved is why Brazilian regional policies are not more assertive given Brazil's capabilities? In order to answer this puzzle, this research will seek to analyze how a strategic culture influences a country's geopolitical thought, and consequently its policy choices and outcomes; to identify and qualify the elements of Brazilian strategic culture and its nature, as well as determine the relationship between these elements and Brazilian foreign and security policy decisions; to analyze the influence of Brazilian strategic culture features upon the country's geopolitical thought and grand strategy, and Brazil's geopolitics to South America; and finally to discuss the question of the dynamics of strategic cultural change in Brazil and its implications for the country's security and foreign policy decision-making process, as well as for its regional neighborhood.
Show less
-
Date Issued
-
2016
-
Identifier
-
CFE0006382, ucf:51521
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006382
-
-
Title
-
PARTITIONING A GRAPH IN ALLIANCES AND ITS APPLICATION TO DATA CLUSTERING.
-
Creator
-
Hassan-Shafique, Khurram, Dutton, Ronald, University of Central Florida
-
Abstract / Description
-
Any reasonably large group of individuals, families, states, and parties exhibits the phenomenon of subgroup formations within the group such that the members of each group have a strong connection or bonding between each other. The reasons of the formation of these subgroups that we call alliances differ in different situations, such as, kinship and friendship (in the case of individuals), common economic interests (for both individuals and states), common political interests, and...
Show moreAny reasonably large group of individuals, families, states, and parties exhibits the phenomenon of subgroup formations within the group such that the members of each group have a strong connection or bonding between each other. The reasons of the formation of these subgroups that we call alliances differ in different situations, such as, kinship and friendship (in the case of individuals), common economic interests (for both individuals and states), common political interests, and geographical proximity. This structure of alliances is not only prevalent in social networks, but it is also an important characteristic of similarity networks of natural and unnatural objects. (A similarity network defines the links between two objects based on their similarities). Discovery of such structure in a data set is called clustering or unsupervised learning and the ability to do it automatically is desirable for many applications in the areas of pattern recognition, computer vision, artificial intelligence, behavioral and social sciences, life sciences, earth sciences, medicine, and information theory. In this dissertation, we study a graph theoretical model of alliances where an alliance of the vertices of a graph is a set of vertices in the graph, such that every vertex in the set is adjacent to equal or more vertices inside the set than the vertices outside it. We study the problem of partitioning a graph into alliances and identify classes of graphs that have such a partition. We present results on the relationship between the existence of such a partition and other well known graph parameters, such as connectivity, subgraph structure, and degrees of vertices. We also present results on the computational complexity of finding such a partition. An alliance cover set is a set of vertices in a graph that contains at least one vertex from every alliance of the graph. The complement of an alliance cover set is an alliance free set, that is, a set that does not contain any alliance as a subset. We study the properties of these sets and present tight bounds on their cardinalities. In addition, we also characterize the graphs that can be partitioned into alliance free and alliance cover sets. Finally, we present an approximate algorithm to discover alliances in a given graph. At each step, the algorithm finds a partition of the vertices into two alliances such that the alliances are strongest among all such partitions. The strength of an alliance is defined as a real number p, such that every vertex in the alliance has at least p times more neighbors in the set than its total number of neighbors in the graph). We evaluate the performance of the proposed algorithm on standard data sets.
Show less
-
Date Issued
-
2004
-
Identifier
-
CFE0000263, ucf:46225
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000263
-
-
Title
-
An Agent Based Model to assess crew temporal variability during U.S. Navy shipboard operations.
-
Creator
-
Muhs, Kevin, Karwowski, Waldemar, Elshennawy, Ahmad, Hancock, Peter, Sjoden, Glenn, University of Central Florida
-
Abstract / Description
-
Understanding the factors that affect human performance variability as well as their temporal impacts is an essential element in fully integrating and designing complex, adaptive environments. This understanding is particularly necessary for high stakes, time-critical routines such as those performed during nuclear reactor, air traffic control, and military operations. Over the last three decades significant efforts have emerged to demonstrate and apply a host of techniques to include...
Show moreUnderstanding the factors that affect human performance variability as well as their temporal impacts is an essential element in fully integrating and designing complex, adaptive environments. This understanding is particularly necessary for high stakes, time-critical routines such as those performed during nuclear reactor, air traffic control, and military operations. Over the last three decades significant efforts have emerged to demonstrate and apply a host of techniques to include Discrete Event Simulation, Bayesian Belief Networks, Neural Networks, and a multitude of existing software applications to provide relevant assessments of human task performance and temporal variability. The objective of this research was to design and develop a novel Agent Based Modeling and Simulation (ABMS) methodology to generate a timeline of work and assess impacts of crew temporal variability during U.S. Navy Small Boat Defense operations in littoral waters.The developed ABMS methodology included human performance models for six crew members (agents) as well as a threat craft, and incorporated varying levels of crew capability and task support. AnyLogic ABMS software was used to simultaneously provide detailed measures of individual sailor performance and of system-level emergent behavior. This methodology and these models were adapted and built to assure extensibility across a broad range of U.S. Navy shipboard operations.Application of the developed ABMS methodology effectively demonstrated a way to visualize and quantify impacts/uncertainties of human temporal variability on both workload and crew effectiveness during U.S. Navy shipboard operations.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007592, ucf:52549
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007592
Pages