000 11422nam a22005173i 4500
001 EBC6038735
003 MiAaPQ
005 20240724114118.0
006 m o d |
007 cr cnu||||||||
008 240724s2020 xx o ||||0 eng d
020 _a9780429883965
_q(electronic bk.)
020 _z9781138607330
035 _a(MiAaPQ)EBC6038735
035 _a(Au-PeEL)EBL6038735
035 _a(OCoLC)1140788480
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
050 4 _aU102
_b.H363 2020
082 0 _a355.4072/073
100 1 _aScala, Natalie M.
245 1 0 _aHandbook of Military and Defense Operations Research.
250 _a1st ed.
264 1 _aMilton :
_bCRC Press LLC,
_c2020.
264 4 _c©2020.
300 _a1 online resource (481 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aChapman and Hall/CRC Series in Operations Research Series
505 0 _aCover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Introduction and Objectives -- Organization of the Volume -- What This Handbook Does -- Acknowledgments -- Editors -- Contributors -- Section I Approaches -- Chapter 1 Modern Data Analytics for the Military Operational Researcher -- 1.1 Introduction -- 1.2 Why the New Emphasis -- 1.3 Terminology and Fundamental Concepts of Data Science -- 1.4 Data, Data Everywhere -- 1.5 Some Objectives of Data Analytics -- 1.5.1 Sample Predictive Tools -- 1.5.2 Sample Classification Tools -- 1.5.3 Sample Dimension Reduction Tools -- 1.5.4 Caveat on Tools -- 1.6 Warnings and Final Thoughts -- Acknowledgments -- References -- Chapter 2 Microsoft Excel: The Universal Tool of Analysis -- 2.1 Introduction and Problem Definition -- 2.2 Data Analysis Using MS Excel -- 2.2.1 Exploratory Data Analysis with Pivot Tables -- 2.2.2 Point and Range Estimates -- 2.2.3 Regression Modeling -- 2.3 Optimization -- 2.3.1 Constrained Optimization -- 2.3.2 Optimal Base Positioning -- 2.3.3 Solving Method Choice -- 2.3.4 Other Applications -- 2.4 Simulation -- 2.4.1 Simulation, Replication, and Insights -- 2.4.2 Generating Random Variables -- 2.4.3 Optimal Personnel Allocation -- 2.5 Other Uses -- 2.5.1 Macros and Visual Basic for Applications -- 2.5.2 Linking Data -- 2.5.3 Additional Add-Ins -- 2.6 Parting Thoughts -- References -- Chapter 3 Multiattribute Decision Modeling in Defense Applications -- 3.1 How Formal Decision Analysis Fits into Military Operations Research -- 3.2 Multiattribute Problems under Certainty -- 3.2.1 The First Step: Value-Focused Thinking -- 3.2.2 Generating Alternatives -- 3.2.3 The Consequence Table -- 3.2.4 Value Modeling -- 3.2.5 Ranges of Measure Variation -- 3.2.6 Single-Attribute Value Functions -- 3.2.7 Attribute Swing Weights.
505 8 _a3.2.8 Calculating Multiattribute Value -- 3.2.9 Cost versus Value -- 3.2.10 Value Elicitation, Multiple Decision Makers, and Problems with Voting -- 3.3 Multiattribute Decisions under Uncertainty -- 3.4 Sensitivity Analysis -- 3.5 Software -- 3.6 An Example: Army Base Realignment and Closure -- 3.7 Conclusion -- References -- Chapter 4 Military Workforce Planning and Manpower Modeling -- 4.1 Introduction -- 4.1.1 Terminology in Military Workforce Planning and Manpower Modeling -- 4.1.2 Chapter Overview -- 4.2 Previous Work in Military Workforce Planning and Manpower Modeling -- 4.3 Mathematical Model Classes -- 4.3.1 Dynamic Programming -- 4.3.2 Markov Decision Models -- 4.3.3 Goal Programming -- 4.3.4 Statistical Models -- 4.4 Retaining Quality and Talent Management -- 4.5 Case Studies -- 4.5.1 Military Medical Workforce Planning -- 4.5.2 Grade Plate Roll-Down -- 4.6 Future Work in Military Workforce Planning and Manpower Modeling -- Appendix -- References -- Chapter 5 Military Assessments -- 5.1 Introduction -- 5.1.1 Assessments in the Department of Defense -- 5.1.2 What Assessments Are and Why Assessments Are Important -- 5.1.3 The Importance of Objectives -- 5.1.4 A Generalized Framework for Assessments -- 5.2 Campaign Assessments -- 5.2.1 Purpose of Campaign Assessments -- 5.2.2 Process and Techniques -- 5.2.2.1 Theories of Change -- 5.2.2.2 Strategic Questions -- 5.2.2.3 Standards-Based Assessment -- 5.2.2.4 Written Risk Assessment -- 5.3 Operations Assessments -- 5.3.1 Purpose of Operations Assessments -- 5.3.2 Process and Techniques -- 5.4 Training Assessments -- 5.4.1 Purpose of Training Assessments -- 5.4.2 Techniques for Training Assessments -- 5.4.2.1 Observation Reports -- 5.4.2.2 Focus Groups and Interviews -- 5.4.2.3 Daily Summary Reports -- 5.4.2.4 Surveys -- 5.4.3 Summary Report Data and Data Mining -- 5.4.3.1 Frequency Plots.
