ORPP logo
Image from Google Jackets

Handbook of Military and Defense Operations Research.

By: Contributor(s): Material type: TextTextSeries: Chapman and Hall/CRC Series in Operations Research SeriesPublisher: Milton : CRC Press LLC, 2020Copyright date: ©2020Edition: 1st edDescription: 1 online resource (481 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780429883965
Subject(s): Genre/Form: Additional physical formats: Print version:: Handbook of Military and Defense Operations ResearchDDC classification:
  • 355.4072/073
LOC classification:
  • U102 .H363 2020
Online resources:
Contents:
Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Introduction and Objectives -- Organization of the Volume -- What This Handbook Does -- Acknowledgments -- Editors -- Contributors -- Section I Approaches -- Chapter 1 Modern Data Analytics for the Military Operational Researcher -- 1.1 Introduction -- 1.2 Why the New Emphasis -- 1.3 Terminology and Fundamental Concepts of Data Science -- 1.4 Data, Data Everywhere -- 1.5 Some Objectives of Data Analytics -- 1.5.1 Sample Predictive Tools -- 1.5.2 Sample Classification Tools -- 1.5.3 Sample Dimension Reduction Tools -- 1.5.4 Caveat on Tools -- 1.6 Warnings and Final Thoughts -- Acknowledgments -- References -- Chapter 2 Microsoft Excel: The Universal Tool of Analysis -- 2.1 Introduction and Problem Definition -- 2.2 Data Analysis Using MS Excel -- 2.2.1 Exploratory Data Analysis with Pivot Tables -- 2.2.2 Point and Range Estimates -- 2.2.3 Regression Modeling -- 2.3 Optimization -- 2.3.1 Constrained Optimization -- 2.3.2 Optimal Base Positioning -- 2.3.3 Solving Method Choice -- 2.3.4 Other Applications -- 2.4 Simulation -- 2.4.1 Simulation, Replication, and Insights -- 2.4.2 Generating Random Variables -- 2.4.3 Optimal Personnel Allocation -- 2.5 Other Uses -- 2.5.1 Macros and Visual Basic for Applications -- 2.5.2 Linking Data -- 2.5.3 Additional Add-Ins -- 2.6 Parting Thoughts -- References -- Chapter 3 Multiattribute Decision Modeling in Defense Applications -- 3.1 How Formal Decision Analysis Fits into Military Operations Research -- 3.2 Multiattribute Problems under Certainty -- 3.2.1 The First Step: Value-Focused Thinking -- 3.2.2 Generating Alternatives -- 3.2.3 The Consequence Table -- 3.2.4 Value Modeling -- 3.2.5 Ranges of Measure Variation -- 3.2.6 Single-Attribute Value Functions -- 3.2.7 Attribute Swing Weights.
3.2.8 Calculating Multiattribute Value -- 3.2.9 Cost versus Value -- 3.2.10 Value Elicitation, Multiple Decision Makers, and Problems with Voting -- 3.3 Multiattribute Decisions under Uncertainty -- 3.4 Sensitivity Analysis -- 3.5 Software -- 3.6 An Example: Army Base Realignment and Closure -- 3.7 Conclusion -- References -- Chapter 4 Military Workforce Planning and Manpower Modeling -- 4.1 Introduction -- 4.1.1 Terminology in Military Workforce Planning and Manpower Modeling -- 4.1.2 Chapter Overview -- 4.2 Previous Work in Military Workforce Planning and Manpower Modeling -- 4.3 Mathematical Model Classes -- 4.3.1 Dynamic Programming -- 4.3.2 Markov Decision Models -- 4.3.3 Goal Programming -- 4.3.4 Statistical Models -- 4.4 Retaining Quality and Talent Management -- 4.5 Case Studies -- 4.5.1 Military Medical Workforce Planning -- 4.5.2 Grade Plate Roll-Down -- 4.6 Future Work in Military Workforce Planning and Manpower Modeling -- Appendix -- References -- Chapter 5 Military Assessments -- 5.1 Introduction -- 5.1.1 Assessments in the Department of Defense -- 5.1.2 What Assessments Are and Why Assessments Are Important -- 5.1.3 The Importance of Objectives -- 5.1.4 A Generalized Framework for Assessments -- 5.2 Campaign Assessments -- 5.2.1 Purpose of Campaign Assessments -- 5.2.2 Process and Techniques -- 5.2.2.1 Theories of Change -- 5.2.2.2 Strategic Questions -- 5.2.2.3 Standards-Based Assessment -- 5.2.2.4 Written Risk Assessment -- 5.3 Operations Assessments -- 5.3.1 Purpose of Operations Assessments -- 5.3.2 Process and Techniques -- 5.4 Training Assessments -- 5.4.1 Purpose of Training Assessments -- 5.4.2 Techniques for Training Assessments -- 5.4.2.1 Observation Reports -- 5.4.2.2 Focus Groups and Interviews -- 5.4.2.3 Daily Summary Reports -- 5.4.2.4 Surveys -- 5.4.3 Summary Report Data and Data Mining -- 5.4.3.1 Frequency Plots.
