Preliminary design considerations for a shipboard damage control monitoring system.
Jordan, James Abel Jr.
Powers, V. Michael
MetadataShow full item record
At present ships are monitored for fire, flooding, and other casualties by watches such as the Sounding and Security Watch, but casualties still cause millions of dollars of damage each year. The need for a damage control monitoring system is discussed in detail and the design requirements for a system are identified. A number of alternatives for a monitoring system are examined, and one of these alternatives is recommended for implementation and prototype testing. The proposed system, which uses a network of fire and flooding detectors in individual compartments connected via a power line carrier to a central processor, can be developed at exceptionally low risk using existing technology and at a price that can be afforded. The system would provide comprehensive damage control monitoring, and could be adapted to include equipment monitoring, record keeping, and analysis functions.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Sellers, Kristin R. (Monterey, California: Naval Postgraduate School, 2016-09);Computer systems continue to be at risk of attack by malicious software that are attached to email. Email has been determined to be the cause of 80% of computer virus infections. Millions of dollars are lost yearly due to ...
Brunger, Clifford A. (Monterey, California. Naval Postgraduate School, 1994-03);Aircraft design and control techniques rely on the proper modeling of the aircraft's equations of motion. Many of the variables used in these equations are aerodynamic coefficients which are ...
A comparative analysis of multivariate statistical detection methods applied to syndromic surveillance Matthew C. Knitt. (Monterey, California. Naval Postgraduate School, 2007-06);Biological terrorism is a threat to the security and well-being of the United States. It is critical to detect the presence of these attacks in a timely manner, in order to provide sufficient and effective responses to ...