Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Engineering

Effective Measurement Of Reliability Of Repairable Usaf Systems, Louis J. Hogge Sep 2012

Effective Measurement Of Reliability Of Repairable Usaf Systems, Louis J. Hogge

Theses and Dissertations

The USAF generally does not know the reliability of its fielded repairable systems. The reported metric, Mean Time Between Failure (MTBF), is too lagging to be actionable in the best case, and is not representative of actual system reliability in the worst case. This thesis investigates the statistical techniques for measurement and analysis of the reliability of fielded repairable systems, which are very different than nonrepairables. To frame the investigation, a comparison is made between the generally accepted definitions and metrics and those used across the US Air Force (USAF). Reliability can be analyzed in four context areas: reliability prediction …


Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore Jul 2012

Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore

Faculty Publications

The Global Information Grid (GIG) is the military’s computer and communications network which supports the myriad of military missions. Military missions are highly planned, passing through many hands in the strategy-to-task methodology to ensure completeness, accuracy, coordination, cohesion, and appropriateness. A benefit of this planning is the possibility to collect knowledge of future conditions that could be of use to network designers whose goals include optimizing and protecting the GIG. This advanced knowledge includes which networked military equipment will be involved, what their capabilities are, where they will be, when they will be there, and particulars on the required data …


Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson Jul 2012

Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson

Faculty Publications

Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event …


A Simulation To Evaluate Joint Military Logistics In A Humanitarian Assistance Environment, Ryan S. Fisher Mar 2012

A Simulation To Evaluate Joint Military Logistics In A Humanitarian Assistance Environment, Ryan S. Fisher

Theses and Dissertations

Currently, no capability exists to cost-effectively simulate and measure a Joint Task Force-Port Opening (JTF-PO) operation to predict cargo throughput based on the availability of resources. The purpose of this research is to create a decision model using Arena® simulation software to provide United States Transportation Command (USTRANSCOM) decision makers the ability to predict cargo throughput in a Humanitarian Assistance/Disaster Response (HA/DR) scenario. The data used in this simulation were taken from the JTF-PO involvement in Operation UNIFIED RESPONSE, Port-au-Prince, Haiti 2010. The research uses a design of experiments approach to statistically plan and measure the throughput of cargo based …


Combat Identification Of Synthetic Aperture Radar Images Using Contextual Features And Bayesian Belief Networks, John X. Situ Mar 2012

Combat Identification Of Synthetic Aperture Radar Images Using Contextual Features And Bayesian Belief Networks, John X. Situ

Theses and Dissertations

Given the nearly infinite combination of modifications and configurations for weapon systems, no two targets are ever exactly the same. Synthetic Aperture Radar (SAR) imagery and associated High Range Resolution (HRR) profiles of the same target will have different signatures when viewed from different angles. To overcome this challenge, data from a wide range of aspect and depression angles must be used to train pattern recognition algorithms. Alternatively, features invariant to aspect and depression angle must be found. This research uses simple segmentation algorithms and multivariate analysis methods to extract contextual features from SAR imagery. These features used in conjunction …


A Prototype Overview For Allocating Usaid Foreign Aid, Deane E. Cover Mar 2012

A Prototype Overview For Allocating Usaid Foreign Aid, Deane E. Cover

Theses and Dissertations

The United States Agency for International Development (USAID) is the federal government agency primarily responsible for administering civilian foreign aid. In fiscal year 2011, USAID spent approximately $15 billion in an effort to assist countries recovering from disaster, trying to escape poverty, and engaging in democratic reforms. Using Value-Focused Thinking, regression, and optimization techniques, this thesis utilizes overarching USAID objectives and underlying policy to develop a prototype overview model that is used to provide insight to a Decision Maker regarding how changes in funding allocation can lead to improved impact.


Automatic Target Recognition For Hyperspectral Imagery, Kelly D. Friesen Mar 2012

Automatic Target Recognition For Hyperspectral Imagery, Kelly D. Friesen

Theses and Dissertations

Automatic target detection and recognition in hyperspectral imagery offer passive means to detect and identify anomalies based on their material composition. In many combat identification approaches through pattern recognition, a minimum level of confidence is expected with costs associated with labeling anomalies as targets, non-targets or out-of-library. This research approaches the problem by developing a baseline, autonomous four step automatic target recognition (ATR) process: 1) anomaly detection, 2) spectral matching, 3) out-of-library decision, and 4) non-declaration decision. Atmospheric compensation techniques are employed in the initial steps to compare truth library signatures and sensor processed signatures. ATR performance is assessed and …


Implementing A Quantitative Analysis Design Tool For Future Generation Interfaces, Brandon M. Webster Mar 2012

Implementing A Quantitative Analysis Design Tool For Future Generation Interfaces, Brandon M. Webster

Theses and Dissertations

The implementation of Multi-Aircraft Control (MAC) for use with Remotely Piloted Aircraft (RPA) has resulted in the need of a platform to evaluate interface design. The Vigilant Spirit Control Station (VSCS), developed by the Air Force Research Laboratory, addresses this need by permitting the rapid prototyping of different interface concepts for future MAC-enabled systems. A human-computer interaction (HCI) Index, originally applied to multi-function displays was applied to the prototype Vigilant Spirit interface. A modified version of the HCI Index was successfully applied to perform a quantitative analysis of the baseline VSCS interface and two modified interface designs. The modified HCI …


Time-Valued-Technology: A Light-Emitting Diode Case Study For Determining Replacement Strategy For High Technology Infrastructure Items, Kevin S. Ochs Mar 2012

Time-Valued-Technology: A Light-Emitting Diode Case Study For Determining Replacement Strategy For High Technology Infrastructure Items, Kevin S. Ochs

Theses and Dissertations

Infrastructure projects have typically involved long-term investments in relatively mature technologies characterized by stable performance and cost. However, with the ever-increasing rate of technological innovation, an increasing number of potential infrastructure investments involve a decision to replace a traditional technology with a rapidly evolving technology. In such circumstances, it is possible to reap significant performance or cost advantages through near-term replacement. However, this rapid adoption strategy has the potential to incur an opportunity cost due to increased performance or cost advantages the technology would provide if replacement was delayed. This research develops a cost analysis method, referred to as time-valued-technology, …