WorldCat Identities

Northrop Grumman Corporation

Overview
Works: 347 works in 363 publications in 1 language and 2,163 library holdings
Genres: Conference papers and proceedings  Periodicals  History 
Publication Timeline
.
Most widely held works about Northrop Grumman Corporation
 
moreShow More Titles
fewerShow Fewer Titles
Most widely held works by Northrop Grumman Corporation
Peer-to-peer training facilitator's guide : development and evaluation by Michele N Costanza( )

1 edition published in 2009 in English and held by 98 WorldCat member libraries worldwide

The peer-to-peer (P2P) training approach involves small groups of people from similar social groupings, who are not professional teachers, helping each other to learn. The P2P approach has great potential for rapidly identifying emerging lessons learned and integrating them into wide-reaching Army training. The present research identified the instructional principles and best practices for P2P from academia, industry, and the military supporting effective P2P training and incorporated them into a Soldier-friendly facilitator?s guide. A formative evaluation was conducted with Soldiers using the guide to prepare and conduct group discussions for a face-to-face group setting and a distributed group setting where Soldiers were linked via video teleconference. One group of Soldiers served as?facilitators? and used the facilitator?s guide to prepare and lead discussions with other Soldiers who served as?learners.? Feedback on the guide was mostly positive with Soldiers indicating that the guide provided an appropriate amount of information and a usable format and tools for structuring and fostering group discussions. Ongoing efforts to transition P2P methods into Army training are discussed
Determining a critical-skill hierarchy for Command Post of the Future (CPOF) by Richard Catrambone( )

1 edition published in 2009 in English and held by 97 WorldCat member libraries worldwide

The Command Post of the Future (CPOF) is a dynamic visualization tool that supports collaborative decision-making in tactical units. The system uses a customizable workspace based on the user's needs rather than a static format. While such an approach to digital-systems design offers flexibility and generality of use, it might also increase the complexity of learning to use the interface. As a precursor to examining alternative training approaches for CPOF, this report documents an analysis of and hierarchical structure for underlying CPOF skills. A knowledge extraction process was conducted with CPOF domain experts (DEs) to uncover the knowledge needed to use CPOF. The DEs performed a series of tasks based on the practical exercises developed for training Soldiers. A Critical Skills Document was iteratively updated and reorganized to identify the major components of the system and the procedures for accomplishing various tasks. The Critical Skills Document represents CPOF skills in a way to show their generality and applicability. Instructional designers can use it to determine what to train as well as a guide for developing learning assessments. The findings provide a foundation for comparing training approaches for CPOF and similar digital systems
Integrated medical environments and the virtual reality patient( Book )

1 edition published in 1997 in English and held by 81 WorldCat member libraries worldwide

Northrop Grumman an and Ethicon Endo-Surgery, along with Armstrong Laboratory's Aircrew Training Research Division, are developing prototype training systems to assist surgeons in triage assessment and in procedures for battlefield casualty management. The goal is to develop an integrated training system built around three major components: (1) a Biomedical Instructional Systems Decision Support System (BISD DSS) to characterize training tasks and set instructional objectives and performance standards; (2) a simulation based on the PrecepterTM virtual reality patient to support training for battlefield wound diagnosis and laparoscopic surgery; and (3) an intelligent tutoring system hosted on PrecepterTM to teach decision making skills for battlefield wound diagnosis and subsequent laparoscopic procedures
Northrop Grumman B-2 Spirit : an illustrated history by William G Holder( Book )

2 editions published in 1998 in English and held by 31 WorldCat member libraries worldwide

Beskriver det avancerede amerikanske bombefly B-2 Spirit, der er konstrueret efter Stealth-princippet og på grund af formen kaldes "Flyvende vinge."
Proceedings of the American Society for Composites Tenth Technical Conference : composite materials, mechanics, and processing : October 18-20, 1995, Miramar Sheraton Hotel, Santa Monica, California by American Society for Composites( Book )

1 edition published in 1995 in English and held by 26 WorldCat member libraries worldwide

MEMSYS 2017 : proceedings of the International Symposium on Memory Systems : Washington DC, October 2-5, 2017 by International Symposium on Memory Systems( )

1 edition published in 2017 in English and held by 11 WorldCat member libraries worldwide

Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage by Bryan A Krekel( Book )

2 editions published in 2012 in English and held by 7 WorldCat member libraries worldwide

Concern in the United States over alleged Chinese penetrations of both commercial and government networks has only intensified in the past two years as successive incidents have come to light in the media and more organizations voluntarily come forward. The Commission requested a study that both reviewed developments since the 2009 study was completed and examined new issues related to cybersecurity, China, and potential risks to U.S. interests. Specifically, Northrop Grumman information security analysts were tasked by the Commission to address: 1. The state of development in Chinese cyber-warfare strategy including the major military institutions and authors prominent in developing employment concepts and strategic guidance for the People's Liberation Army (PLA); 2. New developments in Chinese practices and capabilities for computer network exploitation to support intelligence penetration and collection against U.S. networks; 3. The potential implications for U.S. military forces in the western Pacific Ocean region, as well as in the continental United States (CONUS) if China staged a network based attack on U.S. systems and infrastructure; 4. The major actors within China (both state-affiliated and state-sponsored) who appear to be engaged in the development computer network operations (CNO) and computer network exploitation (CNE); any identifiable institutional linkages among these groups and government patron organizations supporting them; 5. The activities and research interests of China's most prominent or influential telecommunications research institutes, companies and consortiums and an assessment of any substantive linkages to the PLA, People's Republic of China (PRC) or PRC ministries with security or information technology portfolios; 6. A comparative assessment of the tools and techniques associated with contemporary cyber criminals and with state-sponsored operations originating in China to assess the distinctions that can be drawn in the operations and tools common to cyber criminals and cyber espionage activity; 7. An examination and assessment of the potential network security vulnerabilities, if any, that might be posed by the collaboration between Chinese and U.S. cybersecurity firms
Assessment of probabilistic certification methodology for composite structures by H. P Kan( Book )

