Ubiquitous power: opportunities and benefits of the photo-voltaic power converter for the individual war fighter
Stout, John D.
Tudor, Ron B.
MetadataShow full item record
The success of every military throughout history has been its ability to move, shoot, and communicate, which require power. In the modern era, technology has afforded military soldiers with the equipment that greatly enhances maneuverability through state of the art communications equipment. Such equipment creates significant power needs that are currently met through the use of expensive and heavy to carry disposable and rechargeable batteries. The limitation for improved complex communications, as well as weapon systems, is the ability to power such systems. The problem with alternative power sources has been the inefficiency, reliability, and convenience of such systems. This project provides an analysis of a new ubiquitous power source (Photo-Voltaic Power Converter) and the opportunities it can afford to individual soldiers in meeting existing power requirements. This paper calculates the savings and reports on critical user needs of the individual war fighter.
MBA Professional ReportApproved for public release, distribution is unlimited
Showing items related by title, author, creator and subject.
Agrawal, B.N. (2005);This paper presents a review of the spacecraft design program at the Naval Postgraduate School. This program is part of the space systems engineering curriculum. In this curriculum, the students take at least one course ...
Martin, Michael W. (Monterey, California. Naval Postgraduate School, 2006-06);This work presents a conceptual structure for the behaviors of artificial intelligence agents, with emphasis on creating teamwork through individual behaviors. The goal is to set up a framework which enables teams of ...
Examination of retinal pattern threshold levels and their possible effect on computer access control mechanisms Helle, Debra K. (1985-09);The advent of multi-programming and the proliferation of shared computer systems has increased the need for greater computer security. Computer security can be segmented into six categories: physical, hardware, software, ...