Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2005

Systems Engineering

Institution
Keyword
Publication
Publication Type

Articles 1 - 26 of 26

Full-Text Articles in Engineering

Simulating Discriminatory Profiling, Oscar Neal Dec 2005

Simulating Discriminatory Profiling, Oscar Neal

Masters Theses

There is a concern that racial profiling is being used to invoke searches and stops in spite of its violation of the fourth amendment. Simulation methods are used to study the correlation test of stops, searches and citations with race, age, and gender. The design uses sensitivity analysis of inputs to determine their relationship to outputs statistics of a police department's citations and stops. Experimental results are than used to verify and predict departmental bias. A simulation program written in Visual Basic is used as a tool to explore simulation techniques. A formulation of simulation uses in studying discriminatory profiling …


Backend Framework And Software Approach To Compute Earthquake Parameters From Signals Recorded By Seismic Instrumentation System, Raman Attri Sep 2005

Backend Framework And Software Approach To Compute Earthquake Parameters From Signals Recorded By Seismic Instrumentation System, Raman Attri

Raman K. Attri

Computation of seismic parameters and its interpretation from the recorded earthquake signal is empowered by digital data acquisition systems. This enables seismologist to automatically compute all the relevant parameters. Futuristic applications require extensive software development to implement seismic prediction and forecasting models. While developing such models, software developer prefer to write their own in-house analysis & modeling software with complete control over the required computations and models. This paper presents simplified mathematical framework of the seismic events and back-end computational software logic & algorithm to provide a simple framework to software engineers develop customized seismic analysis & computation software.


The Effect Of A Repetitive, Fatiguing Lifting Task On Horizontal Ground Reaction Forces, Yu Shu, Jonathan Drum, Stephanie Southard, Gwanseob Shin, Gary A. Mirka Aug 2005

The Effect Of A Repetitive, Fatiguing Lifting Task On Horizontal Ground Reaction Forces, Yu Shu, Jonathan Drum, Stephanie Southard, Gwanseob Shin, Gary A. Mirka

Gary A. Mirka

There are many outdoor work environments that involve the combination of repetitive, fatiguing lifting tasks and less-than-optimal footing (muddy/slippery ground surfaces). The focus of the current research was to evaluate the effects of lifting-induced fatigue of the low back extensors on lifting kinematics and ground reaction forces. Ten participants performed a repetitive lifting task over a period of 8 minutes. As they performed this task, the ground reaction forces and whole body kinematics were captured using a force platform and magnetic motion tracking system, respectively. Fatigue was verified in this experiment by documenting a decrease in the median frequency of …


A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi Jul 2005

A Conceptual Framework For Analysis Of System Safety Interoperability Of United States Navy's Combat Systems, Showkat Shanaz Alborzi

Engineering Management & Systems Engineering Theses & Dissertations

Today's political and military reality requires the optimal use of our legacy systems. The objective is to maximize the effectiveness of our operations by efficient allocation, placement and the use of our forces and war-fighting systems. The synergism drawn from the capabilities of the legacy complex systems enables today's war-fighting needs to be met without substantial increase in cost or resources. This synergism can be realized by the effective integration and interoperation of legacy systems into a larger, more complex system of systems.

However, the independently developed legacy systems in this new tactical environment often have different data types, languages, …


A Systems Methodology For Measuring Operational Organization Effectiveness: A Study Of The Original Equipment Computer Manufacturing Industry, 1948 To 2001, Teddy Steven Cotter Apr 2005

A Systems Methodology For Measuring Operational Organization Effectiveness: A Study Of The Original Equipment Computer Manufacturing Industry, 1948 To 2001, Teddy Steven Cotter

Engineering Management & Systems Engineering Theses & Dissertations

Optimizing operational organizational effectiveness is the central, although often unstated, goal of engineering management and systems engineering research and applications. Two fundamental problems remain to be addressed in pursuit of this goal. First, despite over fifty years of research in various disciplines, there is still no universally accepted definition of organizational effectiveness. Second, no methodology exists to identify the domains, dimensions, and determinants of operational organizational effectiveness and dynamically model operational organizational effectiveness within a given population.

