Zobrazeno 1 - 10
of 61
pro vyhledávání: '"Douglas D. Hodson"'
Publikováno v:
Information, Vol 14, Iss 4, p 202 (2023)
Is it possible to develop a meaningful measure for the complexity of a simulation model? Algorithmic information theory provides concepts that have been applied in other areas of research for the practical measurement of object complexity. This artic
Externí odkaz:
https://doaj.org/article/36a302e287c44e8991e5f0f5bdb6eaac
Autor:
Logan O. Mailloux, Douglas D. Hodson, Michael R. Grimaila, Ryan D. Engle, Colin V. Mclaughlin, Gerald B. Baumgartner
Publikováno v:
IEEE Access, Vol 4, Pp 2188-2197 (2016)
Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared cryptographic keying material between two geographically separated parties. The unique n
Externí odkaz:
https://doaj.org/article/9045324d93ac4d019785af441e7d416c
Autor:
Logan O. Mailloux, Jeffrey D. Morris, Michael R. Grimaila, Douglas D. Hodson, David R. Jacques, John M. Colombi, Colin V. Mclaughlin, Jennifer A. Holes
Publikováno v:
IEEE Access, Vol 3, Pp 110-130 (2015)
Quantum key distribution (QKD) is an innovative technology that exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared key for use in cryptographic applications. However, QKD is a relatively nascent technology
Externí odkaz:
https://doaj.org/article/b1795489a9454c92a99915fc73193c5c
Autor:
Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Ryan Engle, Colin McLaughlin, Gerald Baumgartner
Publikováno v:
Applied Sciences, Vol 7, Iss 2, p 212 (2017)
Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keying material for cryptographic purposes. To date, several commercially viable decoy state enabled QKD systems have been successfully demonstrated and s
Externí odkaz:
https://doaj.org/article/ba6eddbc101f40f7a5dff36849769061
Autor:
Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry
Publikováno v:
The Journal of Supercomputing. 79:3616-3642
Securing distributed device communication is critical because the private industry and the military depend on these resources. One area that adversaries target is the middleware, which is the medium that connects different systems. This paper evaluat
Autor:
Andrew T. Park, Nathaniel Peck, Richard Dill, Douglas D. Hodson, Michael R. Grimaila, Wayne C. Henry
Publikováno v:
The Journal of Supercomputing. 79:3471-3488
Successful missions in the field often rely upon communication technologies for tactics and coordination. One middleware used in securing these communication channels is Data Distribution Service (DDS) which employs a publish-subscribe model. However
Autor:
Logan O. Mailloux, Michael R. Grimaila, Douglas D. Hodson, Gerald Baumgartner, Colin McLaughlin
Publikováno v:
Handbook of Scholarly Publications from the Air Force Institute of Technology (AFIT), Volume 1, 2000–2020 ISBN: 9781003220978
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4acc114a30872bb6f47189520e26c75c
https://doi.org/10.1201/9781003220978-5
https://doi.org/10.1201/9781003220978-5
Publikováno v:
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. 20:131-146
This research identifies specific communication sensor features vulnerable to fog and provides a method to introduce them into an Advanced Framework for Simulation, Integration, and Modeling (AFSIM) wargame scenario. Military leaders use multiple inf
Publikováno v:
The Journal of Supercomputing. 77:12666-12689
Safety is a simple concept but an abstract task, specifically with aircraft. One critical safety system, the Traffic Collision Avoidance System II (TCAS), protects against mid-air collisions by predicting the course of other aircraft, determining the
Autor:
J Scott Thompson, Douglas D. Hodson
Publikováno v:
The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. 19:575-587
Simulation approaches generally fall into two categories: discrete time or discrete event. For military modeling and simulation needs, the two approaches typically align with virtual simulation, which implies human interaction with the simulation pro