Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

The Characteristics Of Successful Military It Projects: A Cross-Country Empirical Study, Helene Berg, Jonathan D. Ritschel Jul 2023

The Characteristics Of Successful Military It Projects: A Cross-Country Empirical Study, Helene Berg, Jonathan D. Ritschel

Faculty Publications

No abstract provided.


Machine Learning Prediction Of Dod Personal Property Shipment Costs, Tiffany Tucker [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals Jan 2023

Machine Learning Prediction Of Dod Personal Property Shipment Costs, Tiffany Tucker [*], Torrey J. Wagner, Paul Auclair, Brent T. Langhals

Faculty Publications

U.S. Department of Defense (DoD) personal property moves account for 15% of all domestic and international moves - accurate prediction of their cost could draw attention to outlier shipments and improve budget planning. In this work 136,140 shipments between 13 personal property shipment hubs from April 2022 through March 2023 with a total cost of $1.6B were analyzed. Shipment cost was predicted using recursive feature elimination on linear regression and XGBoost algorithms, as well as through neural network hyperparameter sweeps. Modeling was repeated after removing 28 features related to shipment hub location and branch of service to examine their influence …


Artificial Neural Networks And Gradient Boosted Machines Used For Regression To Evaluate Gasification Processes: A Review, Owen Sedej, Eric Mbonimpa, Trevor Sleight, Jeremy M. Slagley Aug 2022

Artificial Neural Networks And Gradient Boosted Machines Used For Regression To Evaluate Gasification Processes: A Review, Owen Sedej, Eric Mbonimpa, Trevor Sleight, Jeremy M. Slagley

Faculty Publications

Waste-to-Energy technologies have the potential to dramatically improve both the natural and human environment. One type of waste-to-energy technology that has been successful is gasification. There are numerous types of gasification processes and in order to drive understanding and the optimization of these systems, traditional approaches like computational fluid dynamics software have been utilized to model these systems. The modern advent of machine learning models has allowed for accurate and computationally efficient predictions for gasification systems that are informed by numerous experimental and numerical solutions. Two types of machine learning models that have been widely used to solve for quantitative …


A Unified View Of A Human Digital Twin, Michael Miller, Emily Spatz Jun 2022

A Unified View Of A Human Digital Twin, Michael Miller, Emily Spatz

Faculty Publications

The term human digital twin has recently been applied in many domains, including medical and manufacturing. This term extends the digital twin concept, which has been illustrated to provide enhanced system performance as it combines system models and analyses with real-time measurements for an individual system to improve system maintenance. Human digital twins have the potential to change the practice of human system integration as these systems employ real-time sensing and feedback to tightly couple measurements of human performance, behavior, and environmental influences throughout a product’s life cycle to human models to improve system design and performance. However, as this …


Agile Software Development: Creating A Cost Of Delay Framework For Air Force Software Factories, J. Goljan, Jonathan D. Ritschel, Scott Drylie, Edward D. White Jan 2021

Agile Software Development: Creating A Cost Of Delay Framework For Air Force Software Factories, J. Goljan, Jonathan D. Ritschel, Scott Drylie, Edward D. White

Faculty Publications

The Air Force software development environment is experiencing a paradigm shift. The 2019 Defense Innovation Board concluded that speed and cycle time must become the most important software metrics if the US military is to maintain its advantage over adversaries.1 This article proposes utilizing a cost-o­f-d­elay (CoD) framework to prioritize projects toward optimizing readiness. Cost-­of-d­elay is defined as the economic impact resulting from a delaying product delivery or, said another way, opportunity cost. In principle, CoD assesses the negative impacts resulting from changes to the priority of a project.


