Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Air Force Institute of Technology

Discipline
Keyword
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Global Positioning System Systems Engineering Case Study, Air Force Center For Systems Engineering, Patrick J. O'Brien, John M. Griffin Oct 2007

Global Positioning System Systems Engineering Case Study, Air Force Center For Systems Engineering, Patrick J. O'Brien, John M. Griffin

AFIT Documents

No abstract provided.


Search Techniques For Multi-Objective Optimization Of Mixed Variable Systems Having Stochastic Responses, Jennifer G. Walston Sep 2007

Search Techniques For Multi-Objective Optimization Of Mixed Variable Systems Having Stochastic Responses, Jennifer G. Walston

Theses and Dissertations

A research approach is presented for solving stochastic, multi-objective optimization problems. First, the class of mesh adaptive direct search (MADS) algorithms for nonlinearly constrained optimization is extended to mixed variable problems. The resulting algorithm, MV-MADS, is then extended to stochastic problems (MVMADS-RS), via a ranking and selection procedure. Finally, a two-stage method is developed that combines the generalized pattern search/ranking and selection (MGPS-RS) algorithms for single-objective, mixed variable, stochastic problems with a multi-objective approach that makes use of interactive techniques for the specification of aspiration and reservation levels, scalarization functions, and multi-objective ranking and selection. A convergence analysis for the …


Unreliable Retrial Queues In A Random Environment, James D. Cordeiro Jr. Sep 2007

Unreliable Retrial Queues In A Random Environment, James D. Cordeiro Jr.

Theses and Dissertations

This dissertation investigates stability conditions and approximate steady-state performance measures for unreliable, single-server retrial queues operating in a randomly evolving environment. In such systems, arriving customers that find the server busy or failed join a retrial queue from which they attempt to regain access to the server at random intervals. Such models are useful for the performance evaluation of communications and computer networks which are characterized by time-varying arrival, service and failure rates. To model this time-varying behavior, we study systems whose parameters are modulated by a finite Markov process. Two distinct cases are analyzed. The first considers systems with …


Analysis Of Army Transformation And The Effects On Customer Ordering Behavior, Joseph M. Colacicco Jun 2007

Analysis Of Army Transformation And The Effects On Customer Ordering Behavior, Joseph M. Colacicco

Theses and Dissertations

The United States Army began a major force transformation in 2003, which required a significant shift in logistics support constructs. This thesis provides an in-process review of the effects of the current transformation efforts on supply effectiveness and attempts to determine factors that influence customer ordering behavior. Specifically, the thesis sought to answer three subproblems addressing the effect of transformation on supply effectiveness, the correlation of supply effectiveness metrics to customer ordering behavior, and other potential sources of variance in ordering behavior. The subproblems were answered through an examination of the supply document histories of two Brigades, one legacy Brigade …


Optimizing Distribution Sensor Placement For Border Patrol Interdiction Using Microsoft Excel, Adrian C. Patrascu Jun 2007

Optimizing Distribution Sensor Placement For Border Patrol Interdiction Using Microsoft Excel, Adrian C. Patrascu

Theses and Dissertations

The purpose of this research was to develop an electronic sensor placement model for border security. A model was developed using Microsoft Excel, with some add-on capabilities, to optimize the placement of electronic sensors on a border network given a pre-determined budgetary constraint. The model is capable of handling multiple sensor types, which are placed together as packages, and allows for daytime, nighttime, or 24 hour operation of each sensor type. Additionally, each sensor can be assigned a specific range and detection probability curve within the given range. The model is capable of optimizing either average coverage, or minimum coverage, …


Hyperspectral Imagery Target Detection Using Improved Anomaly Detection And Signature Matching Methods, Timothy E. Smetek Jun 2007

Hyperspectral Imagery Target Detection Using Improved Anomaly Detection And Signature Matching Methods, Timothy E. Smetek