5.4.3.2 Sentiment Analysis -- 5.4.3.3 Word Correlations -- 5.4.3.4 Clustering and Topic Models -- 5.5 Data Requirements -- 5.6 Assessment Process Pitfalls and Best Practices -- 5.6.1 Challenges and Pitfalls with Assessment -- 5.6.2 Best Practices -- 5.7 Conclusion -- Notes -- References -- Chapter 6 Threatcasting in a Military Setting -- 6.1 Introduction -- 6.2 Emerging Need for Foresight -- 6.3 Definition of Threatcasting -- 6.3.1 Phase Zero -- 6.3.2 Phase One -- 6.3.3 Phase Two -- 6.3.4 Phase Three -- 6.3.5 Phase Four -- 6.4 Supply Chains Defined by Industry and the Military -- 6.5 Threatcasting Applied in Industry -- 6.6 Threatcasting Applied to the Military -- 6.7 Implications for Design -- 6.8 Conclusion -- References -- Chapter 7 Analytical Modeling of Stochastic Systems -- 7.1 Introduction -- 7.2 Discrete Event Simulation -- 7.2.1 Advantages -- 7.2.2 Disadvantages -- 7.3 Analytical Models -- 7.3.1 Markov Chains -- 7.3.2 Queuing Models -- 7.3.3 Advantages -- 7.3.4 Disadvantages -- 7.4 A Comparison of Simulation and Analytical Models -- 7.5 A Markov Model of a Tank Meeting Engagement -- 7.6 A Queuing Model of Small Unmanned Aircraft Employment -- 7.7 The Impact of the Exponential Assumption -- 7.8 Conclusion -- References -- Chapter 8 Modern Methods for Characterization of Social Networks through Network Models -- 8.1 Introduction -- 8.1.1 Social Network Analysis Background: A Historical Perspective -- 8.1.2 Emergence of Quantitative Approaches to Social Network Analysis -- 8.2 Characterization of a Network -- 8.2.1 Graph Properties -- 8.2.2 Random Graph Generating Models -- 8.2.2.1 Mixtures of Random Graph Generating Models -- 8.2.3 Network Model Summary -- 8.3 Methods to Assess the Accuracy of a Network Model -- 8.3.1 Graph Matching -- 8.3.2 Graph Classification -- 8.3.3 Summary Graph Matching and Graph Classification.