1 edition published in 2001 in English and held by 6 WorldCat member libraries worldwide

A sensitivity study has been conducted to assess the currently available probabilistic structural analysis methods. The influence of the distribution parameters on the probability of failure was investigated analytically. The significant parameters that have an impact on development of probabilistic certification procedures were identified. The technical gaps which need to be filled for probabilistic certification of composite structures were discussed
Classic Grumman F-14 Tomcat films( Visual )

in English and held by 5 WorldCat member libraries worldwide

A compilation of Grumman films from 1973 to 1990 tracing the history of the F-14 Tomcat and other Grumman airplanes
Probabilistic design methodology for composite aircraft structures by Maurice W Long( Book )

1 edition published in 1999 in English and held by 5 WorldCat member libraries worldwide

Probabilistic structural analysis methods provide a means to quantify the inherent risk of a design and assess the sensitivities of design variables. This report is intended to introduce the subject of probabilistic analysis to engineers in the aerospace industry as well as act as a reference to guide those applying this technology. The current (deterministic) structural analysis approach is described, and its shortcomings are pointed out. The evolution of probabilistic analysis is presented, and the basic theory is discussed and explained via examples. Aerospace industry method development is described in detail, along with associated aerospace applications. An in-depth explanation of one industry method (Northrop Grumman) is given, along with an example run of their computer program. The report concludes with a consensus of potential benefits as well as potential issues of concern that must be addressed by those using these analysis methods
National coverage for emergency Mayday systems by David Richardson( Book )

2 editions published between 1996 and 1997 in English and held by 5 WorldCat member libraries worldwide

Interference resistance signals for collision avoidance radar by Mark Hischke( Book )

2 editions published in 1996 in English and held by 4 WorldCat member libraries worldwide

Advanced technology transit bus : final test report for ATTB prototypes by H. L Reutter( Book )

2 editions published in 1999 in English and held by 3 WorldCat member libraries worldwide

Northrop Grumman news( )

in English and held by 3 WorldCat member libraries worldwide

Joint STARS data analysis of "the battle of Khafji" : final report( Book )

2 editions published in 1997 in English and held by 2 WorldCat member libraries worldwide

"This report details analysis results of JSTARS datafiles from 25 January to 3 February 1991. Lines of communications in use by Iraqi vehicles on those dates are geographically specified on a map. Probable identification of specific maneuver units, intent, and the relative impact of air interdiction attacks is detailed. Preparations of other defensive actions is revealed. Tactics resorted to on subsequent days in response to air attacks are identified. Overall, the magnitude of Iraqi activity revealed indicates the failed attempt at Khafji from 29 to 31 Jan 1991 was planned to be a major ground effort. The analysis provides a historical example of the military worth of Intelligence Surveillance and Recconnaissance (ISR). Methodology for follow-on analysis is outlined."--Report documentation page
UAV systems : shaping the 21st century : benefits, opportunities and challenges : 1-2 February 2005, London UK( )

1 edition published in 2005 in English and held by 2 WorldCat member libraries worldwide

Precursor systems analysis of automated highway systems (AHS) automated check-in( )

1 edition published in 1995 in English and held by 2 WorldCat member libraries worldwide

Horizons : career opportunities( )

in English and held by 2 WorldCat member libraries worldwide

Precursor systems analyses of Automated Highway Systems : check-in activity : resource materials( Book )

1 edition published in 1995 in English and held by 2 WorldCat member libraries worldwide

Northrop Grumman Review( )

in English and held by 2 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.42 (from 0.21 for Defense, a ... to 0.84 for Precursor ...)

Northrop Grumman B-2 Spirit : an illustrated history
Covers
Alternative Names

controlled identityGrumman Corporation

controlled identityNewport News Shipbuilding and Dry Dock Company

controlled identityNorthrop Corporation

NOC

Northrop Grumman americká firma

Northrop Grumman bedrijf in Verenigde Staten van Amerika

Northrop Grumman constructeur aéronautique américain

Northrop Grumman Corporation

Нортроп Груман

נורת'רופ גראמן תאגיד אמריקאי המייצר כלי טיס, כלי שיט, מוצרים ביטחוניים, אמצע לחימה, מכ"מים ועוד

نورتروپ گرومن

نورثروب غرومان

നോർത്രോപ് ഗ്രുമൻ

นอร์ทธรอป กรัมแมน

노스럽 그러먼

ノースロップ・グラマン

諾斯洛普·格拉曼

诺斯洛普·格鲁门

Languages
English (56)