Theses and Dissertations

This research extends the field of hyperspectral target detection by developing autonomous anomaly detection and signature matching methodologies that reduce false alarms relative to existing benchmark detectors, and are practical for use in an operational environment. The proposed anomaly detection methodology adapts multivariate outlier detection algorithms for use with hyperspectral datasets containing tens of thousands of non-homogeneous, high-dimensional spectral signatures. In so doing, the limitations of existing, non-robust, anomaly detectors are identified, an autonomous clustering methodology is developed to divide an image into homogeneous background materials, and competing multivariate outlier detection methods are evaluated for their ability to uncover hyperspectral …


Feasibility Study Of Variance Reduction In The Logistics Composite Model, George P. Cole Iii Mar 2007

Feasibility Study Of Variance Reduction In The Logistics Composite Model, George P. Cole Iii

Theses and Dissertations

The Logistics Composite Model (LCOM) is a stochastic, discrete-event simulation that relies on probabilities and random number generators to model scenarios in a maintenance unit and estimate optimal manpower levels through an iterative process. Models such as LCOM involving pseudo-random numbers inevitably have a variance associated with the output of the model for each run, and the output is actually a range of estimates. The reduction of the variance in the results of the model can be costly in the form of time for multiple replications. The alternative is a range of estimates that is too wide to realistically apply …


A Layered Social And Operational Network Analysis, Jennifer L. Geffre Mar 2007

A Layered Social And Operational Network Analysis, Jennifer L. Geffre

Theses and Dissertations

To provide maximal disruption to a clandestine/terrorist network's ability to conduct missions, we must develop a means to determine the individuals' importance to the network and operations. In a network centric world, this importance is represented as an additive value of their criticality across the convergence of multiple layers of network connections. The connections layers of the network are comprised of social layers (Acquaintance, Friendship, Nuclear Family, Relatives, Student-Teacher, and Religious Mentors, Reverent Power and others), as well as layers representing interactions involving Resources, Knowledge/Skills and Temporal Local. The social criticality of an individual is measured by centrality. Event Trees …


A Multivariate Magnitude Robust Control Chart For Mean Shift Detection And Change Point Estimation, Ryan M. Harrell Mar 2007

A Multivariate Magnitude Robust Control Chart For Mean Shift Detection And Change Point Estimation, Ryan M. Harrell

Theses and Dissertations

Statistical control charts are often used to detect a change in an otherwise stable process. This process may contain several variables affecting process stability. The goal of any control chart is to detect an out-of-control state quickly and provide insight on when the process actually changed. This reduces the off-line time the quality engineer spends assigning causality. In this research, a multivariate magnitude robust chart (MMRC) was developed using a change point model and a likelihood-ratio approach. Here the process is considered in-control until one or more normally distributed process variables permanently and suddenly shifts to out-of-control, stable value. Using …


Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl Mar 2007

Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl

Theses and Dissertations

Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …


Developing A Framwork For Evaluating Organizational Information Assurance Metrics Programs, Adam R. Bryant Mar 2007

Developing A Framwork For Evaluating Organizational Information Assurance Metrics Programs, Adam R. Bryant

Theses and Dissertations

The push to secure organizational information has brought about the need to develop better metrics for understanding the state of the organization’s security capability. This thesis utilizes case studies of information security metrics programs within Department of Defense organizations, the United States Air Force (USAF), and the National Aeronautics and Space Administration’s (NASA’s) Jet Propulsion Lab to discover how these organizations make decisions about how the measurement program is designed, how information is collected and disseminated, and how the collected information supports decision making. This research finds that both the DOD and USAF have highly complex information security programs that …


Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop Mar 2007

Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop

Theses and Dissertations

The purpose of this research is to determine whether the transition to a two-factor authentication system is more secure than a system that relied only on what users “know” for authentication. While we found that factors that made passwords inherently vulnerable did not transfer to the PIN portion of a two-factor authentication system, we did find significant problems relating to usability, worker productivity, and the loss and theft of smart cards. The new authentication method has disrupted our ability to stay connected to ongoing mission issues, forced some installations to cut off remote access for their users and in one …


Information Management Principles Applied To The Ballistic Missile Defense System, John M. Koehler Ii Mar 2007

