Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Engineering

Simulating Discriminatory Profiling, Oscar Neal Dec 2005

Simulating Discriminatory Profiling, Oscar Neal

Masters Theses

There is a concern that racial profiling is being used to invoke searches and stops in spite of its violation of the fourth amendment. Simulation methods are used to study the correlation test of stops, searches and citations with race, age, and gender. The design uses sensitivity analysis of inputs to determine their relationship to outputs statistics of a police department's citations and stops. Experimental results are than used to verify and predict departmental bias. A simulation program written in Visual Basic is used as a tool to explore simulation techniques. A formulation of simulation uses in studying discriminatory profiling …


A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi Jul 2005

A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi

Engineering Management & Systems Engineering Theses & Dissertations

Today's political and military reality requires the optimal use of our legacy systems. The objective is to maximize the effectiveness of our operations by efficient allocation, placement and the use of our forces and war-fighting systems. The synergism drawn from the capabilities of the legacy complex systems enables today's war-fighting needs to be met without substantial increase in cost or resources. This synergism can be realized by the effective integration and interoperation of legacy systems into a larger, more complex system of systems.

However, the independently developed legacy systems in this new tactical environment often have different data types, languages, …


A Systems Methodology For Measuring Operational Organization Effectiveness: A Study Of The Original Equipment Computer Manufacturing Industry, 1948 To 2001, Teddy Steven Cotter Apr 2005

A Systems Methodology For Measuring Operational Organization Effectiveness: A Study Of The Original Equipment Computer Manufacturing Industry, 1948 To 2001, Teddy Steven Cotter

Engineering Management & Systems Engineering Theses & Dissertations

Optimizing operational organizational effectiveness is the central, although often unstated, goal of engineering management and systems engineering research and applications. Two fundamental problems remain to be addressed in pursuit of this goal. First, despite over fifty years of research in various disciplines, there is still no universally accepted definition of organizational effectiveness. Second, no methodology exists to identify the domains, dimensions, and determinants of operational organizational effectiveness and dynamically model operational organizational effectiveness within a given population.

This research synthesizes a systems engineering methodology for identifying the domains, dimensions, and determinants of and dynamically modeling operational organizational effectiveness for an …


Quantifying Vulnerability To Critical Infrastructure, Barry Charles Ezell Apr 2005

Quantifying Vulnerability To Critical Infrastructure, Barry Charles Ezell

Engineering Management & Systems Engineering Theses & Dissertations

Military and civilian leaders have the responsibility to protect our Nation's critical infrastructure, communities, and symbols of American power from terrorists, home and abroad, as well as from natural disasters. To this end, assessments are conducted to reduce vulnerability. The literature offers multiple definitions of vulnerability and measurement has not been adequately addressed. Thus, the purpose of this research has been to develop and deploy a systems-based model that quantifies vulnerability to critical infrastructure. This research defines critical infrastructure vulnerability as a measure of the susceptibility of critical infrastructure to threat scenarios. Vulnerability is a function of (1) threat scenario, …


Exploratory Inquiry: Disparate Air Force Base Area Network Architectures, Charlie W. Boyd Jr. Mar 2005

Exploratory Inquiry: Disparate Air Force Base Area Network Architectures, Charlie W. Boyd Jr.

Theses and Dissertations

Joint Vision 2020, the Department of Defense (DoD) blueprint for development and transformation, identifies information and technology as critical enablers for our nation's military and calls for the development of a joint force capable of integrated information sharing to provide decision superiority, the ability to make and implement better decisions before enemies can react (DoD, 2000). Networks have been identified as the single most important element for transforming our current military forces. Ironically, Air Force base-level communications networks have been identified as a weakness. This research follows the qualitative approach to increases the current understanding of base level communications networks …


Assessing The Usefulness Of The Decision Framework For Identifying And Selecting Knowledge Management Projects, Kevin G. Budai Mar 2005

Assessing The Usefulness Of The Decision Framework For Identifying And Selecting Knowledge Management Projects, Kevin G. Budai

Theses and Dissertations

Knowledge management (KM) is becoming recognized as a valuable tool for the Department of Defense (DoD) in its effort to maintain a competitive, strategic advantage against its enemies in a new threat environment. Decision superiority is the ultimate end result and is only possible through the effective and efficient use of its chief key resource--knowledge. As the Air Force seeks to transform the way it does business the concept of knowledge management has made its way to the forefront of both the Air Force's Information Strategy and Information Resource Flight Plan. This research assesses the usefulness of a knowledge management …


Medical Devices, Support Networks, And Their Vulnerabilities: A Case Study Of The Integration Of Medical Networks Into The Air Force Information Network, Paul G. Oleksiak Mar 2005

