Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

United States Military Academy

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 13 of 13

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Jack Voltaic®: Bolstering Critical Infrastructure Resilience, Robin L. Fontes, Erik Benjamin Korn, Douglas Fletcher, Jason Hillman, Erica Mitchell, Steven Whitham Oct 2020

Jack Voltaic®: Bolstering Critical Infrastructure Resilience, Robin L. Fontes, Erik Benjamin Korn, Douglas Fletcher, Jason Hillman, Erica Mitchell, Steven Whitham

ACI Journal Articles

According to the Department of Homeland Security (DHS), municipal critical infrastructure has become an ideal target for a range of cyber threat actors including near-peer competitors seeking geopolitical gains and decentralized cyber criminals attempting to hold cities captive for monetary gain. With municipalities predominantly partnering with the private sector for operation of national critical infrastructure as defined in Presidential Policy Directive (PPD) 21, cities, states, and industry entities find themselves on the front lines—possibly the first line of defense—against a perpetual barrage of attacks in cyberspace. Accordingly, a dynamic shift from traditional conflict in the physical world to ...


Evaluating Our Evaluations: Recognizing And Countering Performance Evaluation Pitfalls, Lee Evans, G. Lee Robinson Jan 2020

Evaluating Our Evaluations: Recognizing And Countering Performance Evaluation Pitfalls, Lee Evans, G. Lee Robinson

West Point Research Papers

Selecting the right person for the right job at the right time is a persistent challenge faced by organizations. Performance evaluations are a fundamental component of selection processes, and their use in the Army is nearly as old as the service itself. Some early evaluation systems consisted of a list of officers in a regiment with observations noted for each ranging from “a good-natured man” to “merely good—nothing promising” to “a man of whom all unite in speaking ill.” While our current evaluation form adds a bit more science to the art of performance evaluation, a constant in the ...


Avoiding Pitfalls In Undergraduate Simulation Courses, Vikram Mittal, Eugene Lesinski, Matthew Dabkowski Dec 2019

Avoiding Pitfalls In Undergraduate Simulation Courses, Vikram Mittal, Eugene Lesinski, Matthew Dabkowski

West Point Research Papers

Simulation development has historically been a specialized skill performed by engineers with graduate-level training and industry experience. However, advances in computing technology, coupled with the rise of model-based systems engineering, have dramatically increased the usage of simulations, such that most engineers now require a working knowledge of modeling and simulation (M&S). As such, an increasing number of undergraduate engineering programs are now requiring students to complete a simulation course. These courses are intended to reinforce foundational engineering knowledge while also teaching the students useful M&S tools that they will need in industry. Yet, a number of pitfalls are ...


Potential For Army Integration Of Autonomous Systems By Warfighting Function, Thomas R. Ryan Jr, Vikram Mittal Sep 2019

Potential For Army Integration Of Autonomous Systems By Warfighting Function, Thomas R. Ryan Jr, Vikram Mittal

West Point Research Papers

The article explains the maximum extent that the U.S. Army can integrate autonomous systems into its operations given the inherent limitations of the technology. Topics include these limitations determine the appropriateness of using autonomous systems to perform each of the broad range of Army tasks that are captured through the warfighter functions and the six warfighting functions of the U.S. Army include mission command, intelligence and protection.


Teaching Modeling To Engineers In An Undergraduate Simulation Course, Vikram Mittal, Robert Kewley, Brett Lindberg Nov 2018

Teaching Modeling To Engineers In An Undergraduate Simulation Course, Vikram Mittal, Robert Kewley, Brett Lindberg

West Point Research Papers

A significant challenge in teaching simulation to undergraduate students is to find a way to allow them to model a real world referent system within time and student skill constraints. Several research sources highlight not only the important challenge of model development (Garcia and Ceneno, 2009, Tako, 2011) but also the increased need for model development instruction among engineers (Grasas et. al., 2013, Saltzman and Roeder, 2013). One approach to this challenge is to use a general purpose discrete event simulation software package within the course, but this presents two challenges. Teaching the package to the students takes significant time ...


Design Parameters For Small Engines Based On Market Research, Vikram Mittal Sep 2018

Design Parameters For Small Engines Based On Market Research, Vikram Mittal

West Point Research Papers

Small internal combustion engines outperform batteries and fuel cells in regards to weight for a range of applications, including consumer products, marine vehicles, small manned ground vehicles, unmanned vehicles, and generators. The power ranges for these applications are typically between 1 kW and 10 kW. There are numerous technical challenges associated with engines producing power in this range resulting in low power density and high specific fuel consumption. As such, there is a large range of engine design solutions that are commercially available in this power range to overcome these technical challenges. A market survey was conducted of commercially available ...


The Use Of Stochastic Value Models To Create Technology Roadmaps, Vikram Mittal Jun 2018

The Use Of Stochastic Value Models To Create Technology Roadmaps, Vikram Mittal

West Point Research Papers

Since technology is rapidly advancing, systems engineers must now design for adaptability, such that the system can be updated with new components as they become available. Designing for adaptability typically requires analyzing and evaluating technologies at various stages of maturity to determine if they should be incorporated into the design. As such, technology roadmaps are a useful tool to identifying the change in a technology with time. Though traditional technology roadmaps are based on raw performance data, a technology roadmap based on value modeling would be more appropriate for system design. Value modeling is a technique used for evaluating different ...


