Open Access. Powered by Scholars. Published by Universities.®
Operations Research, Systems Engineering and Industrial Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- <p>Computer architecture<br />Engineering systems<br />Heuristic programming<br />Reliability (Engineering) -- Mathematical models</p> (1)
- <p>Explosives -- Detection<br />Wireless sensor networks -- Design<br />Embedded computer systems</p> (1)
- <p>Instructional systems -- Design<br />Instructional systems -- Evaluation<br />Just-in-time systems</p> (1)
- <p>Manufacturing processes -- Quality control<br />Ad hoc networks (Computer networks)<br />Process control -- Computer programs<br />Quality control</p> (1)
- Accounting and price fluctuations<br />Electric utilities -- Rates<br />Financial risk management<br />Hedging (Finance) -- Prices -- Econometric models (1)
-
- Actigraphy (1)
- Ad hoc networks (Computer networks) -- Design<br />Computer networks -- Remote access<br />Mobile communication systems -- Design (1)
- Ad hoc networks (Computer networks)<br />Routers (Computer networks)<br />Routing (Computer network management)<br />Wireless communication systems (1)
- Bio-design (1)
- Bio-fabrication (1)
- Business logistics -- Management<br />Business logistics -- Mathematical models<br />Business logistics (1)
- Byzantine Fault Tolerance (1)
- Carbon dioxide -- Measurement<br />Green technology<br />Lean manufacturing<br />Waste (Economics) (1)
- Cardiotocography (1)
- Chemicals -- Safety measures<br />Engineering -- Risk assessment<br />New products -- Decision making<br />Risk management (1)
- Cluster analysis<br />Self-organizing maps (1)
- Combinatorial enumeration problems<br />Computer networks<br />Evolutionary computation<br />Graph theory (1)
- Computational Intelligence (1)
- Computer architecture<br />Netcentric computing<br />Petri nets<br />Systems engineering (1)
- Computer network architectures<br />Computer security<br />Network computers -- Security measures (1)
- Condition Monitoring (1)
- Consumer Demand (1)
- Controls (1)
- Data Analysis (1)
- Digital (1)
- Distributed (1)
- Distributed network (1)
- Effects based operations (EBO) (1)
- Engineering higher education (1)
- Feature Extraction (1)
Articles 31 - 32 of 32
Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering
Security Architecture Methodology For Large Net-Centric Systems, Njideka Adaku Umeh
Security Architecture Methodology For Large Net-Centric Systems, Njideka Adaku Umeh
Masters Theses
"This thesis describes an over-arching security architecture methodology for large network enabled systems that can be scaled down for smaller network centric operations such as present at the University of Missouri-Rolla. By leveraging the five elements of security policy & standards, security risk management, security auditing, security federation and security management, of the proposed security architecture and addressing the specific needs of UMR, the methodology was used to determine places of improvement for UMR"--Abstract, page iii.
Simulating Discriminatory Profiling, Oscar Neal
Simulating Discriminatory Profiling, Oscar Neal
Masters Theses
There is a concern that racial profiling is being used to invoke searches and stops in spite of its violation of the fourth amendment. Simulation methods are used to study the correlation test of stops, searches and citations with race, age, and gender. The design uses sensitivity analysis of inputs to determine their relationship to outputs statistics of a police department's citations and stops. Experimental results are than used to verify and predict departmental bias. A simulation program written in Visual Basic is used as a tool to explore simulation techniques. A formulation of simulation uses in studying discriminatory profiling …