Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 20 of 20

Full-Text Articles in Other Operations Research, Systems Engineering and Industrial Engineering

Hyperspectral Imagery Target Detection Using Improved Anomaly Detection And Signature Matching Methods, Timothy E. Smetek Jun 2007

Hyperspectral Imagery Target Detection Using Improved Anomaly Detection And Signature Matching Methods, Timothy E. Smetek

Theses and Dissertations

This research extends the field of hyperspectral target detection by developing autonomous anomaly detection and signature matching methodologies that reduce false alarms relative to existing benchmark detectors, and are practical for use in an operational environment. The proposed anomaly detection methodology adapts multivariate outlier detection algorithms for use with hyperspectral datasets containing tens of thousands of non-homogeneous, high-dimensional spectral signatures. In so doing, the limitations of existing, non-robust, anomaly detectors are identified, an autonomous clustering methodology is developed to divide an image into homogeneous background materials, and competing multivariate outlier detection methods are evaluated for their ability to uncover hyperspectral …


R&D Management In Iran, Opportunities And Threats, Nader Ale Ebrahim, Ali Ghazizadeh, Arash Golnam, Hamid Tahbaz Tavakoli May 2007

R&D Management In Iran, Opportunities And Threats, Nader Ale Ebrahim, Ali Ghazizadeh, Arash Golnam, Hamid Tahbaz Tavakoli

Nader Ale Ebrahim

Research and Development (R&D) management in Iran has faced many barriers and obstacles, in which R&D units are considered as the basic core of the product development and innovation. Due to structural shortcomings, a great number of organizations and industries have not yet been able to position themselves in the market. There are about 1141 R&D units throughout Iran, due to the geographical decentralization of these units this paper considers and analyzes the R&D case study in one of the provinces located in the north part of Iran, and the findings can be generalized to the other industrialized areas and …


Feasibility Study Of Variance Reduction In The Logistics Composite Model, George P. Cole Iii Mar 2007

Feasibility Study Of Variance Reduction In The Logistics Composite Model, George P. Cole Iii

Theses and Dissertations

The Logistics Composite Model (LCOM) is a stochastic, discrete-event simulation that relies on probabilities and random number generators to model scenarios in a maintenance unit and estimate optimal manpower levels through an iterative process. Models such as LCOM involving pseudo-random numbers inevitably have a variance associated with the output of the model for each run, and the output is actually a range of estimates. The reduction of the variance in the results of the model can be costly in the form of time for multiple replications. The alternative is a range of estimates that is too wide to realistically apply …


Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl Mar 2007

Internet Protocol Geolocation: Development Of A Delay-Based Hybrid Methodology For Locating The Geographic Location Of A Network Node, John M. Roehl

Theses and Dissertations

Internet Protocol Geolocation (IP Geolocation), the process of determining the approximate geographic location of an IP addressable node, has proven useful in a wide variety of commercial applications. Commercial applications of IP Geolocation include market research, redirection for performance enhancement, restricting content, and combating fraud. The potential for military applications include securing remote access via geographic authentication, intelligence collection, and cyber attack attribution. IP Geolocation methods can be divided into three basic categories based upon what information is used to determine the geographic location of the given IP address: 1) Information contained in databases, 2) information that is leaked during …


Developing A Framwork For Evaluating Organizational Information Assurance Metrics Programs, Adam R. Bryant Mar 2007

Developing A Framwork For Evaluating Organizational Information Assurance Metrics Programs, Adam R. Bryant

Theses and Dissertations

The push to secure organizational information has brought about the need to develop better metrics for understanding the state of the organization’s security capability. This thesis utilizes case studies of information security metrics programs within Department of Defense organizations, the United States Air Force (USAF), and the National Aeronautics and Space Administration’s (NASA’s) Jet Propulsion Lab to discover how these organizations make decisions about how the measurement program is designed, how information is collected and disseminated, and how the collected information supports decision making. This research finds that both the DOD and USAF have highly complex information security programs that …


Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop Mar 2007

Beyond Passswords: Usage And Policy Transformation, Alan S. Alsop

Theses and Dissertations

The purpose of this research is to determine whether the transition to a two-factor authentication system is more secure than a system that relied only on what users “know” for authentication. While we found that factors that made passwords inherently vulnerable did not transfer to the PIN portion of a two-factor authentication system, we did find significant problems relating to usability, worker productivity, and the loss and theft of smart cards. The new authentication method has disrupted our ability to stay connected to ongoing mission issues, forced some installations to cut off remote access for their users and in one …


Analyzing The Interdiction Of Sea-Borne Threats Using Simulation Optimization, Kristen L. Cavallaro Mar 2007

Analyzing The Interdiction Of Sea-Borne Threats Using Simulation Optimization, Kristen L. Cavallaro

Theses and Dissertations

Worldwide, maritime trade accounts for approximately 80% of all trade by volume and is expected to double in the next twenty years. Prior to September 11, 2001, Ports, Waterways and Coastal Security (PWCS) was afforded only 1 percent of United States Coast Guard (USCG) resources. Today, it accounts for nearly 22 percent of dedicated USCG resources. Tactical assessment of resource requirements and operational limitations on the PWCS mission is necessary for more effective management of USCG assets to meet the broader range of competing missions. This research effort involves the development and validation of a discrete-event simulation model of the …


Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas Mar 2007

Optimizing The Prioritization Of Natural Disaster Recovery Projects, Jason M. Aftanas

Theses and Dissertations

Prioritizing reconstruction projects to recover a base from a natural disaster is a complicated and arduous process that involves all levels of leadership. The project prioritization phase of base recovery has a direct affect on the allocation of funding, the utilization of human resources, the obligation of projects, and the overall speed and efficiency of the recovery process. The focus of this research is the development of an objective and repeatable process for optimizing the project prioritization phase of the recovery effort. This work will focus on promoting objectivity in the project prioritizing process, improving the communication of the overall …


Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii Mar 2007

Patterns Of War Termination: A Statistical Approach, Paul D. Robinson Ii

Theses and Dissertations

This research uses an advanced statistical technique to expand upon the current understanding of war termination. Specifically, this thesis addressed questions concerning the most relevant factors toward predicting both the outcomes of interstate wars and the winners of intrastate and extra-systemic wars, within the limitations of the available data. Open-source war data from the Correlates of War Project was analyzed using both binary and multinomial logistic regression techniques. While the Correlates of War Project did not necessarily focus its data collection efforts on those variables historically associated with war termination, it did provide a sufficient number of variables with which …


Indentifying And Assessing Effective Mechanisms For Technology Transfer, Michael A. Romero Mar 2007

Indentifying And Assessing Effective Mechanisms For Technology Transfer, Michael A. Romero

Theses and Dissertations

The ability to shift knowledge and resources from federal laboratories to industrial and academic partners and vice versa is the primary reason that technology transfer (T2) exists today. Without the cooperation of federal, state, and private agencies working together to resolve today’s technology quandaries, a lot of the breakthroughs experienced today would not exist. This research was focused on uncovering which mechanisms are utilized by scientists and engineers. The research entails uncovering both official and unofficial mechanisms and ascertaining why some methods are preferred over others. It is also a secondary focus, to determine which barriers are impeding …


The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr. Mar 2007

The Chaos Of Katrina: A Nonlinear Analysis Of Federal Logistics Support During Hurricane Katrina Relief Operations, Gerald W. Morris Jr.

