Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Other Operations Research, Systems Engineering and Industrial Engineering

Efficiency Analysis Of A Congested Brazilian Airport Applying Slots Optimization Control: Congonhas Airport Case, Mariana Franco B. Mendes, Rafael Roco De Araujo, Ana Paula Beck Da Silva Etges, Massoud Bazargan Jan 2020

Efficiency Analysis Of A Congested Brazilian Airport Applying Slots Optimization Control: Congonhas Airport Case, Mariana Franco B. Mendes, Rafael Roco De Araujo, Ana Paula Beck Da Silva Etges, Massoud Bazargan

International Journal of Aviation, Aeronautics, and Aerospace

The current slot allocation mechanism in Brazil, based on the International Air Transport Association (IATA) rules, and its supplementary local regulation The National Civil Aviation Agency (ANAC), displays a few issues and limitations (e.g. slot misuse, allocation inefficiencies). Such issues are particularly present in the case of busy airports that works near their maximum capacity for major parts of the day. This inefficiency problem is generated because of the complexity of slot allocation added to the limited decision support available for the Brazilian system. This study focuses on the implementation of an optimal slot model, based on IATA regulations with …


Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka Oct 2019

Prioritizing Strategic Cyberspace Lethality, Andrew J. Schoka

Military Cyber Affairs

The primary concern of United States national security policy, as detailed in the 2018 National Defense Strategy, has shifted from asymmetrical counter-insurgency operations to countering inter-state strategic competition by rogue regimes and revisionist powers. This doctrinal shift has prompted an increased emphasis on military lethality, particularly in strategic-level cyberspace operations intended to counter open challenges to the global security environment and United States preeminence. Drawing from the theory of constraints in industrial engineering and Bayesian search theory in operations research, this paper identifies the key organizational constraints that hinder the lethality of the Department of Defense’s strategic-level cyberspace operations units …


Minimodal: Dimensional Domain Of Miniature Shipping Containers For Intermodal Freight Transportation, Lee Stapley Jul 2019

Minimodal: Dimensional Domain Of Miniature Shipping Containers For Intermodal Freight Transportation, Lee Stapley

Ursidae: The Undergraduate Research Journal at the University of Northern Colorado

This study explores the feasibility of miniature shipping container usage within existing intermodal transportation (IT) supply chains. Smaller intermodal container shipments may help realign freight shipments with the most efficient transportation mode, rail. These containers embolden the dimensional domain (DD) of shipping. The shipping container dimensional domain (container size variation and modal fluidity) is widespread and results in shipments that are often larger or more infrequent than needed. The DD impacts transport mode, shipping frequency, shipment velocity, intermodal supply chain accessibility, and regional shipping networks. This study suggests that container size impacts the DD and, therefore, mode choice. As miniature …


Identification Of Reverse Engineering Candidates Utilizing Machine Learning And Aircraft Cannibalization Data, Marc Banghart Oct 2017

Identification Of Reverse Engineering Candidates Utilizing Machine Learning And Aircraft Cannibalization Data, Marc Banghart

International Journal of Aviation, Aeronautics, and Aerospace

As military aircraft continue to remain in service and age, cannibalization of parts is increasing. Proactive identification of parts that are at high risk for cannibalization will inform engineering processes such as reverse engineering, thus allowing potentially reducing lead time to develop new parts. The research objective was to develop a causal structure that can be used for prediction of when cannibalization actions may occur. Bayesian networks allow encoding of causality between various descriptive features given a data set. The method utilized a tabu search algorithm, identified the underlying causal structure and the associated node probabilities. The method is then …