military networks
Recently Published Documents


TOTAL DOCUMENTS

106
(FIVE YEARS 16)

H-INDEX

10
(FIVE YEARS 1)

2021 ◽  
Vol 100 (2) ◽  
pp. 171-198
Author(s):  
Matthew Dziennik

In 1745–6, thousands of troops were raised in the Highlands and Islands in support of the house of Hanover. Often neglected due to the intense focus on Highland Jacobitism, these Gaels were instrumental in the defeat of the Jacobites. The study of pro-Hanoverian forces in the Gàidhealtachd tells us much not only about the military history of the 1745 rebellion but also about the nature of the whig regime in Scotland. In contrast to the ideological frameworks increasingly used to make sense of the Jacobite period, this article argues that pragmatic negotiations between the central government and the whig clans helped mobilise and empower regional responses to the rebellion. Exploiting the government's need for Gaelic allies in late 1745, Highland leaders, officers, and enlisted men used military service to shore up a nexus of political, financial and security imperatives. By examining the recruitment and service of anti-Jacobite Gaels, this article shows that—even in the epicentre of the rebellion—the Hanoverian state possessed important structural strengths that enabled it to confront the threat of armed insurrection. In so doing, the article reveals the political and fiscal-military networks that sustained whig control in Scotland.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 521
Author(s):  
Min Wook Kang ◽  
Yun Won Chung

In delay-tolerant networking (DTN), messages are delivered to destination nodes by using opportunistic contacts between contact nodes, even if stable routing paths from source nodes to destination nodes do not exist. In some DTN network environments, such as military networks, nodes movement follows a group movement model, and an efficient DTN routing protocol is required to use the characteristics of group mobility. In this paper, we consider a network environment, where both intra- and intergroup routing are carried out by using DTN protocols. Then, we propose an efficient routing protocol with overload control for group mobility, where delivery predictability for group mobility is defined and proactive overload control is applied. Performance evaluation results show that the proposed protocol had better delivery ratios and overhead ratios than compared protocols, although the delivery latency was increased.


2021 ◽  
Author(s):  
Felix Haass ◽  
Martin Ottmann

Elections are cornerstones for societies transitioning from civil war to democracy. The success or failure of these elections is shaped by the strategies former belligerents employ to mobilize voters. Of those strategies, clientelism is particularly important as it represents improved voter-elite relations over dysfunctional wartime politics, but, if pervasive, also risks undermining long-term democratic consolidation. We argue that the organizational legacies of rebellion shape the way how rebels engage in electoral clientelism. We expect that former rebels target pre-electoral benefits to areas of wartime support; rely on wartime military networks to deliver those benefits; and exploit discretionary control over peace dividends when allocating electoral benefits. We combine original geospatial data on the timing and location of over 2,000 tsunami aid projects with village-level surveys in post-civil war Aceh, Indonesia, to test these hypotheses. Results from difference-in-differences models and detailed tests of causal mechanisms are consistent with our theoretical expectations.


2021 ◽  
Vol 59 (2) ◽  
pp. 50-55
Author(s):  
Fidan Mehmeti ◽  
Noor Felemban ◽  
Zongqing Lu ◽  
Kristina Wheatman ◽  
Gregory Cirincione ◽  
...  

Ethnohistory ◽  
2020 ◽  
Vol 67 (4) ◽  
pp. 643-664
Author(s):  
Jacob J. Sauer

Abstract At the northern and southern ends of the Spanish “Empire,” two cultures of similar sociopolitical complexity violently removed Spanish invaders from their ancestral territory. The Che of southern Chile militarily engaged the Spanish in the mid-sixteenth century and eventually forced the Spanish to abandon their colonization attempts. The Puebloans of the southwestern United States also forced the Spanish to flee from Puebloan territory in 1680, but by 1696, Puebloan territories returned to Spanish hegemony. This article compares some of the reasons why the Che maintained independence for more than 350 years while Puebloan independence lasted 16, examining the military power networks of the Che and Puebloans and the timing of resistance to Spanish incursion. These comparisons highlight some of the diverse reactions of foreign groups and how connections between peoples affect how individuals and communities react to outside influences.


Author(s):  
Saivikas reddy Bedudhuri

Mobile ad hoc network is a type of ad hoc wireless networks which has become highly important in wireless communication. This network has composed of a set of wireless nodes and mobile phones and computer can play role of these nodes. Routing in these networks is complex and difficult because there is no fixed topology and nodes are freely displaced. In these networks, each node plays role of a router. Military networks, crime management networks etc. can be among the examples of mobile ad hoc network. One of the most important issues in ad hoc networks is routing. There are different types of routing protocols such as AODV and DSDV routing protocols. This report analyses and evaluates these two protocols with fuzzy logic and NS-2 simulator. This report is organized as follows: previous works, relates to concepts mentioned in this paper, the designed fuzzy system, results of simulation are mentioned.


2020 ◽  
Vol 29 (2) ◽  
pp. 268-300
Author(s):  
Anders Themnér ◽  
Niklas Karlén
Keyword(s):  

Author(s):  
Alexander Kott ◽  
Paul Théron ◽  
Luigi V Mancini ◽  
Edlira Dushku ◽  
Agostino Panico ◽  
...  

The North Atlantic Treaty Organization (NATO) Research Task Group IST-152 developed a concept and a reference architecture for intelligent software agents performing active, largely autonomous cyber-defense actions on military assets. The group released a detailed report, briefly reviewed in this article, where such an agent is referred to as an Autonomous Intelligent Cyber-defense Agent (AICA). In a conflict with a technically sophisticated adversary, NATO military networks will operate in a heavily contested battlefield. Enemy malware will likely infiltrate and attack friendly networks and systems. Today’s reliance on human cyber defenders will be untenable on the future battlefield. Instead, artificially intelligent agents, such as AICAs, will be necessary to defeat the enemy malware in an environment of potentially disrupted communications where human intervention may not be possible. The IST-152 group identified specific capabilities of AICA. For example, AICA will have to be capable of autonomous planning and execution of complex multi-step activities for defeating or degrading sophisticated adversary malware, with the anticipation and minimization of resulting side effects. It will have to be capable of adversarial reasoning to battle against a thinking, adaptive malware. Crucially, AICA will have to keep itself and its actions as undetectable as possible, and will have to use deceptions and camouflage. The report identifies the key functions and components and their interactions for a potential reference architecture of such an agent, as well as a tentative roadmap toward the capabilities of AICA.


Sign in / Sign up

Export Citation Format

Share Document