505 8 _a5.4.3.2 Sentiment Analysis -- 5.4.3.3 Word Correlations -- 5.4.3.4 Clustering and Topic Models -- 5.5 Data Requirements -- 5.6 Assessment Process Pitfalls and Best Practices -- 5.6.1 Challenges and Pitfalls with Assessment -- 5.6.2 Best Practices -- 5.7 Conclusion -- Notes -- References -- Chapter 6 Threatcasting in a Military Setting -- 6.1 Introduction -- 6.2 Emerging Need for Foresight -- 6.3 Definition of Threatcasting -- 6.3.1 Phase Zero -- 6.3.2 Phase One -- 6.3.3 Phase Two -- 6.3.4 Phase Three -- 6.3.5 Phase Four -- 6.4 Supply Chains Defined by Industry and the Military -- 6.5 Threatcasting Applied in Industry -- 6.6 Threatcasting Applied to the Military -- 6.7 Implications for Design -- 6.8 Conclusion -- References -- Chapter 7 Analytical Modeling of Stochastic Systems -- 7.1 Introduction -- 7.2 Discrete Event Simulation -- 7.2.1 Advantages -- 7.2.2 Disadvantages -- 7.3 Analytical Models -- 7.3.1 Markov Chains -- 7.3.2 Queuing Models -- 7.3.3 Advantages -- 7.3.4 Disadvantages -- 7.4 A Comparison of Simulation and Analytical Models -- 7.5 A Markov Model of a Tank Meeting Engagement -- 7.6 A Queuing Model of Small Unmanned Aircraft Employment -- 7.7 The Impact of the Exponential Assumption -- 7.8 Conclusion -- References -- Chapter 8 Modern Methods for Characterization of Social Networks through Network Models -- 8.1 Introduction -- 8.1.1 Social Network Analysis Background: A Historical Perspective -- 8.1.2 Emergence of Quantitative Approaches to Social Network Analysis -- 8.2 Characterization of a Network -- 8.2.1 Graph Properties -- 8.2.2 Random Graph Generating Models -- 8.2.2.1 Mixtures of Random Graph Generating Models -- 8.2.3 Network Model Summary -- 8.3 Methods to Assess the Accuracy of a Network Model -- 8.3.1 Graph Matching -- 8.3.2 Graph Classification -- 8.3.3 Summary Graph Matching and Graph Classification.