Theses and Dissertations

This thesis presents a case study of federal logistics support during Hurricane Katrina disaster relief operations. Data from federal contracts covering the first 10 weeks of Katrina are used to measure federal logistics activity. The study investigates whether chaos theory, part of complexity science, can extract information from Katrina contracting data to help managers make better logistics decisions during disaster relief operations. The study uses three analytical techniques: embedding, fitting the data to a logistic equation, and plotting the limit-cycle. Embedding and fitting a logistic equation to the data were used to test for deterministic chaos. The logistic equation and …


Prioritizing Satellite Payload Selection Via Optimization, Benjamin S. Kallemyn Mar 2007

Prioritizing Satellite Payload Selection Via Optimization, Benjamin S. Kallemyn

Theses and Dissertations

This thesis develops optimization models for prioritizing payloads for inclusion on satellite buses with volume, power, weight and budget constraints. The first model considers a single satellite launch for which the budget is uncertain and constellation requirements are not considered. Subsequently, we include constellation requirements and provide a more enhanced model. Both single-launch models provide a prioritized list of payloads to include on the launch before the budget is realized. The single-launch models are subsequently extended to a sequence of multiple launches in two cases, both of which incorporate an explicit dependence on the constellation composition at each launch epoch. …


Automatic Target Recognition User Interface Tool, David A. Kerns Mar 2007

Automatic Target Recognition User Interface Tool, David A. Kerns

Theses and Dissertations

A computer tool to aid in selecting the best Automatic Target Recognition (ATR) algorithm is developed. The program considers many quantifiers, accepts user-defined parameters, allows for changes in the operational environment and presents results in a meaningful way. It is written for Microsoft Excel. An ATR algorithm assigns a class label to a recognized target. General designations can include "Friend" and "Foe." The error of designating "Friend" as "Foe" as well as "Foe" as "Friend" comes with a high cost. Studying each algorithm's error can minimize this cost. Receiver Operating Characteristic (ROC) curves provide only information on the probabilities given …


Ranking Maintenance Strategies From The Point Of View Of Lean Thinking: Group Decision Making Model By Using Borda Method, Mehdi Jafarian, Kamran Shahanaghi, Aliakbar Faegh, Majid Samsami Jan 2007

Ranking Maintenance Strategies From The Point Of View Of Lean Thinking: Group Decision Making Model By Using Borda Method, Mehdi Jafarian, Kamran Shahanaghi, Aliakbar Faegh, Majid Samsami

Mehdi Jafarian

The selection of maintenance strategies is a typical multiple criteria decision-making (MCDM) problem. There have been taken different maintenance strategies in order to obtaining optimistic maintenance strategy. In this paper we aim to rank different maintenance strategies from the point of view of lean thinking. After obtaining information from experts whose expertness is in field of maintenance, in order to ranking these strategies we form a group decision making model and solve this model by using Borda method. Finally we analyze its results


An Introduction To Maintenance, Kamran Shahanaghi, Mehdi Jafarian Jan 2007

An Introduction To Maintenance, Kamran Shahanaghi, Mehdi Jafarian

Mehdi Jafarian

در فضای رقابتی امروز، بنگاه‏های اقتصادی در تلاشی مستمر برای دستیابی به کیفیت بالا، هزینه پایین، افزایش سرعت در ارائه کالا و خدمات و ... می‏باشند. بنابراین دستیابی به اهداف فوق را می‏توان در زمره مهمترین دغدغه‏های مدیران امروزی قلمداد نمود. نگهداری و تعمیرات نیز به عنوان یکی از مهمترین فرآیندهای یک بنگاه اقتصادی از این قاعده مستثنا نبوده و در زیر ذره بین مدیران و کارشناسان قرار گرفته است. در این مقاله سعی نویسندگان بر این بوده است تا برخی از مهمترین جنبه‏های پژوهشی مطرح در این حوزه را عنوان نمایند.