Medical Devices, Support Networks, And Their Vulnerabilities: A Case Study Of The Integration Of Medical Networks Into The Air Force Information Network, Paul G. Oleksiak

Theses and Dissertations

With the implementation of "one Air Force, one network" under way it is important to look at how the Air Force plans to incorporate the medical field and its unique systems, networks, and mission. The medical field presents distinctive problems not seen in other areas. Open network vulnerabilities in the medical information systems not only pose a problem for the individual, but to the military service also. Possible security holes provide both access to vital military & personal information (end strength numbers, current status of personnel, social security), and a door way into the "network". Intruders now can possibly access …


Effectively Managing The Air Force Enterprise Architecture, Jamie P. Sharkey Mar 2005

Effectively Managing The Air Force Enterprise Architecture, Jamie P. Sharkey

Theses and Dissertations

The Air Force is developing and implementing an enterprise architecture to meet the Clinger-Cohen Act's requirement that all federal agencies use an architecture to guide their information technology (IT) investments. However, this act does not provide guidance on how to effectively manage an enterprise architecture. Prior research applied maturity models and competency stages to manage an enterprise architecture by defining layers of enterprise architecture management maturity. However, these efforts tend to view enterprise architecture development as a one-time planning process rather than an iterative progression. Enterprise architecture is not a one-time exercise, but rather it is an on-going effort within …


A Study To Determine Damage Assessment Methods Or Models On Air Force Networks, Lisa S. Thiem Mar 2005

A Study To Determine Damage Assessment Methods Or Models On Air Force Networks, Lisa S. Thiem

Theses and Dissertations

Damage assessment for computer networks is a new area of interest for the Air Force. Previously, there has not been a concerted effort to codify damage assessment or develop a model that can be applied in assessing damage done by criminals, natural disasters, or other methods of damaging a computer network. The research undertaken attempts to identify if the Air Force MAJCOM Network Operations Support Centers (NOSC) use damage assessment models or methods. If the Air Force does use a model or method, an additional question of how the model was attained or decided upon is asked. All information comes …


Project Portfolio Management: An Investigation Of One Air Force Product Center, Bryan D. Edmunds Mar 2005

Project Portfolio Management: An Investigation Of One Air Force Product Center, Bryan D. Edmunds

Theses and Dissertations

Over the last two decades, reducing product development times in the DoD has been the focus of many committees, commissions, and research efforts. Despite the implementation of numerous recommendations, the DoD still struggles with long acquisition cycle times. This research is part of the Air Force Cycle Time Reduction Research Program (CTRRP), which grew out of the Cycle Time Reduction Action Plan, developed in 1998. This research focuses on the portfolio management (project selection and resource allocation) part of the CTRRP. The purpose of this research effort was to investigate the use of portfolio management within the Air Force. Specifically, …


Status Of Department Of Defense Architecture Framework (Dodaf) Implementation Within The Aeronautical Systems Center (Asc), Chad A. Millette Mar 2005

Status Of Department Of Defense Architecture Framework (Dodaf) Implementation Within The Aeronautical Systems Center (Asc), Chad A. Millette

Theses and Dissertations

The purpose of this research was to identify the current status of the use of the Department of Defense Architecture Framework (DoDAF) systems architecture products within the Aeronautical Systems Center (ASC) program offices. There are regulatory requirements dictating the creation of DoDAF products as annexes to programmatic documentation, such as the Joint Capabilities Integration Development System (JCIDS) requirement for systems architectures as annexes for acquisition milestone decision documentation. In addition, the DoDAF itself identifies several products as being highly applicable for the development of acquisition strategies. This thesis investigated the use of systems architectures, and particularly DoDAF products, within the …


Complex System Contextual Framework (Cscf): A Grounded-Theory Construction For The Articulation Of System Context In Addressing Complex Systems Problems, W. B. Max Crownover Jan 2005

Complex System Contextual Framework (Cscf): A Grounded-Theory Construction For The Articulation Of System Context In Addressing Complex Systems Problems, W. B. Max Crownover

Engineering Management & Systems Engineering Theses & Dissertations

The complexity of problems facing society continues to grow, and decision-makers and problem-solvers are finding many of today's emerging problems to be beyond their capability to adequately address. There is agreement in the literature that problems of this nature are complex system problems, inextricably linked to some highly complex system of systems. Establishing a clear understanding of the specific complex system context is fundamental to the process of understanding and analyzing complex systems and complex system problems across all of the different systems-based disciplines. While complex system context is widely referred to in systems literature, there is no clear characterization …