505 8 _a8.4 Statistical Testing Methods -- 8.4.1 Summary of Statistical Testing Methods -- 8.5 Future Directions -- References -- Chapter 9 Process Optimization through Structured Problem Solving -- 9.1 Introduction -- 9.2 The Life Cycle of a Process -- 9.3 The Anatomy of a Process -- 9.4 A Structured Approach to Problem-Solving -- 9.5 It All Starts with a Champion and a Charter to Improve -- 9.5.1 Step 1: Clarify and Validate the Problem -- 9.5.2 Step 2: Break Down the Problem and Identify Performance Gaps -- 9.5.3 Step 3: Set an Improvement Target -- 9.5.4 Step 4: Determine Root Causes -- 9.5.5 Step 5: Developing Countermeasures -- 9.5.6 Step 6: See Countermeasures Through -- 9.5.7 Step 7: Confirm Results and Process -- 9.5.8 Step 8: Standardize Successful Processes -- 9.6 Summary -- References -- Chapter 10 Simulation Optimization -- 10.1 Introduction -- 10.2 Simulation Optimization Methodology and Literature -- 10.2.1 Simulation -- 10.2.2 Optimization -- 10.2.3 Simulation Optimization -- 10.2.4 Solving Simulation Optimization Problems -- 10.2.5 Applications in the Literature -- 10.3 Military Problem - Missile Plans That Maximize Damage to an Airfield -- 10.3.1 Example Scenario -- 10.3.2 Warhead Types and Accuracy -- 10.3.3 Air and Missile Defense Simulation -- 10.3.4 Runway Damage Simulation -- 10.3.5 Airfield Damage Simulation -- 10.4 Solving the Military Problem Using Simulation Optimization -- 10.4.1 Optimization Program -- 10.4.2 Simulation Optimization Test Cases -- 10.4.3 Simulation Optimization Results -- 10.5 Conclusion -- References -- Chapter 11 Analytical Test Planning for Defense Acquisitions -- 11.1 Introduction: Why Test and Why Test Using Scientific Test and Analysis Techniques? -- 11.2 The Demand Signal for Testing -- 11.3 Developing an Effective STAT test strategy -- 11.3.1 Plan: Understanding Requirements.
505 8 _a11.3.2 Plan: Define Design Space -- 11.3.3 Test Design -- 11.3.4 Test Execution -- 11.3.5 Test Analysis -- 11.4 Design of Experiments Application -- 11.5 Why STAT? -- 11.6 Conclusions and Bringing it all Together -- References -- Section II Soft Skills and Client Relations -- Chapter 12 Why Won't They Use Our Model? -- 12.1 Introduction -- 12.2 What Went Wrong? -- 12.3 Conceptual Models of the Reaction to Technological Change -- 12.4 Are There Resistance-Prone Changes? -- 12.5 The System-Task-Person (STP) Framework -- 12.6 Supply Ship Scheduling in the US Navy -- 12.7 The State Space Framework -- 12.7.1 Motivating Users to Move to Acceptance and Adoption -- 12.8 Anticipating Negative Reactions to the Implementation of a New Model -- 12.8.1 Use the STP Framework to Understand the Change -- 12.8.2 Use the State Space Framework to Observe Stakeholders -- 12.9 Summary -- References -- Chapter 13 From BOGSAT to TurboTeam: Collaboration for National Security Teams in the Age of Analytics -- 13.1 From BOGSAT to TurboTeam: Analytic Collaboration Comes of Age -- 13.2 Deciding -- 13.2.1 From Pros and Cons to Value Trees -- 13.2.1.1 Ben Franklin Weighs the Pros and Cons -- 13.2.1.2 Planting a Value Tree -- 13.2.2 From Roadmaps to Strategy Trees -- 13.2.2.1 Highway to the Danger Zone -- 13.2.2.2 Swinging from the Strategy Trees -- 13.3 Diagnosing -- 13.3.1 From Fishbones to Fault Trees -- 13.3.1.1 Choking on Fishbones -- 13.3.1.2 Finding Fault Trees -- 13.3.2 From Causal Diagrams to Bayesian Networks -- 13.3.2.1 Colliders and Confounders -- 13.3.2.2 Diagnosis with Bayesian Networks -- 13.4 Designing -- 13.4.1 From Flowcharts to Queueing Networks -- 13.4.1.1 When Flows Back Up -- 13.4.1.2 Jumping into Test Beds -- 13.4.2 From Knapsacks to Portfolios -- 13.4.2.1 Hiking through the Desert -- 13.4.2.2 Learning to Play Football -- 13.5 Lessons Learned -- References.
505 8 _aSection III Applications.
520 _aThe Handbook of Military and Defense Operations Research presents the voices leading OR and analytics to new heights in security through research, practical applications, case studies, and lessons learned in the field.
588 _aDescription based on publisher supplied metadata and other sources.
590 _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 0 _aMilitary art and science.
655 4 _aElectronic books.
700 1 _aHoward, II, James P.
776 0 8 _iPrint version:
_aScala, Natalie M.
_tHandbook of Military and Defense Operations Research
_dMilton : CRC Press LLC,c2020
_z9781138607330
797 2 _aProQuest (Firm)
830 0 _aChapman and Hall/CRC Series in Operations Research Series
856 4 0 _uhttps://ebookcentral.proquest.com/lib/orpp/detail.action?docID=6038735
_zClick to View
999 _c16059
_d16059