8.4 Statistical Testing Methods -- 8.4.1 Summary of Statistical Testing Methods -- 8.5 Future Directions -- References -- Chapter 9 Process Optimization through Structured Problem Solving -- 9.1 Introduction -- 9.2 The Life Cycle of a Process -- 9.3 The Anatomy of a Process -- 9.4 A Structured Approach to Problem-Solving -- 9.5 It All Starts with a Champion and a Charter to Improve -- 9.5.1 Step 1: Clarify and Validate the Problem -- 9.5.2 Step 2: Break Down the Problem and Identify Performance Gaps -- 9.5.3 Step 3: Set an Improvement Target -- 9.5.4 Step 4: Determine Root Causes -- 9.5.5 Step 5: Developing Countermeasures -- 9.5.6 Step 6: See Countermeasures Through -- 9.5.7 Step 7: Confirm Results and Process -- 9.5.8 Step 8: Standardize Successful Processes -- 9.6 Summary -- References -- Chapter 10 Simulation Optimization -- 10.1 Introduction -- 10.2 Simulation Optimization Methodology and Literature -- 10.2.1 Simulation -- 10.2.2 Optimization -- 10.2.3 Simulation Optimization -- 10.2.4 Solving Simulation Optimization Problems -- 10.2.5 Applications in the Literature -- 10.3 Military Problem - Missile Plans That Maximize Damage to an Airfield -- 10.3.1 Example Scenario -- 10.3.2 Warhead Types and Accuracy -- 10.3.3 Air and Missile Defense Simulation -- 10.3.4 Runway Damage Simulation -- 10.3.5 Airfield Damage Simulation -- 10.4 Solving the Military Problem Using Simulation Optimization -- 10.4.1 Optimization Program -- 10.4.2 Simulation Optimization Test Cases -- 10.4.3 Simulation Optimization Results -- 10.5 Conclusion -- References -- Chapter 11 Analytical Test Planning for Defense Acquisitions -- 11.1 Introduction: Why Test and Why Test Using Scientific Test and Analysis Techniques? -- 11.2 The Demand Signal for Testing -- 11.3 Developing an Effective STAT test strategy -- 11.3.1 Plan: Understanding Requirements.
11.3.2 Plan: Define Design Space -- 11.3.3 Test Design -- 11.3.4 Test Execution -- 11.3.5 Test Analysis -- 11.4 Design of Experiments Application -- 11.5 Why STAT? -- 11.6 Conclusions and Bringing it all Together -- References -- Section II Soft Skills and Client Relations -- Chapter 12 Why Won't They Use Our Model? -- 12.1 Introduction -- 12.2 What Went Wrong? -- 12.3 Conceptual Models of the Reaction to Technological Change -- 12.4 Are There Resistance-Prone Changes? -- 12.5 The System-Task-Person (STP) Framework -- 12.6 Supply Ship Scheduling in the US Navy -- 12.7 The State Space Framework -- 12.7.1 Motivating Users to Move to Acceptance and Adoption -- 12.8 Anticipating Negative Reactions to the Implementation of a New Model -- 12.8.1 Use the STP Framework to Understand the Change -- 12.8.2 Use the State Space Framework to Observe Stakeholders -- 12.9 Summary -- References -- Chapter 13 From BOGSAT to TurboTeam: Collaboration for National Security Teams in the Age of Analytics -- 13.1 From BOGSAT to TurboTeam: Analytic Collaboration Comes of Age -- 13.2 Deciding -- 13.2.1 From Pros and Cons to Value Trees -- 13.2.1.1 Ben Franklin Weighs the Pros and Cons -- 13.2.1.2 Planting a Value Tree -- 13.2.2 From Roadmaps to Strategy Trees -- 13.2.2.1 Highway to the Danger Zone -- 13.2.2.2 Swinging from the Strategy Trees -- 13.3 Diagnosing -- 13.3.1 From Fishbones to Fault Trees -- 13.3.1.1 Choking on Fishbones -- 13.3.1.2 Finding Fault Trees -- 13.3.2 From Causal Diagrams to Bayesian Networks -- 13.3.2.1 Colliders and Confounders -- 13.3.2.2 Diagnosis with Bayesian Networks -- 13.4 Designing -- 13.4.1 From Flowcharts to Queueing Networks -- 13.4.1.1 When Flows Back Up -- 13.4.1.2 Jumping into Test Beds -- 13.4.2 From Knapsacks to Portfolios -- 13.4.2.1 Hiking through the Desert -- 13.4.2.2 Learning to Play Football -- 13.5 Lessons Learned -- References.