Cost Estimating Using A New Learning Curve Theory For Non-Constant Production Rates, Dakotah Hogan, John J. Elshaw, Clay M. Koschnick, Jonathan D. Ritschel, Adedeji B. Badiru, Shawn M. Valentine Oct 2020

Cost Estimating Using A New Learning Curve Theory For Non-Constant Production Rates, Dakotah Hogan, John J. Elshaw, Clay M. Koschnick, Jonathan D. Ritschel, Adedeji B. Badiru, Shawn M. Valentine

Faculty Publications

Traditional learning curve theory assumes a constant learning rate regardless of the number of units produced. However, a collection of theoretical and empirical evidence indicates that learning rates decrease as more units are produced in some cases. These diminishing learning rates cause traditional learning curves to underestimate required resources, potentially resulting in cost overruns. A diminishing learning rate model, namely Boone’s learning curve, was recently developed to model this phenomenon. This research confirms that Boone’s learning curve systematically reduced error in modeling observed learning curves using production data from 169 Department of Defense end-items. However, high amounts of variability in …


Optimizing The Environmental And Economic Sustainability Of Remote Community Infrastructure, Jamie E. Filer, Justin D. Delorit, Andrew J. Hoisington, Steven J. Schuldt Mar 2020

Optimizing The Environmental And Economic Sustainability Of Remote Community Infrastructure, Jamie E. Filer, Justin D. Delorit, Andrew J. Hoisington, Steven J. Schuldt

Faculty Publications

Remote communities such as rural villages, post-disaster housing camps, and military forward operating bases are often located in remote and hostile areas with limited or no access to established infrastructure grids. Operating these communities with conventional assets requires constant resupply, which yields a significant logistical burden, creates negative environmental impacts, and increases costs. For example, a 2000-member isolated village in northern Canada relying on diesel generators required 8.6 million USD of fuel per year and emitted 8500 tons of carbon dioxide. Remote community planners can mitigate these negative impacts by selecting sustainable technologies that minimize resource consumption and emissions. However, …


A Sequential Partial Information Bomber‐Defender Shooting Problem, Krishna Kalyanam, David W. Casbeer, Meir Pachter Feb 2020

A Sequential Partial Information Bomber‐Defender Shooting Problem, Krishna Kalyanam, David W. Casbeer, Meir Pachter

Faculty Publications

No abstract provided.


36% Reduction In Fuel Resupply Using A Hybrid Generator & Battery System For An Austere Location, David J. Chester [*], Torrey J. Wagner, Douglas S. Dudis Mar 2019

36% Reduction In Fuel Resupply Using A Hybrid Generator & Battery System For An Austere Location, David J. Chester [*], Torrey J. Wagner, Douglas S. Dudis

Faculty Publications

The DOD energy policy is to increase energy security resiliency, and mitigate costs in the use and management of energy[1] Forward operating bases (FOBs) are remote, austere base camps that support an operationally defined mission with a limited or no ability to draw from an energy grid and have historically relied on diesel-powered generators for the primary production of energy.[2] Generators are sized to meet a theoretical peak demand, but steady state loads are far below this peak, resulting in under-loaded generators.[3] Under-loaded diesel generators decrease efficiency and increase the need for maintenance, affecting the lifespan of …


Evaluation Criteria For Selecting Nosql Databases In A Single Box Environment, Ryan D. Engle, Brent T. Langhals, Michael R. Grimaila, Douglas D. Hodson Aug 2018

Evaluation Criteria For Selecting Nosql Databases In A Single Box Environment, Ryan D. Engle, Brent T. Langhals, Michael R. Grimaila, Douglas D. Hodson

Faculty Publications

In recent years, NoSQL database systems have become increasingly popular, especially for big data, commercial applications. These systems were designed to overcome the scaling and flexibility limitations plaguing traditional relational database management systems (RDBMSs). Given NoSQL database systems have been typically implemented in large-scale distributed environments serving large numbers of simultaneous users across potentially thousands of geographically separated devices, little consideration has been given to evaluating their value within single-box environments. It is postulated some of the inherent traits of each NoSQL database type may be useful, perhaps even preferable, regardless of scale. Thus, this paper proposes criteria conceived to …


Wavelet Anova Bisection Method For Identifying Simulation Model Bias, Andrew D. Atkinson, Raymond R. Hill, Joseph J. Pignatiello Jr., G. Geoffrey Vining, Edward D. White, Eric Chicken Jan 2018

