Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Integrating Game Technology And Discrete Event Simulation To Analyze Mass Casualty Scenarios, Jason Loveland Oct 2007

Integrating Game Technology And Discrete Event Simulation To Analyze Mass Casualty Scenarios, Jason Loveland

Computational Modeling & Simulation Engineering Theses & Dissertations

In the last 10 years, video games have become complex simulation environments with high resolution 3D graphics enabled by powerhouse rendering engines, multi-player client server networks, user friendly displays and graphical user interface , while remaining relatively inexpensive. There is a critical need for systems engineering analysis and rapid trade studies due to changes in operations caused by current events such as terrorist attacks, asymmetric threats, natural disasters, etc. Modem games provide a unique way to visualize and interact with these complex environments, scenarios, missions, and operations. A discrete event simulator (DES) provides an environment to model system architecture behavior, …


Research On Logistics Operation Mode Of Shanghai 2010 Expo, Jiaying Chen Aug 2007

Research On Logistics Operation Mode Of Shanghai 2010 Expo, Jiaying Chen

World Maritime University Dissertations

No abstract provided.


The Study On Inland Container Terminal Logistics System Simulation, Jun Wu Aug 2007

The Study On Inland Container Terminal Logistics System Simulation, Jun Wu

World Maritime University Dissertations

No abstract provided.


The Study On The Empty Container Repositioning Of Container Leasing Company, Yi Zhao Aug 2007

The Study On The Empty Container Repositioning Of Container Leasing Company, Yi Zhao

World Maritime University Dissertations

No abstract provided.


Encouraging Lifelong Learning For Engineering Management Undergraduates, Susan L. Murray, Stephen A. Raper Jun 2007

Encouraging Lifelong Learning For Engineering Management Undergraduates, Susan L. Murray, Stephen A. Raper

Engineering Management and Systems Engineering Faculty Research & Creative Works

The current ABET guidelines place an emphasis on life-long learning for our undergraduate students. What is life-long learning? How can we encourage students to consider global issues, current events, or even anything "that isn't going to be on the next test"? In this paper we present survey results evaluating habits of undergraduate students entering an engineering management program and seniors related to life-long learning including attending professional society meetings, reading trade publications, reading business related books, and other learning outside of the classroom activities. This paper also presents a two semester effort to increase life-long learning activities among undergraduate engineering …


Analysis Of Army Transformation And The Effects On Customer Ordering Behavior, Joseph M. Colacicco Jun 2007

Analysis Of Army Transformation And The Effects On Customer Ordering Behavior, Joseph M. Colacicco

Theses and Dissertations

The United States Army began a major force transformation in 2003, which required a significant shift in logistics support constructs. This thesis provides an in-process review of the effects of the current transformation efforts on supply effectiveness and attempts to determine factors that influence customer ordering behavior. Specifically, the thesis sought to answer three subproblems addressing the effect of transformation on supply effectiveness, the correlation of supply effectiveness metrics to customer ordering behavior, and other potential sources of variance in ordering behavior. The subproblems were answered through an examination of the supply document histories of two Brigades, one legacy Brigade …


A Layered Social And Operational Network Analysis, Jennifer L. Geffre Mar 2007

A Layered Social And Operational Network Analysis, Jennifer L. Geffre

Theses and Dissertations

To provide maximal disruption to a clandestine/terrorist network's ability to conduct missions, we must develop a means to determine the individuals' importance to the network and operations. In a network centric world, this importance is represented as an additive value of their criticality across the convergence of multiple layers of network connections. The connections layers of the network are comprised of social layers (Acquaintance, Friendship, Nuclear Family, Relatives, Student-Teacher, and Religious Mentors, Reverent Power and others), as well as layers representing interactions involving Resources, Knowledge/Skills and Temporal Local. The social criticality of an individual is measured by centrality. Event Trees …


Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl Mar 2007

Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl

Theses and Dissertations

Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …


Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas Mar 2007

Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas

Theses and Dissertations

Prioritizing reconstruction projects to recover a base from a natural disaster is a complicated and arduous process that involves all levels of leadership. The project prioritization phase of base recovery has a direct affect on the allocation of funding, the utilization of human resources, the obligation of projects, and the overall speed and efficiency of the recovery process. The focus of this research is the development of an objective and repeatable process for optimizing the project prioritization phase of the recovery effort. This work will focus on promoting objectivity in the project prioritizing process, improving the communication of the overall …


Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer Mar 2007

Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer

Theses and Dissertations

Stability operations are vital to establish peace in the aftermath of conflict. The United States is often called in for military support during conflict. The new American military paradigms include establishing peace through stability operations after a military conflict. Due to this new role, military decision makers face many difficulties in conducting successful stability operations. Compounding this problem is the limited number of resources pertaining to stability operations: experts, doctrine, knowledge, and technology. Two overarching challenges of stability operations facing decision makers are planning and prioritizing of stability operations and determining progress. This thesis applies a structured analytical approach to …


The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr. Mar 2007

The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr.

Theses and Dissertations

This thesis presents a case study of federal logistics support during Hurricane Katrina disaster relief operations. Data from federal contracts covering the first 10 weeks of Katrina are used to measure federal logistics activity. The study investigates whether chaos theory, part of complexity science, can extract information from Katrina contracting data to help managers make better logistics decisions during disaster relief operations. The study uses three analytical techniques: embedding, fitting the data to a logistic equation, and plotting the limit-cycle. Embedding and fitting a logistic equation to the data were used to test for deterministic chaos. The logistic equation and …


Critical Infrastructure Rebuild Prioritization Using Simulation Optimization, Namsuk Cho Mar 2007

Critical Infrastructure Rebuild Prioritization Using Simulation Optimization, Namsuk Cho

Theses and Dissertations

This thesis examines the importance of a critical infrastructure rebuild strategy following a terrorist attack or natural disaster such as Hurricane Katrina. Critical infrastructures are very complex and dependent systems in which their re-establishment is an essential part of the rebuilding process. A rebuild simulation model consisting of three layers (physical, information, and spatial) captures the dependency between the six critical infrastructures modeled. We employ a simulation optimization approach to evaluate rebuild prioritization combinations with a goal of minimizing the time needed to achieve an acceptable rebuild level. We use a simulated annealing heuristic as an optimization technique that works …


Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii Mar 2007

Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii

Theses and Dissertations

This research uses an advanced statistical technique to expand upon the current understanding of war termination. Specifically, this thesis addressed questions concerning the most relevant factors toward predicting both the outcomes of interstate wars and the winners of intrastate and extra-systemic wars, within the limitations of the available data. Open-source war data from the Correlates of War Project was analyzed using both binary and multinomial logistic regression techniques. While the Correlates of War Project did not necessarily focus its data collection efforts on those variables historically associated with war termination, it did provide a sufficient number of variables with which …


Examining Clandestine Social Networks For The Presence Of Non-Random Structure, Joshua S. Seder Mar 2007

Examining Clandestine Social Networks For The Presence Of Non-Random Structure, Joshua S. Seder

Theses and Dissertations

This thesis develops a tractable, statistically sound hypothesis testing framework for the detection, characterization, and estimation of non-random structure in clandestine social networks. Network structure is studied via an observed adjacency matrix, which is assumed to be subject to sampling variability. The vertex set of the network is partitioned into k mutually exclusive and collectively exhaustive subsets, based on available exogenous nodal attribute information. The proposed hypothesis testing framework is employed to statistically quantify a given partition's relativity in explaining the variability in the observed adjacency matrix relative to what can be explained by chance. As a result, valuable insight …


Approximate Analysis Of An Unreliable M/M/2 Retrial Queue, Brian P. Crawford Mar 2007

Approximate Analysis Of An Unreliable M/M/2 Retrial Queue, Brian P. Crawford

Theses and Dissertations

This thesis considers the performance evaluation of an M/M/2 retrial queue for which both servers are subject to active and idle breakdowns. Customers may abandon service requests if they are blocked from service upon arrival, or if their service is interrupted by a server failure. Customers choosing to remain in the system enter a retrial orbit for a random amount of time before attempting to re-access an available server. We assume that each server has its own dedicated repair person, and repairs begin immediately following a failure. Interfailure times, repair times and times between retrials are exponentially distributed, and all …