Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Coalition Battle Management Language (C-Bml) Study Group Final Report, Major Kevin Galvin, Mike Hieb, Andreas Tolk, Charles Turnitsa, Curtis Blais, James Montgomery Dec 2005

Coalition Battle Management Language (C-Bml) Study Group Final Report, Major Kevin Galvin, Mike Hieb, Andreas Tolk, Charles Turnitsa, Curtis Blais, James Montgomery

Computational Modeling & Simulation Engineering Faculty Publications

Interoperability across Modeling and Simulation (M&S) and Command and Control (C2) systems continues to be a significant problem for today's warfighters. M&S is well-established in military training, but it can be a valuable asset for planning and mission rehearsal if M&S and C2 systems were able to exchange information, plans, and orders more effectively. To better support the warfighter with M&S based capabilities, an open standards-based framework is needed that establishes operational and technical coherence between C2 and M&S systems.


Quantifying Vulnerability To Critical Infrastructure, Barry Charles Ezell Apr 2005

Quantifying Vulnerability To Critical Infrastructure, Barry Charles Ezell

Engineering Management & Systems Engineering Theses & Dissertations

Military and civilian leaders have the responsibility to protect our Nation's critical infrastructure, communities, and symbols of American power from terrorists, home and abroad, as well as from natural disasters. To this end, assessments are conducted to reduce vulnerability. The literature offers multiple definitions of vulnerability and measurement has not been adequately addressed. Thus, the purpose of this research has been to develop and deploy a systems-based model that quantifies vulnerability to critical infrastructure. This research defines critical infrastructure vulnerability as a measure of the susceptibility of critical infrastructure to threat scenarios. Vulnerability is a function of (1) threat scenario, …


Modeling Of Commercial Maritime Port Recoverability From Security Disruptions: Work-In-Progress, C. Ariel Pinto, Wayne K. Talley Jan 2005

Modeling Of Commercial Maritime Port Recoverability From Security Disruptions: Work-In-Progress, C. Ariel Pinto, Wayne K. Talley

Engineering Management & Systems Engineering Faculty Publications

This article describes active research in commercial maritime port's recovery from security disruptions which explores the synergy of economic and simulation models in investigating the recoverability of ports after security incidents. Previous study has identified decision variables and throughput simulation models of port operation. However, none of these models have been utilized to investigate port's recovery from a security disruption and in evaluating recoverability investments. The method of research includes analysis of recorded disruptions, identification of impediments to recovery and investment criteria for recoverability. This article provides managers insight into including security and continuity of operation in managing various types …