Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 29 of 29

Full-Text Articles in Engineering

Minimization Of Collateral Damage In Airdrops And Airstrikes, Steven P. Dillenburger Sep 2012

Minimization Of Collateral Damage In Airdrops And Airstrikes, Steven P. Dillenburger

Theses and Dissertations

Collateral damage presents a significant risk during air drops and airstrikes, risking citizens' lives and property, straining the relationship between the United States Air Force and host nations. This dissertation presents a methodology to determine the optimal location for making supply airdrops in order to minimize collateral damage while maintaining a high likelihood of successful recovery. A series of non-linear optimization algorithms is presented along with their relative success in finding the optimal location in the airdrop problem. Additionally, we present a quick algorithm for accurately creating the Pareto frontier in the multi-objective airstrike problem. We demonstrate the effect of …


Effective Measurement Of Reliability Of Repairable Usaf Systems, Louis J. Hogge Sep 2012

Effective Measurement Of Reliability Of Repairable Usaf Systems, Louis J. Hogge

Theses and Dissertations

The USAF generally does not know the reliability of its fielded repairable systems. The reported metric, Mean Time Between Failure (MTBF), is too lagging to be actionable in the best case, and is not representative of actual system reliability in the worst case. This thesis investigates the statistical techniques for measurement and analysis of the reliability of fielded repairable systems, which are very different than nonrepairables. To frame the investigation, a comparison is made between the generally accepted definitions and metrics and those used across the US Air Force (USAF). Reliability can be analyzed in four context areas: reliability prediction …


The Multiobjective Average Network Flow Problem: Formulations, Algorithms, Heuristics, And Complexity, Jeremy D. Jordan Sep 2012

The Multiobjective Average Network Flow Problem: Formulations, Algorithms, Heuristics, And Complexity, Jeremy D. Jordan

Theses and Dissertations

Integrating value focused thinking with the shortest path problem results in a unique formulation called the multiobjective average shortest path problem. We prove this is NP-complete for general graphs. For directed acyclic graphs, an efficient algorithm and even faster heuristic are proposed. While the worst case error of the heuristic is proven unbounded, its average performance on random graphs is within 3% of the optimal solution. Additionally, a special case of the more general biobjective average shortest path problem is given, allowing tradeoffs between decreases in arc set cardinality and increases in multiobjective value; the algorithm to solve the average …


Systems Engineering Applications For Small Business Innovative Research (Sbir) Projects, Phillip J. O'Connell Sep 2012

Systems Engineering Applications For Small Business Innovative Research (Sbir) Projects, Phillip J. O'Connell

Theses and Dissertations

This research defined Systems Engineering applications for Small Business Innovative Research (SBIR) projects and answered five research questions addressing the essential elements and application of SE processes within the SBIR community. The research identified that current DoD and Air Force SE Policy do not specifically address SBIR projects. This research identified the need to tailor a SE approach for SBIR projects as overarching policy is not applicable in all cases. The culmination of this effort defined the current SE tasks applicable for the SBIR community.


The In-Transit Vigilant Covering Tour Problem Of Routing Unmanned Ground Vehicles, Huang Teng Tan Aug 2012

The In-Transit Vigilant Covering Tour Problem Of Routing Unmanned Ground Vehicles, Huang Teng Tan

Theses and Dissertations

The routing of unmanned ground vehicles for the surveillance and protection of key installations is modeled as a new variant of the Covering Tour Problem (CTP). The CTP structure provides both the routing and target sensing components of the installation protection problem. Our variant is called the in-transit Vigilant Covering Tour Problem (VCTP) and considers not only the vertex cover but also the additional edge coverage capability of the unmanned ground vehicle while sensing in-transit between vertices. The VCTP is formulated as a Traveling Salesman Problem (TSP) with a dual set covering structure involving vertices and edges. An empirical study …


Rough-Cut Capacity Planning In Multimodal Freight Transportation Networks, Robert B. Hartlage Aug 2012

Rough-Cut Capacity Planning In Multimodal Freight Transportation Networks, Robert B. Hartlage

Theses and Dissertations

A main challenge in transporting cargo for United States Transportation Command (USTRANSCOM) is in mode selection or integration. Demand for cargo is time sensitive and must be fulfilled by an established due date. Since these due dates are often inflexible, commercial carriers are used at an enormous expense, in order to fill the gap in organic transportation asset capacity. This dissertation develops a new methodology for transportation capacity assignment to routes based on the Resource Constrained Shortest Path Problem (RCSP). Routes can be single or multimodal depending on the characteristics of the network, delivery timeline, modal capacities, and costs. The …


Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore Jul 2012

Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore

Faculty Publications

The Global Information Grid (GIG) is the military’s computer and communications network which supports the myriad of military missions. Military missions are highly planned, passing through many hands in the strategy-to-task methodology to ensure completeness, accuracy, coordination, cohesion, and appropriateness. A benefit of this planning is the possibility to collect knowledge of future conditions that could be of use to network designers whose goals include optimizing and protecting the GIG. This advanced knowledge includes which networked military equipment will be involved, what their capabilities are, where they will be, when they will be there, and particulars on the required data …


Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson Jul 2012

Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson

Faculty Publications

Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event …


A Quantitative Methodology For Vetting "Dark Network" Intelligence Sources For Social Network Analysis, James F. Morris Jun 2012

A Quantitative Methodology For Vetting "Dark Network" Intelligence Sources For Social Network Analysis, James F. Morris

Theses and Dissertations

Social network analysis (SNA) is used by the DoD to describe and analyze social networks, leading to recommendations for operational decisions. However, social network models are constructed from various information sources of indeterminate reliability. Inclusion of unreliable information can lead to incorrect models resulting in flawed analysis and decisions. This research develops a methodology to assist the analyst by quantitatively identifying and categorizing information sources so that determinations on including or excluding provided data can be made. This research pursued three main thrusts. It consolidated binary similarity measures to determine social network information sources' concordance and developed a methodology to …


Simulation Modeling And Analysis Of The Impact Of Individual Mobility Augmentee Loss At The Tanker Airlift Control Center, Megan A. Leiter Jun 2012

Simulation Modeling And Analysis Of The Impact Of Individual Mobility Augmentee Loss At The Tanker Airlift Control Center, Megan A. Leiter

Theses and Dissertations

The Tanker Airlift Control Center (TACC) operates as the execution arm for Air Mobility Command's Global Reach mission. The Command and Control Directorate (XOC) monitors the execution of missions tasked to the 18th Air Force. Approximately 70% of the personnel on the operations floor are considered Individual Mobility Augmentees (IMA). Adjustments in manpower, specifically the loss of IMAs, at the TACC/XOCG may impact their responsiveness to mission deviations. This research develops a discrete event simulation using a combination of SME and historical data to capture the activities of a section of the personnel on the operations floor and the potential …


Streamlining The Change-Over Protocol For The Rpa Mission Intelligence Coordinator By Way Of Situation Awareness Oriented Design And Discrete Event Simulation, John P. Machuca Mar 2012

Streamlining The Change-Over Protocol For The Rpa Mission Intelligence Coordinator By Way Of Situation Awareness Oriented Design And Discrete Event Simulation, John P. Machuca

Theses and Dissertations

Incredible loiter times coupled with the ability to make extremely detailed collections at significant stand-off distances with a relatively expendable platform has made demand for, and diversity of, Remotely Piloted Aircraft (RPA) operations grow at voracious rates. Conversely, financial resources are becoming increasingly constrained. As such, innovators are looking to maximize the effectiveness of existing personnel and assets by considering concepts such as simultaneous Multiple Aircraft Control (MAC) by a single aircrew. Research has identified procedural inefficiencies in current operations as well as substantial impediments to MAC implementation, including dynamic task saturation and communication challenges. An identified inefficiency afflicting both …


A Simulation To Evaluate Joint Military Logistics In A Humanitarian Assistance Environment, Ryan S. Fisher Mar 2012

A Simulation To Evaluate Joint Military Logistics In A Humanitarian Assistance Environment, Ryan S. Fisher

Theses and Dissertations

Currently, no capability exists to cost-effectively simulate and measure a Joint Task Force-Port Opening (JTF-PO) operation to predict cargo throughput based on the availability of resources. The purpose of this research is to create a decision model using Arena® simulation software to provide United States Transportation Command (USTRANSCOM) decision makers the ability to predict cargo throughput in a Humanitarian Assistance/Disaster Response (HA/DR) scenario. The data used in this simulation were taken from the JTF-PO involvement in Operation UNIFIED RESPONSE, Port-au-Prince, Haiti 2010. The research uses a design of experiments approach to statistically plan and measure the throughput of cargo based …


