Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Domain Restriction Zones: An Evolution Of The Military Exclusion Zone, Cole M. Mooty, Robert A. Bettinger, Mark G. Reith Jul 2023

Domain Restriction Zones: An Evolution Of The Military Exclusion Zone, Cole M. Mooty, Robert A. Bettinger, Mark G. Reith

Faculty Publications

Since the early part of the twenty-first century, US adversaries have expanded their military capabilities within and their access to new warfighting domains. When faced with the growth of adversaries’ asymmetric capabilities, the means, tactics, and strategies previously used by the US military lose their proportional effectiveness. To avoid such degradation of capability, the operational concept of the military exclusion zone (MEZ) should be revised to suit the modern battlespace while also addressing the shifts in national policy that encourage diplomacy over military force. The concept and development of domain restriction zones (DRZs) increase the relevancy of traditional MEZs in …


Beyond The High Ground: A Taxonomy For Earth-Moon System Operations, Adam P. Wilmer, Robert A. Bettinger Jul 2022

Beyond The High Ground: A Taxonomy For Earth-Moon System Operations, Adam P. Wilmer, Robert A. Bettinger

Faculty Publications

Situational and space domain awareness in the space domain can no longer be confined to that which is found in geosynchronous orbit. International activities—commercial and military—and threats to the planet itself exist and are increasing across the entire Earth-Moon system. This reality requires a new taxonomy to accurately classify space domain awareness missions and better apply resources to and development of the same. This work presents such a taxonomy for the classification of space domain awareness regions.


A Simulation–Optimization Framework For Post-Disaster Allocation Of Mental Health Resources, Stephen Cunningham, Steven J. Schuldt, Christopher M. Chini, Justin D. Delorit Dec 2021

A Simulation–Optimization Framework For Post-Disaster Allocation Of Mental Health Resources, Stephen Cunningham, Steven J. Schuldt, Christopher M. Chini, Justin D. Delorit

Faculty Publications

Extreme events, such as natural or human-caused disasters, cause mental health stress in affected communities. While the severity of these outcomes varies based on socioeconomic standing, age group, and degree of exposure, disaster planners can mitigate potential stress-induced mental health outcomes by assessing the capacity and scalability of early, intermediate, and long-term treatment interventions by social workers and psychologists. However, local and state authorities are typically underfunded, understaffed, and have ongoing health and social service obligations that constrain mitigation and response activities. In this research, a resource assignment framework is developed as a coupled-state transition and linear optimization model that …


The Nuclear Network: Multiplex Network Analysis For Interconnected Systems, Bethany L. Goldblum, Andrew W. Reddie, Thomas C. Hickey, James E. Bevins, Sarah Laderman, Nathaniel Mahowald, Austin P. Wright, Elie Katzenson, Yara Mubarak Jan 2019

The Nuclear Network: Multiplex Network Analysis For Interconnected Systems, Bethany L. Goldblum, Andrew W. Reddie, Thomas C. Hickey, James E. Bevins, Sarah Laderman, Nathaniel Mahowald, Austin P. Wright, Elie Katzenson, Yara Mubarak

Faculty Publications

States facing the decision to develop a nuclear weapons program do so within a broader context of their relationships with other countries. How these diplomatic, economic, and strategic relationships impact proliferation decisions, however, remains under-specified. Adding to the existing empirical literature that attempts to model state proliferation decisions, this article introduces the first quantitative heterogeneous network analysis of how networks of conflict, alliances, trade, and nuclear cooperation interact to spur or deter nuclear proliferation. Using a multiplex network model, we conceptualize states as nodes linked by different modes of interaction represented on individual network layers. Node strength is used to …


Predicting Public Bicycle Adoption Using The Technology Acceptance Model, Benjamin T. Hazen, Robert E. Overstreet, Yacan Wang Nov 2015

Predicting Public Bicycle Adoption Using The Technology Acceptance Model, Benjamin T. Hazen, Robert E. Overstreet, Yacan Wang

Faculty Publications

Bicycle sharing programs provide a sustainable mode of urban transportation. Although cities across the globe have developed these systems for their citizens and visitors, usage rates are not as high as anticipated. This research uses the technology acceptance model as the basis to understand one’s intention to adopt bicycle sharing programs. Using survey data derived from 421 participants in Beijing, China, the proposed covariance-based structural equation model consisting of perceived quality, perceived convenience, and perceived value is found to predict 50.5% of the variance in adoption intention. The findings of this research contribute to theory and practice in the burgeoning …


Deployed Communications In An Austere Environment: A Delphi Study, Andrew Soine, James Harker, Alan R. Heminger Nov 2013

Deployed Communications In An Austere Environment: A Delphi Study, Andrew Soine, James Harker, Alan R. Heminger

Faculty Publications

The information and communications technology (ICT) field is undergoing a period of tremendous change. The exponential growth rate of ICT capability in recent decades, which has had an undeniable effect on every aspect of our society, will likely have ramifications for military operations in austere environments. 1 The Air Force’s 689th Combat Communications Wing commissioned a study to forecast the future of mobile ICT in such environments. Researchers at the Air Force Institute of Technology chose to employ the Delphi technique as the methodology for executing this task. The following scenario, based on the results of that study, demonstrates how …


Defense Industrial Base Policy: Revisited, Michael E. Heberling Jul 1994

Defense Industrial Base Policy: Revisited, Michael E. Heberling

Faculty Publications

In an era of decreasing defense budgets and enemy threats, problems associated with maintaining a healthy defense industrial base have become pronounced. This article discussed defense industrial policy goals and argues that these goals may be collectively unobtainable.