Section III Applications.
Summary: The Handbook of Military and Defense Operations Research presents the voices leading OR and analytics to new heights in security through research, practical applications, case studies, and lessons learned in the field.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Introduction and Objectives -- Organization of the Volume -- What This Handbook Does -- Acknowledgments -- Editors -- Contributors -- Section I Approaches -- Chapter 1 Modern Data Analytics for the Military Operational Researcher -- 1.1 Introduction -- 1.2 Why the New Emphasis -- 1.3 Terminology and Fundamental Concepts of Data Science -- 1.4 Data, Data Everywhere -- 1.5 Some Objectives of Data Analytics -- 1.5.1 Sample Predictive Tools -- 1.5.2 Sample Classification Tools -- 1.5.3 Sample Dimension Reduction Tools -- 1.5.4 Caveat on Tools -- 1.6 Warnings and Final Thoughts -- Acknowledgments -- References -- Chapter 2 Microsoft Excel: The Universal Tool of Analysis -- 2.1 Introduction and Problem Definition -- 2.2 Data Analysis Using MS Excel -- 2.2.1 Exploratory Data Analysis with Pivot Tables -- 2.2.2 Point and Range Estimates -- 2.2.3 Regression Modeling -- 2.3 Optimization -- 2.3.1 Constrained Optimization -- 2.3.2 Optimal Base Positioning -- 2.3.3 Solving Method Choice -- 2.3.4 Other Applications -- 2.4 Simulation -- 2.4.1 Simulation, Replication, and Insights -- 2.4.2 Generating Random Variables -- 2.4.3 Optimal Personnel Allocation -- 2.5 Other Uses -- 2.5.1 Macros and Visual Basic for Applications -- 2.5.2 Linking Data -- 2.5.3 Additional Add-Ins -- 2.6 Parting Thoughts -- References -- Chapter 3 Multiattribute Decision Modeling in Defense Applications -- 3.1 How Formal Decision Analysis Fits into Military Operations Research -- 3.2 Multiattribute Problems under Certainty -- 3.2.1 The First Step: Value-Focused Thinking -- 3.2.2 Generating Alternatives -- 3.2.3 The Consequence Table -- 3.2.4 Value Modeling -- 3.2.5 Ranges of Measure Variation -- 3.2.6 Single-Attribute Value Functions -- 3.2.7 Attribute Swing Weights.

3.2.8 Calculating Multiattribute Value -- 3.2.9 Cost versus Value -- 3.2.10 Value Elicitation, Multiple Decision Makers, and Problems with Voting -- 3.3 Multiattribute Decisions under Uncertainty -- 3.4 Sensitivity Analysis -- 3.5 Software -- 3.6 An Example: Army Base Realignment and Closure -- 3.7 Conclusion -- References -- Chapter 4 Military Workforce Planning and Manpower Modeling -- 4.1 Introduction -- 4.1.1 Terminology in Military Workforce Planning and Manpower Modeling -- 4.1.2 Chapter Overview -- 4.2 Previous Work in Military Workforce Planning and Manpower Modeling -- 4.3 Mathematical Model Classes -- 4.3.1 Dynamic Programming -- 4.3.2 Markov Decision Models -- 4.3.3 Goal Programming -- 4.3.4 Statistical Models -- 4.4 Retaining Quality and Talent Management -- 4.5 Case Studies -- 4.5.1 Military Medical Workforce Planning -- 4.5.2 Grade Plate Roll-Down -- 4.6 Future Work in Military Workforce Planning and Manpower Modeling -- Appendix -- References -- Chapter 5 Military Assessments -- 5.1 Introduction -- 5.1.1 Assessments in the Department of Defense -- 5.1.2 What Assessments Are and Why Assessments Are Important -- 5.1.3 The Importance of Objectives -- 5.1.4 A Generalized Framework for Assessments -- 5.2 Campaign Assessments -- 5.2.1 Purpose of Campaign Assessments -- 5.2.2 Process and Techniques -- 5.2.2.1 Theories of Change -- 5.2.2.2 Strategic Questions -- 5.2.2.3 Standards-Based Assessment -- 5.2.2.4 Written Risk Assessment -- 5.3 Operations Assessments -- 5.3.1 Purpose of Operations Assessments -- 5.3.2 Process and Techniques -- 5.4 Training Assessments -- 5.4.1 Purpose of Training Assessments -- 5.4.2 Techniques for Training Assessments -- 5.4.2.1 Observation Reports -- 5.4.2.2 Focus Groups and Interviews -- 5.4.2.3 Daily Summary Reports -- 5.4.2.4 Surveys -- 5.4.3 Summary Report Data and Data Mining -- 5.4.3.1 Frequency Plots.

