Searched for: subject%3A%22MO%255C%2B%255C-%255C%2BMilitary%255C%2BOperations%22
(1 - 20 of 89)

Pages

document
Shandilya, N. (author), Ligthart, T. (author), van Voorde, I. (author), Stahlmecke, B. (author), Clavaguera, S. (author), Philippot, C. (author), Goede, H. (author)
The shredding of waste of electrical and electronic equipment (WEEE) and other products, incorporated with nanomaterials, can lead to a substantial release of nanomaterials. Considering the uncertainty, complexity, and scarcity of experimental data on release, we present the development of a Bayesian belief network (BBN) model. This baseline...
article 2018
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author)
This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the...
conference paper 2017
document
Pinto, M.J. (author), Barros, A.I. (author), Noomen, R. (author), van Gelder, P.H.A.J.M. (author), Lamballais Tessensohn, T. (author)
The operational use of satellite systems has been increasing due to technological advances and the reduced costs of satellites and their launching. As such it has become more relevant to determine how to better use these new capabilities which is reflected in an increase in application studies in this area. This work focuses on the problem of...
conference paper 2017
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author)
This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the...
conference paper 2017
document
Lamballais Tessensohnt, T. (author)
Het verwerken van e-commerce bestellingen stelt magazijnen voor grote uitdagingen. Het assortiment aan producten is vaak groot, waarmee de afstanden in het magazijn ook groot worden. Daarnaast bestaan de bestellingen meestal uit één eenheid, in plaats van uit complete dozen of pallets die kostenefficiënt te verplaatsen zijn. Daarbovenop komt dat...
article 2017
document
Mente, R. (author), van de Kuijt, J.T. (author)
Tijdens het Oekraïne-referendum in 2016 werd in Nederland een opvallend en overduidelijk nepfilmpje verspreid van zogenaamde soldaten uit de Oekraïne. Bedoeld om verwarring te zaaien en discussies te verstoren. Waarschijnlijk kwam deze uit de nepnieuwsfabriek uit Sint Petersburg welke ook op Nederland is gericht. Daarnaast bracht de NRC een...
article 2017
document
van der Vecht, B. (author), van Wermeskerken, F.P.J. (author), Smit, S.K. (author)
article 2017
document
Laan, C.M. (author), van der Mijden, T. (author), Martins Botto de Barros, A.I. (author), Boucherie, R.J. (author)
article 2017
document
Veldhuis, G.A. (author), Korzilius, H. (author)
Research has shown that many individuals have difficulties solving tasks that involve a principal component of dynamic systems: accumulation. They incorrectly assume that the behavioural pattern of a stock resembles that of its flows and vice versa. This has become known as correlation heuristic reasoning.Much less is known about the underlying...
article 2016
document
Forrester, B. (author), den Hollander, K. (author)
Social Media (SM) is a relatively new phenomenon. Intelligence agencies have been struggling to understand how to exploit the social pulse that flows from this source. The paper starts with a brief overview of SM with some examples of how it is being used by adversaries and how we might be able to exploit this usage. Often treated as another...
conference paper 2016
document
van de Kuijt, J.T. (author)
Onlangs heeft minister Hennis-Plasschaert het belang aangekaart van het vervangen van de Walrus-klasse onderzeeboot. De minister onderkent in haar visie dat de onderzeeboot zeer geschikt is voor het verzamelen, analyseren en delen van inlichtingen. Dit artikel gaat in op de inlichtingentaak van de Nederlandse onderzeeboot. Uit onderzoek blijkt...
article 2016
document
Maathuis, C.E. (author), Pieters, W. (author), van den Berg, J. (author)
In the last decades we witnessed the creation of a virtual world: cyberspace, which offers plenty of opportunities and challenges. Meanwhile, we are confronted with many conflict situations between different groups of people or countries. In the last years, several events have been described in terms of cyber warfare or the use of cyber weapons,...
conference paper 2016
document
Logtens, T.W.A. (author), Huijsman, W.P. (author), Schrijver, P. (author)
De diversiteit aan methoden en middelen waarover een commandant beschikt is de afgelopen jaren sterk toegenomen. Om deze middelen effectief in te kunnen zetten moet hij zoveel mogelijk inzicht hebben in alle factoren en actoren van invloed, waarvoor de werkmethode Intelligence Preparation of the Environment (IPE) ontwikkeld is. De Method to...
article 2016
document
Veldhuis, G.A. (author), van Scheepstal, P.G.M. (author), Rouwette, E. (author), Logtens, T.W.A. (author)
When faced with wicked and messy problems, practitioners can rely on a variety of problem structuring methods (PSMs). Although previous efforts have been made to combine such methods with simulation, currently, few exist that integrate a simulation capability within problem structuring. Our integrated approach named MARVEL (method to analyse...
article 2015
document
Phillipson, F. (author), Bastings, I.C.L. (author), Vink, N. (author)
In this paper a Bayes model to quantify the effects of a passive CBRN defence system is presented. The model gives insight in the way of the mutual influence of all the elements of passive CBRN defence, by the use of detailed scenario analysis, sensitivity analysis and root cause analysis. This can help in conducting evaluation studies for...
conference paper 2015
document
de Jong, S. (author), Noordkamp, H.W. (author), van der Poel, N.C.L. (author), Smit, S.K. (author)
Assessing the effectiveness of a plan, given multiple potential scenarios, is a common problem for analysts, especially in the military domain. This problem can seriously impact the safety of the people that are involved in planned missions. More precisely, the availability of multiple models, with varying levels of fidelity, leads to the...
conference paper 2015
document
Pruyt, E. (author), Logtens, T.W.A. (author)
Mismanagement of societal aging is an important threat to health care, social security, and the economy of many nations. A System Dynamics simulation model related to societal aging in the Netherlands and its implications for the Dutch welfare system is used here to generate exploratory scenarios and to test policy robustness across many...
article 2015
document
Evers, L. (author), Barros, A.I. (author), Monsuur, H. (author), Wagelmans, A. (author)
Unmanned Aerial Vehicles (UAVs) are important assets for information gathering in Intelligence Surveillance and Reconnaissance (ISR) missions. Depending on the uncertainty in the planning parameters, the complexity of the mission and its constraints and requirements, different planning methods might be preferred. The first two planning...
bookPart 2015
document
Fitski, H.J. (author), van Veldhoven, E.R. (author), Nienhuis, B. (author)
In veel maritieme operaties vormt het proces van oppervlaktebeeldopbouw een belangrijke component. Door middel van simulatle is het mogelijk dit proces te verbeteren en daarmee de operationele effectiviteit van een maritieme operatie te verhogen. Daarom heeft de afdeling Military Operations van TNO een simulatiemodel voor maritieme...
article 2015
document
Barros, A.I. (author)
article 2015
Searched for: subject%3A%22MO%255C%2B%255C-%255C%2BMilitary%255C%2BOperations%22
(1 - 20 of 89)

Pages