This research synthesizes a systems engineering methodology for identifying the domains, dimensions, and determinants of and dynamically modeling operational organizational effectiveness for an …


Quantifying Vulnerability To Critical Infrastructure, Barry Charles Ezell Apr 2005

Quantifying Vulnerability To Critical Infrastructure, Barry Charles Ezell

Engineering Management & Systems Engineering Theses & Dissertations

Military and civilian leaders have the responsibility to protect our Nation's critical infrastructure, communities, and symbols of American power from terrorists, home and abroad, as well as from natural disasters. To this end, assessments are conducted to reduce vulnerability. The literature offers multiple definitions of vulnerability and measurement has not been adequately addressed. Thus, the purpose of this research has been to develop and deploy a systems-based model that quantifies vulnerability to critical infrastructure. This research defines critical infrastructure vulnerability as a measure of the susceptibility of critical infrastructure to threat scenarios. Vulnerability is a function of (1) threat scenario, …


Development Of Integrated Process Simulation System Model For Spent Fuel Treatment Facility (Sftf) Design: Quarterly Progress Report January 1-March 31, 2005, Yitung Chen, Sean Hsieh Mar 2005

Development Of Integrated Process Simulation System Model For Spent Fuel Treatment Facility (Sftf) Design: Quarterly Progress Report January 1-March 31, 2005, Yitung Chen, Sean Hsieh

Separations Campaign (TRP)

The Advanced Fuel Cycle Initiative (AFCI) and Transmutation Research Program-University Participation Program (TRP-UPP) supported by Department of Energy of the United States have been developing many important technologies for the transmutation of nuclear waste to address long-term disposal issues. While successfully embedding AMUSE module into a dedicated System Engineering Model (TRPSEMPro), developed by the Nevada Center for Advanced Computational Methods (NCACM) at the University of Nevada-Las Vegas collaborating with Argonne National Laboratory (ANL), ANL is interested in further simulating the Light Water Reactor (LWR) Spent Fuel Treatment Facility (SFTF) combining commercial process simulation and analysis packages and core calculation of …


F-111 Systems Engineering Case Study, Air Force Center For Systems Engineering, G. Keith Richey Mar 2005

F-111 Systems Engineering Case Study, Air Force Center For Systems Engineering, G. Keith Richey

AFIT Documents

The systems engineering lessons from the F-111 program will facilitate learning by emphasizing practical applications and resulting outcomes to the current processes and tools used on today s programs. The student will understand the long-term consequences of systems engineering as implemented on the F-111 and its effect on cost, schedule, and operational effectiveness. The reader can then postulate outcomes of alternate decisions at the program/system level.


A Study To Determine Damage Assessment Methods Or Models On Air Force Networks, Lisa S. Thiem Mar 2005

A Study To Determine Damage Assessment Methods Or Models On Air Force Networks, Lisa S. Thiem

Theses and Dissertations

Damage assessment for computer networks is a new area of interest for the Air Force. Previously, there has not been a concerted effort to codify damage assessment or develop a model that can be applied in assessing damage done by criminals, natural disasters, or other methods of damaging a computer network. The research undertaken attempts to identify if the Air Force MAJCOM Network Operations Support Centers (NOSC) use damage assessment models or methods. If the Air Force does use a model or method, an additional question of how the model was attained or decided upon is asked. All information comes …


Project Portfolio Management: An Investigation Of One Air Force Product Center, Bryan D. Edmunds Mar 2005

Project Portfolio Management: An Investigation Of One Air Force Product Center, Bryan D. Edmunds

Theses and Dissertations

Over the last two decades, reducing product development times in the DoD has been the focus of many committees, commissions, and research efforts. Despite the implementation of numerous recommendations, the DoD still struggles with long acquisition cycle times. This research is part of the Air Force Cycle Time Reduction Research Program (CTRRP), which grew out of the Cycle Time Reduction Action Plan, developed in 1998. This research focuses on the portfolio management (project selection and resource allocation) part of the CTRRP. The purpose of this research effort was to investigate the use of portfolio management within the Air Force. Specifically, …


Effectively Managing The Air Force Enterprise Architecture, Jamie P. Sharkey Mar 2005