5.4.3.2 Sentiment Analysis -- 5.4.3.3 Word Correlations -- 5.4.3.4 Clustering and Topic Models -- 5.5 Data Requirements -- 5.6 Assessment Process Pitfalls and Best Practices -- 5.6.1 Challenges and Pitfalls with Assessment -- 5.6.2 Best Practices -- 5.7 Conclusion -- Notes -- References -- Chapter 6 Threatcasting in a Military Setting -- 6.1 Introduction -- 6.2 Emerging Need for Foresight -- 6.3 Definition of Threatcasting -- 6.3.1 Phase Zero -- 6.3.2 Phase One -- 6.3.3 Phase Two -- 6.3.4 Phase Three -- 6.3.5 Phase Four -- 6.4 Supply Chains Defined by Industry and the Military -- 6.5 Threatcasting Applied in Industry -- 6.6 Threatcasting Applied to the Military -- 6.7 Implications for Design -- 6.8 Conclusion -- References -- Chapter 7 Analytical Modeling of Stochastic Systems -- 7.1 Introduction -- 7.2 Discrete Event Simulation -- 7.2.1 Advantages -- 7.2.2 Disadvantages -- 7.3 Analytical Models -- 7.3.1 Markov Chains -- 7.3.2 Queuing Models -- 7.3.3 Advantages -- 7.3.4 Disadvantages -- 7.4 A Comparison of Simulation and Analytical Models -- 7.5 A Markov Model of a Tank Meeting Engagement -- 7.6 A Queuing Model of Small Unmanned Aircraft Employment -- 7.7 The Impact of the Exponential Assumption -- 7.8 Conclusion -- References -- Chapter 8 Modern Methods for Characterization of Social Networks through Network Models -- 8.1 Introduction -- 8.1.1 Social Network Analysis Background: A Historical Perspective -- 8.1.2 Emergence of Quantitative Approaches to Social Network Analysis -- 8.2 Characterization of a Network -- 8.2.1 Graph Properties -- 8.2.2 Random Graph Generating Models -- 8.2.2.1 Mixtures of Random Graph Generating Models -- 8.2.3 Network Model Summary -- 8.3 Methods to Assess the Accuracy of a Network Model -- 8.3.1 Graph Matching -- 8.3.2 Graph Classification -- 8.3.3 Summary Graph Matching and Graph Classification.