Combat Identification Of Synthetic Aperture Radar Images Using Contextual Features And Bayesian Belief Networks, John X. Situ Mar 2012

Combat Identification Of Synthetic Aperture Radar Images Using Contextual Features And Bayesian Belief Networks, John X. Situ

Theses and Dissertations

Given the nearly infinite combination of modifications and configurations for weapon systems, no two targets are ever exactly the same. Synthetic Aperture Radar (SAR) imagery and associated High Range Resolution (HRR) profiles of the same target will have different signatures when viewed from different angles. To overcome this challenge, data from a wide range of aspect and depression angles must be used to train pattern recognition algorithms. Alternatively, features invariant to aspect and depression angle must be found. This research uses simple segmentation algorithms and multivariate analysis methods to extract contextual features from SAR imagery. These features used in conjunction …


A Prototype Overview For Allocating Usaid Foreign Aid, Deane E. Cover Mar 2012

A Prototype Overview For Allocating Usaid Foreign Aid, Deane E. Cover

Theses and Dissertations

The United States Agency for International Development (USAID) is the federal government agency primarily responsible for administering civilian foreign aid. In fiscal year 2011, USAID spent approximately $15 billion in an effort to assist countries recovering from disaster, trying to escape poverty, and engaging in democratic reforms. Using Value-Focused Thinking, regression, and optimization techniques, this thesis utilizes overarching USAID objectives and underlying policy to develop a prototype overview model that is used to provide insight to a Decision Maker regarding how changes in funding allocation can lead to improved impact.


Rapid Prototype Development Of A Remotely-Piloted Aircraft Powered By A Hybrid-Electric Propulsion System, Michael P. Molesworth, Jacob K. English Mar 2012

Rapid Prototype Development Of A Remotely-Piloted Aircraft Powered By A Hybrid-Electric Propulsion System, Michael P. Molesworth, Jacob K. English

Theses and Dissertations

Remotely-Piloted Aircraft (RPA) provide users with unique mission capabilities, particularly on-demand overhead surveillance. However, a capability gap has been identified between the range and endurance of RPAs powered by internal combustion engines (ICE) and the reduced acoustic signature and smaller logistical footprint associated with electric-powered RPAs. This research, sponsored by the Office of the Secretary of Defense, aims at advancing systems engineering education by evaluating the utility of a tailored systems engineering approach. The tailored systems engineering approach used herein focuses on conducting a concept evaluation study on the rapid prototype development of a parallel hybrid-electric RPA (HE-RPA) and its …


Automatic Target Recognition For Hyperspectral Imagery, Kelly D. Friesen Mar 2012

Automatic Target Recognition For Hyperspectral Imagery, Kelly D. Friesen

Theses and Dissertations

Automatic target detection and recognition in hyperspectral imagery offer passive means to detect and identify anomalies based on their material composition. In many combat identification approaches through pattern recognition, a minimum level of confidence is expected with costs associated with labeling anomalies as targets, non-targets or out-of-library. This research approaches the problem by developing a baseline, autonomous four step automatic target recognition (ATR) process: 1) anomaly detection, 2) spectral matching, 3) out-of-library decision, and 4) non-declaration decision. Atmospheric compensation techniques are employed in the initial steps to compare truth library signatures and sensor processed signatures. ATR performance is assessed and …


Surveillance Versus Reconnaissance: An Entropy Based Model, Tamilyn S. Dismukes Mar 2012

Surveillance Versus Reconnaissance: An Entropy Based Model, Tamilyn S. Dismukes

Theses and Dissertations

With the advancing capabilities of Intelligence, Surveillance, and Reconnaissance (ISR) assets and sensors, effective utilization of these resources continues to pose a challenge to military decision makers. The methodology developed explores allocation of ISR assets while balancing detection of new targets versus surveillance of already detected targets using entropy as a Measure of Effectiveness (MOE). Scenarios with an unknown number of static and moving targets in a bounded geographical region are considered. A baseline model was built to examine four different search algorithms: random, raster, greedy, and a rollout algorithm based on dynamic programming. A space-filling Nearly Orthogonal Latin Hypercube …


A Decision Analysis Perspective On Multiple Response Robust Optimization, Jonathan S. Findley Mar 2012

A Decision Analysis Perspective On Multiple Response Robust Optimization, Jonathan S. Findley