Effectively Managing The Air Force Enterprise Architecture, Jamie P. Sharkey

Theses and Dissertations

The Air Force is developing and implementing an enterprise architecture to meet the Clinger-Cohen Act's requirement that all federal agencies use an architecture to guide their information technology (IT) investments. However, this act does not provide guidance on how to effectively manage an enterprise architecture. Prior research applied maturity models and competency stages to manage an enterprise architecture by defining layers of enterprise architecture management maturity. However, these efforts tend to view enterprise architecture development as a one-time planning process rather than an iterative progression. Enterprise architecture is not a one-time exercise, but rather it is an on-going effort within …


Medical Devices, Support Networks, And Their Vulnerabilities: A Case Study Of The Integration Of Medical Networks Into The Air Force Information Network, Paul G. Oleksiak Mar 2005

Medical Devices, Support Networks, And Their Vulnerabilities: A Case Study Of The Integration Of Medical Networks Into The Air Force Information Network, Paul G. Oleksiak

Theses and Dissertations

With the implementation of "one Air Force, one network" under way it is important to look at how the Air Force plans to incorporate the medical field and its unique systems, networks, and mission. The medical field presents distinctive problems not seen in other areas. Open network vulnerabilities in the medical information systems not only pose a problem for the individual, but to the military service also. Possible security holes provide both access to vital military & personal information (end strength numbers, current status of personnel, social security), and a door way into the "network". Intruders now can possibly access …


Assessing The Usefulness Of The Decision Framework For Identifying And Selecting Knowledge Management Projects, Kevin G. Budai Mar 2005

Assessing The Usefulness Of The Decision Framework For Identifying And Selecting Knowledge Management Projects, Kevin G. Budai

Theses and Dissertations

Knowledge management (KM) is becoming recognized as a valuable tool for the Department of Defense (DoD) in its effort to maintain a competitive, strategic advantage against its enemies in a new threat environment. Decision superiority is the ultimate end result and is only possible through the effective and efficient use of its chief key resource--knowledge. As the Air Force seeks to transform the way it does business the concept of knowledge management has made its way to the forefront of both the Air Force's Information Strategy and Information Resource Flight Plan. This research assesses the usefulness of a knowledge management …


Status Of Department Of Defense Architecture Framework (Dodaf) Implementation Within The Aeronautical Systems Center (Asc), Chad A. Millette Mar 2005

Status Of Department Of Defense Architecture Framework (Dodaf) Implementation Within The Aeronautical Systems Center (Asc), Chad A. Millette

Theses and Dissertations

The purpose of this research was to identify the current status of the use of the Department of Defense Architecture Framework (DoDAF) systems architecture products within the Aeronautical Systems Center (ASC) program offices. There are regulatory requirements dictating the creation of DoDAF products as annexes to programmatic documentation, such as the Joint Capabilities Integration Development System (JCIDS) requirement for systems architectures as annexes for acquisition milestone decision documentation. In addition, the DoDAF itself identifies several products as being highly applicable for the development of acquisition strategies. This thesis investigated the use of systems architectures, and particularly DoDAF products, within the …


Exploratory Inquiry: Disparate Air Force Base Area Network Architectures, Charlie W. Boyd Jr. Mar 2005

Exploratory Inquiry: Disparate Air Force Base Area Network Architectures, Charlie W. Boyd Jr.

Theses and Dissertations

Joint Vision 2020, the Department of Defense (DoD) blueprint for development and transformation, identifies information and technology as critical enablers for our nation's military and calls for the development of a joint force capable of integrated information sharing to provide decision superiority, the ability to make and implement better decisions before enemies can react (DoD, 2000). Networks have been identified as the single most important element for transforming our current military forces. Ironically, Air Force base-level communications networks have been identified as a weakness. This research follows the qualitative approach to increases the current understanding of base level communications networks …


Theater Battle Management Core System Systems Engineering Case Study, Air Force Center For Systems Engineering, Josiah R. Collens Jr., Bob Krause Feb 2005

Theater Battle Management Core System Systems Engineering Case Study, Air Force Center For Systems Engineering, Josiah R. Collens Jr., Bob Krause