8.4 Statistical Testing Methods -- 8.4.1 Summary of Statistical Testing Methods -- 8.5 Future Directions -- References -- Chapter 9 Process Optimization through Structured Problem Solving -- 9.1 Introduction -- 9.2 The Life Cycle of a Process -- 9.3 The Anatomy of a Process -- 9.4 A Structured Approach to Problem-Solving -- 9.5 It All Starts with a Champion and a Charter to Improve -- 9.5.1 Step 1: Clarify and Validate the Problem -- 9.5.2 Step 2: Break Down the Problem and Identify Performance Gaps -- 9.5.3 Step 3: Set an Improvement Target -- 9.5.4 Step 4: Determine Root Causes -- 9.5.5 Step 5: Developing Countermeasures -- 9.5.6 Step 6: See Countermeasures Through -- 9.5.7 Step 7: Confirm Results and Process -- 9.5.8 Step 8: Standardize Successful Processes -- 9.6 Summary -- References -- Chapter 10 Simulation Optimization -- 10.1 Introduction -- 10.2 Simulation Optimization Methodology and Literature -- 10.2.1 Simulation -- 10.2.2 Optimization -- 10.2.3 Simulation Optimization -- 10.2.4 Solving Simulation Optimization Problems -- 10.2.5 Applications in the Literature -- 10.3 Military Problem - Missile Plans That Maximize Damage to an Airfield -- 10.3.1 Example Scenario -- 10.3.2 Warhead Types and Accuracy -- 10.3.3 Air and Missile Defense Simulation -- 10.3.4 Runway Damage Simulation -- 10.3.5 Airfield Damage Simulation -- 10.4 Solving the Military Problem Using Simulation Optimization -- 10.4.1 Optimization Program -- 10.4.2 Simulation Optimization Test Cases -- 10.4.3 Simulation Optimization Results -- 10.5 Conclusion -- References -- Chapter 11 Analytical Test Planning for Defense Acquisitions -- 11.1 Introduction: Why Test and Why Test Using Scientific Test and Analysis Techniques? -- 11.2 The Demand Signal for Testing -- 11.3 Developing an Effective STAT test strategy -- 11.3.1 Plan: Understanding Requirements.

11.3.2 Plan: Define Design Space -- 11.3.3 Test Design -- 11.3.4 Test Execution -- 11.3.5 Test Analysis -- 11.4 Design of Experiments Application -- 11.5 Why STAT? -- 11.6 Conclusions and Bringing it all Together -- References -- Section II Soft Skills and Client Relations -- Chapter 12 Why Won't They Use Our Model? -- 12.1 Introduction -- 12.2 What Went Wrong? -- 12.3 Conceptual Models of the Reaction to Technological Change -- 12.4 Are There Resistance-Prone Changes? -- 12.5 The System-Task-Person (STP) Framework -- 12.6 Supply Ship Scheduling in the US Navy -- 12.7 The State Space Framework -- 12.7.1 Motivating Users to Move to Acceptance and Adoption -- 12.8 Anticipating Negative Reactions to the Implementation of a New Model -- 12.8.1 Use the STP Framework to Understand the Change -- 12.8.2 Use the State Space Framework to Observe Stakeholders -- 12.9 Summary -- References -- Chapter 13 From BOGSAT to TurboTeam: Collaboration for National Security Teams in the Age of Analytics -- 13.1 From BOGSAT to TurboTeam: Analytic Collaboration Comes of Age -- 13.2 Deciding -- 13.2.1 From Pros and Cons to Value Trees -- 13.2.1.1 Ben Franklin Weighs the Pros and Cons -- 13.2.1.2 Planting a Value Tree -- 13.2.2 From Roadmaps to Strategy Trees -- 13.2.2.1 Highway to the Danger Zone -- 13.2.2.2 Swinging from the Strategy Trees -- 13.3 Diagnosing -- 13.3.1 From Fishbones to Fault Trees -- 13.3.1.1 Choking on Fishbones -- 13.3.1.2 Finding Fault Trees -- 13.3.2 From Causal Diagrams to Bayesian Networks -- 13.3.2.1 Colliders and Confounders -- 13.3.2.2 Diagnosis with Bayesian Networks -- 13.4 Designing -- 13.4.1 From Flowcharts to Queueing Networks -- 13.4.1.1 When Flows Back Up -- 13.4.1.2 Jumping into Test Beds -- 13.4.2 From Knapsacks to Portfolios -- 13.4.2.1 Hiking through the Desert -- 13.4.2.2 Learning to Play Football -- 13.5 Lessons Learned -- References.

Section III Applications.

The Handbook of Military and Defense Operations Research presents the voices leading OR and analytics to new heights in security through research, practical applications, case studies, and lessons learned in the field.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.