Wavelet Anova Bisection Method For Identifying Simulation Model Bias, Andrew D. Atkinson, Raymond R. Hill, Joseph J. Pignatiello Jr., G. Geoffrey Vining, Edward D. White, Eric Chicken

Faculty Publications

High-resolution computer models can simulate complex systems and processes in order to evaluate a solution quickly and inexpensively. Many simulation models produce dynamic functional output, such as a set of time-series data generated during a process. These computer models require verification and validation (V&V) to assess the correctness of these simulations. In particular, the model validation effort evaluates if the model is an appropriate representation of the real-world system that it is meant to simulate. However, when assessing a model capable of generating functional output, it is useful to learn more than simply whether the model is valid or invalid. …


A Recommendation System For Meta-Modeling: A Meta-Learning Based Approach, Can Cui, Mengqi Hu, Jeffery D. Weir, Teresa Wu Jan 2016

A Recommendation System For Meta-Modeling: A Meta-Learning Based Approach, Can Cui, Mengqi Hu, Jeffery D. Weir, Teresa Wu

Faculty Publications

Various meta-modeling techniques have been developed to replace computationally expensive simulation models. The performance of these meta-modeling techniques on different models is varied which makes existing model selection/recommendation approaches (e.g., trial-and-error, ensemble) problematic. To address these research gaps, we propose a general meta-modeling recommendation system using meta-learning which can automate the meta-modeling recommendation process by intelligently adapting the learning bias to problem characterizations. The proposed intelligent recommendation system includes four modules: (1) problem module, (2) meta-feature module which includes a comprehensive set of meta-features to characterize the geometrical properties of problems, (3) meta-learner module which compares the performance of instance-based …


Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore Jul 2012

Using Modeling And Simulation To Examine The Benefits Of A Network Tasking Order, Matthew D. Compton, Kenneth M. Hopkinson, Gilbert L. Peterson, James T. Moore

Faculty Publications

The Global Information Grid (GIG) is the military’s computer and communications network which supports the myriad of military missions. Military missions are highly planned, passing through many hands in the strategy-to-task methodology to ensure completeness, accuracy, coordination, cohesion, and appropriateness. A benefit of this planning is the possibility to collect knowledge of future conditions that could be of use to network designers whose goals include optimizing and protecting the GIG. This advanced knowledge includes which networked military equipment will be involved, what their capabilities are, where they will be, when they will be there, and particulars on the required data …


Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson Jul 2012

Design And Analysis Of A Dynamically Configured Log-Based Distributed Security Event Detection Methodology, Michael R. Grimaila, Justin Myers, Robert F. Mills, Gilbert L. Peterson

Faculty Publications

Military and defense organizations rely upon the security of data stored in, and communicated through, their cyber infrastructure to fulfill their mission objectives. It is essential to identify threats to the cyber infrastructure in a timely manner, so that mission risks can be recognized and mitigated. Centralized event logging and correlation is a proven method for identifying threats to cyber resources. However, centralized event logging is inflexible and does not scale well, because it consumes excessive network bandwidth and imposes significant storage and processing requirements on the central event log server. In this paper, we present a flexible, distributed event …


Wolf Ant, Gilbert L. Peterson, Christopher M. Mayer, Kevin Cousin Jun 2011

Wolf Ant, Gilbert L. Peterson, Christopher M. Mayer, Kevin Cousin

Faculty Publications

Ant colony optimization (ACO) algorithms can generate quality solutions to combinatorial optimization problems. However, like many stochastic algorithms, the quality of solutions worsen as problem sizes grow. In an effort to increase performance, we added the variable step size off-policy hill-climbing algorithm called PDWoLF (Policy Dynamics Win or Learn Fast) to several ant colony algorithms: Ant System, Ant Colony System, Elitist-Ant System, Rank-based Ant System, and Max-Min Ant System. Easily integrated into each ACO algorithm, the PDWoLF component maintains a set of policies separate from the ant colony's pheromone. Similar to pheromone but with different update rules, the PDWoLF policies …