Electronic countermeasures (ECM) and acoustic countermeasures (ACM) supported protection for merchant ships against SSM/ASM missiles and mines
Wallander, Bo L.
Partelow, Robert L.
Coppens, Alan B.
Hershey, Scott H.
MetadataShow full item record
The necessity for merchant ship self protection has become more and more obvious during recent years. This thesis will investigate the threat (missiles and mines) and associated counter-measures that might be installed to provide a reasonable degree of protection. The results indicate that it is possible to get protection against a sea-skimming missile with a combination of ECM and ESM deployed aboard the ship. For protection against the mine threat, a sonar is designed in order to give the ship enough warning time to make an avoiding maneuver. The sonar investigation indicates the difficulty in designing a sonar that can fulfill all design objectives year-round in a complex acoustic environment
Approved for public release; distribution unlimited
Showing items related by title, author, creator and subject.
Role identity salience and boundary permeability preferences: An examination of enactment and protection effects Capitano, Johnna; DiRenzo, Marco S.; Aten, Kathryn J.; Greenhaus, Jeffrey H. (Elsevier, 2017-07-13);We examined two boundary management phenomena—the preferred enactment of a highly salient role across different domains through increased boundary permeability, which we call the enactment effect, and the preferred ...
Modeling and 3D visualization for evaluation of anti-terrorism/force protection alternatives Phase II final report Brutzman, Don; Blais, Curt; Norbraten, Terry (Monterey, California. Naval Postgraduate School, 2006); NPS-MV-06-002Modern Modeling and Simulation (M&S) techniques offer flexible, economical capabilities for assessing naval installation security systems, equipment and Concepts of Operations (CONOPS). These tools are useful for assessing ...
Unalmis, Bugra. (2001-03);Current architectures typically focus on the software-based protection mechanisms rather than hardware for providing protection. In fact, hardware security mechanisms can be critical for the construction of a secure system. ...