Theses and Dissertations

Decisions in which multiple objectives must be optimized simultaneously occur frequently in government, military, and industrial settings. One method a decision maker may use to assist in such decisions is the application of a desirability function. An informed specification of the desirability function's parameters is essential to accurately describe the decision maker's value trade-offs and risk preference. This thesis uses utility transversality to analyze the implicit trade-off and risk attitude assumptions attendant to the desirability function. The desirability function does not explicitly account for response variability. A robust solution takes not only the expected response into account, but also its …


Using Hybrid Simulation/Analytical Queueing Networks To Capacitate Usaf Air Mobility Command Passenger Terminals, Meredithe A. Jessup Ii Mar 2012

Using Hybrid Simulation/Analytical Queueing Networks To Capacitate Usaf Air Mobility Command Passenger Terminals, Meredithe A. Jessup Ii

Theses and Dissertations

The objective of this study is to model operations at an airport passenger terminal to determine the optimal service capacities at each station given estimated passenger flow patterns and service rates. The central formulation is an open Jackson queueing network that can be applied to any USAF Air Mobility Command (AMC) terminal regardless of passenger type mix and flow data. A complete methodology for analyzing passenger flows and queue performance of a single flight is produced and then embedded in a framework to analyze the same for multiple departing flights. Queueing network analysis (QNA) is used because no special software …


Analysis Of The Impact Of Data Normalization On Cyber Event Correlation Query Performance, Smile T. Ludovice Mar 2012

Analysis Of The Impact Of Data Normalization On Cyber Event Correlation Query Performance, Smile T. Ludovice

Theses and Dissertations

A critical capability required in the operation of cyberspace is the ability to maintain situational awareness of the status of the infrastructure elements that constitute cyberspace. Event logs from cyber devices can yield significant information, and when properly utilized they can provide timely situational awareness about the state of the cyber infrastructure. In addition, proper Information Assurance requires the validation and verification of the integrity of results generated by a commercial log analysis tool. Event log analysis can be performed using relational databases. To enhance database query performance, previous literatures affirm denormalization of databases. Yet database normalization can also increase …


Discrete Event Simulation Of Distributed Team Communication Architecture, Travis J. Pond Mar 2012

Discrete Event Simulation Of Distributed Team Communication Architecture, Travis J. Pond

Theses and Dissertations

As the United States Department of Defense continues to increase the number of Remotely Piloted Aircraft (RPA) operations overseas, improved Human Systems Integration becomes increasingly important. RPA systems rely heavily on distributed team communications determined by systems architecture. Two studies examine the effects of systems architecture on operator workload of US Air Force MQ-1/9 operators. The first study ascertains the effects of communication modality changes on mental workload using the Improved Research Integration Pro (IMPRINT) software tool to estimate pilot workload. Allocation of communication between modalities minimizes workload. The second study uses IMPRINT to model Mission Intelligence Controllers (MICs) and …


An Enhanced Fuselage Ultrasound Inspection Approach For Ishm Purposes, Francisco Ospina Mar 2012

An Enhanced Fuselage Ultrasound Inspection Approach For Ishm Purposes, Francisco Ospina

Theses and Dissertations

This effort constitutes a systems engineering approach in which the materials science, ultrasound structural health monitoring, flight and maintenance operations, and relevant aeronautical policies and programs are involved to explore the evolution and characterization of structural cracks in aircraft fuselage structures in which the loads are varying. During flight, an aircraft fuselage skin and structure are subjected to varied cyclic loads, which can cause embedded cracks and other damage features to change their characteristics due to loading effects. The current research is based in the application of finite element modeling techniques using COMSOL and PZFLEX software to characterize the behavior …


Implementing A Quantitative Analysis Design Tool For Future Generation Interfaces, Brandon M. Webster Mar 2012

Implementing A Quantitative Analysis Design Tool For Future Generation Interfaces, Brandon M. Webster

Theses and Dissertations

The implementation of Multi-Aircraft Control (MAC) for use with Remotely Piloted Aircraft (RPA) has resulted in the need of a platform to evaluate interface design. The Vigilant Spirit Control Station (VSCS), developed by the Air Force Research Laboratory, addresses this need by permitting the rapid prototyping of different interface concepts for future MAC-enabled systems. A human-computer interaction (HCI) Index, originally applied to multi-function displays was applied to the prototype Vigilant Spirit interface. A modified version of the HCI Index was successfully applied to perform a quantitative analysis of the baseline VSCS interface and two modified interface designs. The modified HCI …