Bridging Systems Engineering Theory And Application In Undergraduate Curricula, Eugene Lesinski, Vikram Mittal, Alex Maccalman May 2018

Bridging Systems Engineering Theory And Application In Undergraduate Curricula, Eugene Lesinski, Vikram Mittal, Alex Maccalman

West Point Research Papers

Systems engineering undergraduate curricula are typically divided into foundational, methodology, and application courses. The United States Military Academy, Systems Engineering program primary application course, often referred to as a Capstone project, involves teams of students performing client-based work to solve complex real-world problems. Existing foundational and methodology courses tend to emphasize engineering management processes and operations research techniques at the expense of systems engineering technical processes. As such, students often do not have the requisite knowledge base necessary for their Capstone, reducing their self-efficiency, decision-making, overall project interest, and quality of technical artifacts. In an attempt to bridge this gap ...


Benchmarking Estonia's Cyber Security: An On-Ramping Methodology For Rapid Adoption And Implementation, Ernest Wong, Nan Porter, Mckinnon Hokanson, Bing Bing Xie Oct 2017

Benchmarking Estonia's Cyber Security: An On-Ramping Methodology For Rapid Adoption And Implementation, Ernest Wong, Nan Porter, Mckinnon Hokanson, Bing Bing Xie

Research Papers

In April of 2007, Estonia fell victim to a series of distributed denial of service (DDoS) attacks that crippled its government websites, email servers, media outlets, and banking system for nearly a month. Due to the devastating effects of these cyber attacks, Estonia took great efforts to strengthen its cyber security protocols. This research analyzes the reforms that Estonia has implemented in its domestic and foreign policies and attempts to determine if any of it systemic improvements can help to also bolster cyber security in the United States (US). The findings from this research are that Estonia’s policy reforms ...


Dod Acquisition Structures For A Dynamic World: A Case Study Of Land Warrior Vs Talos, Daniel W. Provaznik Cdt'18, Vikram Mittal Oct 2017

Dod Acquisition Structures For A Dynamic World: A Case Study Of Land Warrior Vs Talos, Daniel W. Provaznik Cdt'18, Vikram Mittal

West Point Research Papers

The United States Special Operations Command (USSOCOM) is revolutionizing the capabilities of the warfighter with the Tactical Assault Light Operator Suit (TALOS) program. The program will equip USSOCOM operators with a powered, armored, exoskeleton to enhance their survivability, lethality, and mobility. The project launched in 2013, with a functional prototype scheduled to be complete in 2018. The aggressive development timeline necessitated that USSOCOM use a novel acquisition structure—the Joint Acquisition Task Force (JATF). The JATF structure mandates a government team as the lead integrator, consisting of acquisition personnel, engineers, and users. This study compared the TALOS acquisition structure to ...


Models Of Models: The Symbiotic Relationship Between Models And Wargames, Vikram Mittal, Jeffrey B. Demarest, Kennon S. Gilliam, Robert L. Page Jul 2017

Models Of Models: The Symbiotic Relationship Between Models And Wargames, Vikram Mittal, Jeffrey B. Demarest, Kennon S. Gilliam, Robert L. Page

West Point Research Papers

Military planning uses wargames to model the processes and decisions of an operation. As these operations become increasingly complex, the wargames similarly become more complex. Complex wargames are difficult to design and execute. As such, computer-based modeling and simulation can aid the wargame development, ensuring smooth execution. In particular, computer-based modeling and simulation can develop and validate the processes, determine initial conditions, evaluate the rules, and aid in validation. In turn, the wargame can provide useful data that can be fed into detailed models that can provide quantitative analysis to decision-makers.


The Unbalanced Classification Problem: Detecting Breaches In Security, Paul Evangelista Dec 2006

The Unbalanced Classification Problem: Detecting Breaches In Security, Paul Evangelista

West Point ETD

This research proposes several methods designed to improve solutions for security classification problems. The security classification problem involves unbalanced, high-dimensional, binary classification problems that are prevalent today. The imbalance within this data involves a significant majority of the negative class and a minority positive class. Any system that needs protection from malicious activity, intruders, theft, or other types of breaches in security must address this problem. These breaches in security are considered instances of the positive class. Given numerical data that represent observations or instances which require classification, state of the art machine learning algorithms can be applied. However, the ...


Computer Intrusion Detection Through Statistical Analysis And Prediction Modeling, Paul Evangelista May 2005

Computer Intrusion Detection Through Statistical Analysis And Prediction Modeling, Paul Evangelista

West Point ETD

Information security is very important in today’s society. Computer intrusion is one type of security infraction that poses a threat to all of us. Almost every person in modern parts of the world depend upon automated information. Information systems deliver paychecks on time, manage taxes, transfer funds, deliver important information that enables decisions, and maintain situational awareness in many different ways. Interrupting, corrupting, or destroying this information is a real threat. Computer attackers, often posing as intruders masquerading as authentic users, are the nucleus of this threat. Preventive computer security measures often do not provide enough; digital firms need ...