Information Management Principles Applied To The Ballistic Missile Defense System, John M. Koehler Ii

Theses and Dissertations

Information systems (IS) have evolved over the last 50 plus years from individual components with single functionality to grand architectures that integrate multiple individual business functions into global organizational enterprises. Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture. The Missile Defense Agency (MDA) is currently tasked with developing an integrated Ballistic Missile Defense System (BMDS) capable of defending against all ranges of ballistic missiles in all phases of flight in defense of the homeland, our deployed forces, and our …


Analyzing The Interdiction Of Sea-Borne Threats Using Simulation Optimization, Kristen L. Cavallaro Mar 2007

Analyzing The Interdiction Of Sea-Borne Threats Using Simulation Optimization, Kristen L. Cavallaro

Theses and Dissertations

Worldwide, maritime trade accounts for approximately 80% of all trade by volume and is expected to double in the next twenty years. Prior to September 11, 2001, Ports, Waterways and Coastal Security (PWCS) was afforded only 1 percent of United States Coast Guard (USCG) resources. Today, it accounts for nearly 22 percent of dedicated USCG resources. Tactical assessment of resource requirements and operational limitations on the PWCS mission is necessary for more effective management of USCG assets to meet the broader range of competing missions. This research effort involves the development and validation of a discrete-event simulation model of the …


Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas Mar 2007

Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas

Theses and Dissertations

Prioritizing reconstruction projects to recover a base from a natural disaster is a complicated and arduous process that involves all levels of leadership. The project prioritization phase of base recovery has a direct affect on the allocation of funding, the utilization of human resources, the obligation of projects, and the overall speed and efficiency of the recovery process. The focus of this research is the development of an objective and repeatable process for optimizing the project prioritization phase of the recovery effort. This work will focus on promoting objectivity in the project prioritizing process, improving the communication of the overall …


Mathematical Programming Model For Fighter Training Squadron Pilot Scheduling, Thomas M. Newlon Mar 2007

Mathematical Programming Model For Fighter Training Squadron Pilot Scheduling, Thomas M. Newlon

Theses and Dissertations

The United States Air Force fighter training squadrons build weekly schedules using a long and tedious process. Very little of this process is automated and optimality of any kind is nearly impossible. Schedules are built to a feasible condition only to be changed with consideration of Wing level requirements. Weekly flying schedules are restricted by requirements for crew rest, days since a pilot's last sortie, sorties in the last 30 days, and sorties in the last 90 days. By providing a scheduling model to the pilot charged with creating the schedule, valuable pilot hours could be spent in the cockpit, …


Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii Mar 2007

Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii

Theses and Dissertations

This research uses an advanced statistical technique to expand upon the current understanding of war termination. Specifically, this thesis addressed questions concerning the most relevant factors toward predicting both the outcomes of interstate wars and the winners of intrastate and extra-systemic wars, within the limitations of the available data. Open-source war data from the Correlates of War Project was analyzed using both binary and multinomial logistic regression techniques. While the Correlates of War Project did not necessarily focus its data collection efforts on those variables historically associated with war termination, it did provide a sufficient number of variables with which …


Change-Point Methods For Overdispersed Count Data, Brian A. Wilken Mar 2007

Change-Point Methods For Overdispersed Count Data, Brian A. Wilken

Theses and Dissertations

A control chart is often used to detect a change in a process. Following a control chart signal, knowledge of the time and magnitude of the change would simplify the search for and identification of the assignable cause. In this research, emphasis is placed on count processes where overdispersion has occurred. Overdispersion is common in practice and occurs when the observed variance is larger than the theoretical variance of the assumed model. Although the Poisson model is often used to model count data, the two-parameter gamma-Poisson mixture parameterization of the negative binomial distribution is often a more adequate model for …


Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr. Mar 2007

Towards The Development Of A Defensive Cyber Damage And Mission Impact Methodology, Larry W. Fortson Jr.