AFIT Documents

The Theater Battle Management Core System (TBMCS) is an integrated air command and control (C2) system that performs standardized, secure, automated air battle planning and execution management for Air Force, multi-service, and allied commanders in theaters of operation worldwide. TBMCS provides the means to plan, direct, and control all theater air operations and to coordinate with land, maritime, and special operations elements. It is deployed at C2 nodes at national, force and wing/unit-level elements. TBMCS operates in support of planners and decision makers at, and below, the level of Joint Force Air Component Commander. The system is modular and scalable …


Variability Of Residual Stresses And Superposition Effect In Multipass Grinding Of High-Carbon High-Chromium Steel, Olga Karabelchtchikova, Iris V. Rivero Feb 2005

Variability Of Residual Stresses And Superposition Effect In Multipass Grinding Of High-Carbon High-Chromium Steel, Olga Karabelchtchikova, Iris V. Rivero

Iris V. Rivero

The distribution of residual stresses (RS) and surface integrity generated in heat treatment and subsequent multipass grinding was investigated in this experimental study to examine the source of variability and the nature of the interactions of the experimental factors. A nested experimental design was implemented to (a) compare the sources of the RS variability, (b) to examine RS distribution and tensile peak location due to experimental factors, and (c) to analyze the superposition relationship in the RS distribution due to multipass grinding technique. To characterize the material responses, several techniques were used, including microstructural analysis, hardness-toughness and roughness examinations, and …


Characterization Of Changes In Electrophysiological Activity In An Operational Environment, Natalia Mazaeva, Santosh Mathan, Michael C. Dorneich, Stephen Whitlow, Patricia May Ververs Jan 2005

Characterization Of Changes In Electrophysiological Activity In An Operational Environment, Natalia Mazaeva, Santosh Mathan, Michael C. Dorneich, Stephen Whitlow, Patricia May Ververs

Michael C. Dorneich

The purpose of this study is to characterize differences in EEG collected under stationary conditions and that collected in mobile settings. EEG activity has not been evaluated in operational settings due to difficulties associated with processing of EEG in real-world settings such as real-time removal of artifacts, operational environments, and possible differences in EEG frequency associated with mobility. Utilization of EEG measures of cognitive activity in dynamic environments demands the use of real-time algorithms of signal decontamination and characterization of specific components of EEG activity. In this study, EEG was collected and filtered in real-time in a set of controlled …


Development Of A Systems Engineering Model Of The Chemical Separations Process, Yitung Chen, Darrell Pepper, Sean Hsieh Jan 2005

Development Of A Systems Engineering Model Of The Chemical Separations Process, Yitung Chen, Darrell Pepper, Sean Hsieh

Separations Campaign (TRP)

The chemical processing of used nuclear fuel is an integral component of any strategy for the transmutation of nuclear waste. Due to the large volume of material that must be handled in this first step of the transmutation process, the efficiency of the separations process is a key factor in the potential economic viability of transmutation strategies. The ability to optimize the chemical separation systems is vital to ensure the feasibility of the transmutation program.

Systems analysis, or total systems modeling, is one of the strongest tools available to researchers for understanding and optimizing complex systems such as chemical separations …


Development Of Integrated Process Simulation System Model For Spent Fuel Treatment Facility (Sftf) Design, Yitung Chen, Sean Hsieh Jan 2005

Development Of Integrated Process Simulation System Model For Spent Fuel Treatment Facility (Sftf) Design, Yitung Chen, Sean Hsieh

Separations Campaign (TRP)

The major objective is to create a framework that combines all the strengths of AMUSE’s complicated calculations, well established commercial system process package such as ASPENPLUS, HYSYS and PRO/II and TRPSEMPro’s flexible parameter optimization modules. Development of the process simulation code can be done using the solvent extraction process experience at Argonne National Laboratory and in collaboration with the NCACM.

The major activities of the task are the following:

  • Develop a framework for simulating the SFTF process using AMUSE code, commercial process package, such as ASPEN- PLUS, and system engineering model.
  • Develop a middleware package that can communicate between the …


Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto Jan 2005

Software Development Project Risk Management: A Literature Review, Kevin Macg. Adams, C. Ariel Pinto

Engineering Management & Systems Engineering Faculty Publications

The rapid and unprecedented growth in software has brought with it some of the most spectacular and costly project failures in modern history. How risk management is presented in the scholarly journals may give insight into the risk management methods and techniques in use on software development projects. This paper provides a glimpse into the risk management methods, methodologies and techniques available to those who are responsible for software development projects by conducting a non-experimental content analysis. The findings reveal that risk management has not received sufficient attention and does not appear to be widely accepted within the software engineering …