Leading Indicator Analysis For High Speed Sled Test Programs, Laurie C. Knorr Mar 2012

Leading Indicator Analysis For High Speed Sled Test Programs, Laurie C. Knorr

Theses and Dissertations

Leading Indicators (LI) were introduced to the Systems Engineering (SE) community in 2005. These measures are used to evaluate the effectiveness of how a specific work activity is applied on a project in a manner that provides information about impacts that are likely to affect the system performance. The LIs are designed to give a project manager/systems engineer insight into where their development project is heading and a chance to implement corrective actions early. This research strives to apply LIs to the testing community, specifically high speed sled testing, to improve the testing process and, in turn, improve the quality …


Time-Valued-Technology: A Light-Emitting Diode Case Study For Determining Replacement Strategy For High Technology Infrastructure Items, Kevin S. Ochs Mar 2012

Time-Valued-Technology: A Light-Emitting Diode Case Study For Determining Replacement Strategy For High Technology Infrastructure Items, Kevin S. Ochs

Theses and Dissertations

Infrastructure projects have typically involved long-term investments in relatively mature technologies characterized by stable performance and cost. However, with the ever-increasing rate of technological innovation, an increasing number of potential infrastructure investments involve a decision to replace a traditional technology with a rapidly evolving technology. In such circumstances, it is possible to reap significant performance or cost advantages through near-term replacement. However, this rapid adoption strategy has the potential to incur an opportunity cost due to increased performance or cost advantages the technology would provide if replacement was delayed. This research develops a cost analysis method, referred to as time-valued-technology, …


Using Vft As A Constraint For Goal Programming Models: A Case Study For Turkish Air Force Flying Hour Program, Ahmet Bengoz Mar 2012

Using Vft As A Constraint For Goal Programming Models: A Case Study For Turkish Air Force Flying Hour Program, Ahmet Bengoz

Theses and Dissertations

In its 60-year history, there have been many published documents in the literature about goal programming (GP), but contributions to the literature are still needed. This research intends to add to the literature on goal-programming models by discussing one of the key assumptions of GP regarding linearity, and by discussing some of the issues regarding incommensurability (difference in data types) and weighting. GP requires an interaction between the decision maker (DM) and the analyst to ensure that the model reflects the DM's preferences. However, it may be difficult for them to interact if the mathematical model is very large and …


The Effectiveness Of Using Diversity For Selecting Multiple Classifier Systems, Harris K. Butler Mar 2012

The Effectiveness Of Using Diversity For Selecting Multiple Classifier Systems, Harris K. Butler

Theses and Dissertations

A wealth of approaches exists to perform classification of items of interest. The goal of fusion techniques is to exploit complementary approaches and merge the information provided by these methods to provide a solution superior than any single method. Associated with choosing a fusion algorithm is the choice of algorithm or algorithms that will be fused. This decision is most often referred to as ensemble selection. Historically classifier ensemble accuracy has been used to accomplish this task. More recently research has focused on creating and evaluating diversity metrics to more effectively select ensemble members. This research focuses on the use …


Modeling Small Unmanned Aerial System Mishaps Using Logistics Regression And Artificial Neural Networks, Sean E. Wolf Feb 2012

Modeling Small Unmanned Aerial System Mishaps Using Logistics Regression And Artificial Neural Networks, Sean E. Wolf

Theses and Dissertations

A dataset of 854 small unmanned aerial system (SUAS) flight experiments from 2005-2009 is analyzed to determine significant factors that contribute to mishaps. The data from 29 airframes of different designs and technology readiness levels were aggregated. 20 measured parameters from each flight experiment are investigated, including wind speed, pilot experience, number of prior flights, pilot currency, etc. Outcomes of failures (loss of flight data) and damage (injury to airframe) are classified by logistic regression modeling and artificial neural network analysis. From the analysis, it can be concluded that SUAS damage is a random event that cannot be predicted with …


Large Aircraft Infrared Countermeasures (Laircm) Systems Engineering Case Study, Air Force Center For Systems Engineering, William Albery Jan 2012

Large Aircraft Infrared Countermeasures (Laircm) Systems Engineering Case Study, Air Force Center For Systems Engineering, William Albery

AFIT Documents

No abstract provided.