Theses and Dissertations

The purpose of this research is to establish a conceptual methodological framework that will facilitate effective cyber damage and mission impact assessment and reporting following a cyber-based information incidents. Joint and service guidance requires mission impact reporting, but current efforts to implement such reporting have proven ineffective. This research seeks to understand the impediments existing in the current implementation and to propose an improved methodology. The research employed a hybrid historical analysis and case study methodology for data collection through extensive literature review, examination of existing case study research and interviews with Air Force members and civilian personnel employed as …


Improved Hyperspectral Image Testing Using Synthetic Imagery And Factorial Designed Experiments, Joseph P. Bellucci Mar 2007

Improved Hyperspectral Image Testing Using Synthetic Imagery And Factorial Designed Experiments, Joseph P. Bellucci

Theses and Dissertations

The goal of any remote sensing system is to gather data about the geography it is imaging. In order to gain knowledge of the earth's landscape, post-processing algorithms are developed to extract information from the collected data. The algorithms can be intended to classify the various ground covers in a scene, identify specific targets of interest, or detect anomalies in an image. After the design of an algorithm comes the difficult task of testing and evaluating its performance. Traditionally, algorithms are tested using sets of extensively ground truthed test images. However, the lack of well characterized test data sets and …


Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii Mar 2007

Recommendations For A Standardized Program Management Office (Pmo) Time Compliance Network Order (Tcno) Patching Process, Michael Czumak Iii

Theses and Dissertations

Network security is a paramount concern for organizations utilizing computer technology, and the Air Force is no exception. Network software vulnerability patching is a critical determinant of network security. The Air Force deploys these patches as Time Compliance Network Orders (TCNOs), which together with associated processes and enforced timelines ensure network compliance. While the majority of the network assets affected by this process are Air Force owned and operated, a large number are maintained by external entities known as Program Management Offices (PMOs). Although these externally controlled systems provide a service to the Air Force and reside on its network, …


Indentifying And Assessing Effective Mechanisms For Technology Transfer, Michael A. Romero Mar 2007

Indentifying And Assessing Effective Mechanisms For Technology Transfer, Michael A. Romero

Theses and Dissertations

The ability to shift knowledge and resources from federal laboratories to industrial and academic partners and vice versa is the primary reason that technology transfer (T2) exists today. Without the cooperation of federal, state, and private agencies working together to resolve today’s technology quandaries, a lot of the breakthroughs experienced today would not exist. This research was focused on uncovering which mechanisms are utilized by scientists and engineers. The research entails uncovering both official and unofficial mechanisms and ascertaining why some methods are preferred over others. It is also a secondary focus, to determine which barriers are impeding …


Selecting Electricity Generation Sources In Remote Locations, Kelly E. Kwan Mar 2007

Selecting Electricity Generation Sources In Remote Locations, Kelly E. Kwan

Theses and Dissertations

The purpose of this research was to investigate the impact of using a decision analysis technique for the selection of an electrical generation system for remote locations. Specifically, this thesis sought to answer five research questions addressing the types of energy sources used in remote locations, the decision-making processes used to identify these sources, the types of constraints incorporated in such a process, other valued factors, and their level of importance in relation to each other. The research questions were answered through a comprehensive literature review and the 10-Step Value-Focused Thinking Process on a specific case study in the National …


The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr. Mar 2007

The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr.

Theses and Dissertations

This thesis presents a case study of federal logistics support during Hurricane Katrina disaster relief operations. Data from federal contracts covering the first 10 weeks of Katrina are used to measure federal logistics activity. The study investigates whether chaos theory, part of complexity science, can extract information from Katrina contracting data to help managers make better logistics decisions during disaster relief operations. The study uses three analytical techniques: embedding, fitting the data to a logistic equation, and plotting the limit-cycle. Embedding and fitting a logistic equation to the data were used to test for deterministic chaos. The logistic equation and …


Examining Clandestine Social Networks For The Presence Of Non-Random Structure, Joshua S. Seder Mar 2007

Examining Clandestine Social Networks For The Presence Of Non-Random Structure, Joshua S. Seder