A Generic, Adaptive Systems Engineering Information Model I, Ann K. Miller, Joseph J. Simpson, Scott Erwin Grasman, Cihan H. Dagli Jan 2005

A Generic, Adaptive Systems Engineering Information Model I, Ann K. Miller, Joseph J. Simpson, Scott Erwin Grasman, Cihan H. Dagli

Engineering Management and Systems Engineering Faculty Research & Creative Works

This paper proposes a new network centric architecture that can be used by first responders to effectively respond to crisis situations. The powerful network-centric concept originally developed for and mainly used in the military environment, can be effectively used for civilian security and emergency response missions. This paper also proposes the use of a swarm of intelligent robots as a part of the network-centric architecture to aid the first responders. The swarm of robots works in tandem with the first responders and provides them with the necessary information on a real time basis. The proposed network centric architecture with a …


An Sds Modeling Approach For Simulation-Based Control, Sreeram Ramakrishnan, Kumar Mayur Thakur Jan 2005

An Sds Modeling Approach For Simulation-Based Control, Sreeram Ramakrishnan, Kumar Mayur Thakur

Engineering Management and Systems Engineering Faculty Research & Creative Works

We initiate a study of mathematical models for specifying (discrete) simulation-based control systems. It is desirable to specify simulation-based control systems using a model that is intuitive, succinct, expressive, and whose state space properties are relatively easy computationally. We compare automata-based models for specifying control systems and find that all systems that are currently used (such as finite state machines, communicating hierarchical finite state machines (FSM), communicating finite state machines, and Turing machines) lack at least one of the abovementioned features. We propose using sequential dynamical systems (SDS) - a formalism for representing discrete simulations - to specify simulation-based control …


Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto Jan 2005

Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto

Engineering Management & Systems Engineering Faculty Publications

This paper describes how to enable diverse enterprise customers for voice-data switch to achieve in configuration a balance among users, features, and perceived reliability subject to extremes of traffic. The analysis entailed the simulation of the voice-data switch with embedded priority system, generation of latency times for various configurations and transaction traffic rates, and the development of a framework and theoretical propositions for configuration of super-saturated systems. It was shown that the concept of tolerance levels defined in the risk of extreme events can be applied for embedded priority systems and was the basis for the application of the zone-configuration …


Development Of A System Of Systems Engineering Method, Ji Hyon Mun, Morgan Henrie, Yaneth Correa, Charles Keating, Andres Sousa-Poza Jan 2005

Development Of A System Of Systems Engineering Method, Ji Hyon Mun, Morgan Henrie, Yaneth Correa, Charles Keating, Andres Sousa-Poza

Engineering Management & Systems Engineering Faculty Publications

Systems engineers have been facing challenges with the design and analysis of multiple complex systems. System of Systems Engineering has emerged to assist in this challenge with the systemic analysis, design, and transformation of complex metasystems. This paper outlines a proposed method to overcome these challenges, which is grounded in System of Systems Engineering principles and methodology. An overview of System of Systems Engineering will be provided for understanding of its significance and the attempt to complement Systems Engineering efforts in dealing with the aforementioned challenges. Finally, discussion on the proposed method, with respect to complex system analysis, is provided.


Complex System Contextual Framework (Cscf): A Grounded-Theory Construction For The Articulation Of System Context In Addressing Complex Systems Problems, W. B. Max Crownover Jan 2005

Complex System Contextual Framework (Cscf): A Grounded-Theory Construction For The Articulation Of System Context In Addressing Complex Systems Problems, W. B. Max Crownover

Engineering Management & Systems Engineering Theses & Dissertations

The complexity of problems facing society continues to grow, and decision-makers and problem-solvers are finding many of today's emerging problems to be beyond their capability to adequately address. There is agreement in the literature that problems of this nature are complex system problems, inextricably linked to some highly complex system of systems. Establishing a clear understanding of the specific complex system context is fundamental to the process of understanding and analyzing complex systems and complex system problems across all of the different systems-based disciplines. While complex system context is widely referred to in systems literature, there is no clear characterization …