DocumentCode :
390005
Title :
Catastrophe theory partition attachment (CTPA) protocol for homeland security in the electronic battlefield and theater missile defense
Author :
Niznik, Carol A.
Author_Institution :
NW SYSTEMS, Rochester, NY, USA
Volume :
2
fYear :
2002
fDate :
7-10 Oct. 2002
Firstpage :
1443
Abstract :
The catastrophe theory partition attachment (CTPA) protocol must be appended to each network centric protocol partition to enable complete observation by the global grid of catastrophe theory properties due to terrorist activity. The CTPA protocol utilizes the Strategic Defense Initiative Organization (SDIO) overlay protocol concept in the geometric neural network overlay (GNNO) protocol to detect and replace software protocol partitions removed or damaged realizing Lagrangian constraint removal theory for tracking damage, Lagrangian capacity and delay optimization, and the weapons of mass destruction percentage of intelligence distribution exposure solution points. The CTPA protocol geometric software structure is composed of the octagonal GNNO protocol, and the four attached pentagons each containing three triangles. The two catastrophe triangles in each of the four pentagons yield the eight catastrophes and the four communication parity triangles, within the four pentagons, communicate the CTPA protocol corrections to the global grid. The CTPA protocol attachment geometric software structure is performance evaluated for both the electronic battlefield weapon and target population and path prediction (WTPPP) protocol and the theater missile defense (TMD) missile interception constraint removal (MICR) protocol.
Keywords :
catastrophe theory; constraint theory; electronic warfare; military communication; neural nets; protocols; CTPA protocol; Lagrangian capacity; Lagrangian constraint removal theory; MICR protocol; SDIO overlay protocol; Strategic Defense Initiative Organization; TMD; WTPPP protocol; catastrophe theory partition attachment; delay optimization; electronic battlefield; geometric neural network overlay protocol; global grid; military communication; missile interception constraint removal; network centric protocol partition; octagonal GNNO protocol; performance evaluation; software protocol partitions; terrorist activity; theater missile defense; weapon and target population and path prediction; weapons of mass destruction; Constraint optimization; Constraint theory; Intelligent networks; Lagrangian functions; Missiles; Neural networks; Protocols; Software performance; Terrorism; Weapons;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILCOM 2002. Proceedings
Print_ISBN :
0-7803-7625-0
Type :
conf
DOI :
10.1109/MILCOM.2002.1179695
Filename :
1179695
Link To Document :
بازگشت