Theses and Dissertations

This thesis develops a tractable, statistically sound hypothesis testing framework for the detection, characterization, and estimation of non-random structure in clandestine social networks. Network structure is studied via an observed adjacency matrix, which is assumed to be subject to sampling variability. The vertex set of the network is partitioned into k mutually exclusive and collectively exhaustive subsets, based on available exogenous nodal attribute information. The proposed hypothesis testing framework is employed to statistically quantify a given partition's relativity in explaining the variability in the observed adjacency matrix relative to what can be explained by chance. As a result, valuable insight …


An Analysis Of Robust Workforce Scheduling Models For A Nurse Rostering Problem, Paul K. Tower Mar 2007

An Analysis Of Robust Workforce Scheduling Models For A Nurse Rostering Problem, Paul K. Tower

Theses and Dissertations

Disruptions impacting workforce schedules can be costly. A 1999 study of the United Kingdom's National Health Service estimated that as much as 4% of the total resources spent on staffing were lost to schedule disruptions like absenteeism. Although disruptions can not be eliminated, workforce schedules can be improved to be more responsive to disruptions. One key area of study that has expanded over the past few years is the application of traditional scheduling techniques to re-rostering problems. These efforts have provided methods for responding to schedule disruptions, but typically require deviations to the disrupted schedule. This thesis examines five workforce …


Approximate Analysis Of An Unreliable M/M/2 Retrial Queue, Brian P. Crawford Mar 2007

Approximate Analysis Of An Unreliable M/M/2 Retrial Queue, Brian P. Crawford

Theses and Dissertations

This thesis considers the performance evaluation of an M/M/2 retrial queue for which both servers are subject to active and idle breakdowns. Customers may abandon service requests if they are blocked from service upon arrival, or if their service is interrupted by a server failure. Customers choosing to remain in the system enter a retrial orbit for a random amount of time before attempting to re-access an available server. We assume that each server has its own dedicated repair person, and repairs begin immediately following a failure. Interfailure times, repair times and times between retrials are exponentially distributed, and all …


Critical Infrastructure Rebuild Prioritization Using Simulation Optimization, Namsuk Cho Mar 2007

Critical Infrastructure Rebuild Prioritization Using Simulation Optimization, Namsuk Cho

Theses and Dissertations

This thesis examines the importance of a critical infrastructure rebuild strategy following a terrorist attack or natural disaster such as Hurricane Katrina. Critical infrastructures are very complex and dependent systems in which their re-establishment is an essential part of the rebuilding process. A rebuild simulation model consisting of three layers (physical, information, and spatial) captures the dependency between the six critical infrastructures modeled. We employ a simulation optimization approach to evaluate rebuild prioritization combinations with a goal of minimizing the time needed to achieve an acceptable rebuild level. We use a simulated annealing heuristic as an optimization technique that works …


Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer Mar 2007

Planning And Assessing Stability Operations: A Proposed Value-Focused Thinking Approach, Gerald D. Fensterer

Theses and Dissertations

Stability operations are vital to establish peace in the aftermath of conflict. The United States is often called in for military support during conflict. The new American military paradigms include establishing peace through stability operations after a military conflict. Due to this new role, military decision makers face many difficulties in conducting successful stability operations. Compounding this problem is the limited number of resources pertaining to stability operations: experts, doctrine, knowledge, and technology. Two overarching challenges of stability operations facing decision makers are planning and prioritizing of stability operations and determining progress. This thesis applies a structured analytical approach to …


An Efficient Metaheuristic For Dynamic Network Design And Message Routing, Robert B. Hartlage Mar 2007

An Efficient Metaheuristic For Dynamic Network Design And Message Routing, Robert B. Hartlage

Theses and Dissertations

The implementation of Net-centric warfare presents major challenges in terms of effectively and efficiently delivering critical information across the Global Information Grid. In many cases, the amount of information requested will exceed the capabilities of the network. One challenge is to dynamically design the network (assign transceivers) to maximize the amount of required information that can be transmitted and the quality of service for those transmissions - to best implement the communications tasking order. The problem is as follows: given a list of required message traffic, to include source, destination, size, and priority, design the network to maximize the delivery …