Optimization Models For The Single Machine Scheduling Problem With A Single Flexible Maintenance Activity And Stochastic Maintenance Activities Time, Kamran Shahanaghi, Azizolah Jafari, Mehdi Jafarian, Hamid Babaei, Hojat Mehrazmay, Majid Beikverdi, Ahmad Yazdian Jan 2007

Optimization Models For The Single Machine Scheduling Problem With A Single Flexible Maintenance Activity And Stochastic Maintenance Activities Time, Kamran Shahanaghi, Azizolah Jafari, Mehdi Jafarian, Hamid Babaei, Hojat Mehrazmay, Majid Beikverdi, Ahmad Yazdian

Mehdi Jafarian

In this paper, modeling and solving of a single machine scheduling problem with a single flexible maintenance activity and stochastic maintenance activities time was considered. Also it assumes that the all activities are resumable. Chen solved and investigate complexity of this problem without probabilistic condition by Mixed binary integer programming (BIP) so we solving this problem with considering stochastic programming concepts. An example has investigated at the end chapter to show actual consequences by Lingo.


The Optimization Of The Threshold For The Preventive Maintenance Actions In A Condition-Based Maintenance Program Via Dynamic Programming Approach, Mehdi Jafarian, Majid Beikverdi, Kamran Shahanaghi, Zeinab Nezhadbiglari Jan 2007

The Optimization Of The Threshold For The Preventive Maintenance Actions In A Condition-Based Maintenance Program Via Dynamic Programming Approach, Mehdi Jafarian, Majid Beikverdi, Kamran Shahanaghi, Zeinab Nezhadbiglari

Mehdi Jafarian

The last step of a condition based maintenance (CBM) program is maintenance decision-making. This step is the most important and the most critical stage of maintenance for executive personnel and management whom work on taking maintenance actions. This decision making would be done according to certain criteria such as risk, cost, reliability and availability. This paper considered a dynamic programming model to optimization of the threshold for the preventive maintenance actions in a condition-based maintenance program. The basis of this modeling is the average cost of maintenance actions, failures and exchanges. In this paper, we improved the memory of the …


Cbm With Economic Decision Making: A New Modelling By Markov Chain, Kamran Shahanaghi, Mehdi Jafarian Jan 2007

Cbm With Economic Decision Making: A New Modelling By Markov Chain, Kamran Shahanaghi, Mehdi Jafarian

Mehdi Jafarian

فعالیت های نگهداری و تعمیرات در هر بنگاه اقتصادی از یک سو سبب کاهش هزینه های ناشی از عدم فعالیت دستگاه ها، هزینه های تعمیرات و سود از دست رفته، شده و از سوی دیگر به عنوان فعالیتی هزینه بر، هزینه های گاها سنگینی را به سازمان وارد می¬سازد. از این رو توسعه سیاست های نگهداری و تعمیرات و بهینه سازی هر یک از این سیاست ها، عاملی مهم در کاهش هزینه های سازمان خواهد بود. در این میان فرآیند نگهداری و تعمیرات مبتنی بر شرایط، به عنوان یکی از کاراترین سیاست¬های نگهداری و تعمیرات، با حذف فعالیت های نگهداری …


Details And Description Of Operations Research, Paul Savory Jan 2007

Details And Description Of Operations Research, Paul Savory

Industrial and Management Systems Engineering: Reports

The ambiguous term operations research was coined during World War II. A frequent substitute is management science. Operations research is a scientific approach to analyzing problems and making decisions. It uses mathematics and mathematical modeling on computers to forecast the implications of various choices and zero in on the best alternatives. This content paper provides an overview of operations research. It highlights operations research problems, methods for solving problems, different areas of operations research, and example problems.


Pre/Post Assessment Of Abilities, Paul Savory Jan 2007

Pre/Post Assessment Of Abilities, Paul Savory

Industrial and Management Systems Engineering: Instructional Materials

One approach to assess if students are learning in a course is to conduct a pre-test, post-test assessment of the course material. By comparing the two results, one can make an assessment of the knowledge learned in the course. For certain types of courses, it can be a challenge in defining an assessment instrument that measure student knowledge. This example is one I have developed for my IMSE 440/840 (Discrete Event Computer Simulation) course. Students are asked rate their ability for key course objectives defined on the course syllabus. I administer it on the first day of the course and …