Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Engineering

Damage Detection Using Pattern Classifiers, Eric D. Swenson Mar 1998

Damage Detection Using Pattern Classifiers, Eric D. Swenson

Theses and Dissertations

The research focused on developing and tuning finite element models to train pattern classifiers to detect and locate damage in a real structure. The research was broken into three distinct phases: finite element (FE) model development, FE model tuning, and pattern classifier training and testing. In the finite element development phase, a low order FE model called the baseline model and a high order model called the stiff model were created. In the FE model tuning phase, these FE models were tuned using measured Frequency Response Functions (FRFs), and the results were compared with previous research in which tuning was …


An Airlift Hub-And-Spoke Location-Routing Model With Time Windows: Case Study Of The Conus-To-Korea Airlift Problem, David W. Cox Mar 1998

An Airlift Hub-And-Spoke Location-Routing Model With Time Windows: Case Study Of The Conus-To-Korea Airlift Problem, David W. Cox

Theses and Dissertations

Traditionally, the United States Air Force's Air Mobility Command (AMC) has used the concept of direct delivery to airlift cargo and passengers from a point of embarkation to a point of debarkation. This study develops an alternative hub-and-spoke combined location-routing integer linear programming prototype model, and uses this model to determine what advantages a hub-and-spoke system offers, and in which scenarios it is better-suited than the direct delivery method. Additionally, the analysis suggests that the C-17 may be better-suited, in certain airlift situations, for theater airlift versus strategic (direct delivery) airlift. The model features the following elements: time windows, cargo …


A Network Disruption Modeling Tool, James A. Leinart Mar 1998

A Network Disruption Modeling Tool, James A. Leinart

Theses and Dissertations

Given that network disruption has been identified as a military objective and C2-attack has been identified as the mechanism to accomplish this objective, a target set must be acquired and priorities assigned to each target set. In order to move beyond subjective target prioritization, development and implementation of a methodology and model, that quantitatively measures the value of each target in achieving the objective, is needed in prioritizing targets. This thesis effort uses a vertex cut-set algorithm on a transformation of the graph representing a notional network of interest. The cut-sets generated represent potential target sets. Value-focused thinking and decision …