Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
12
result(s) for
"Stracener, Jerrell"
Sort by:
Investigating the Role of System Effectiveness in the Acquisition and Sustainment of U.S. Defense Systems: 1958 to 2022
2022
This paper reports the results of an investigation into system effectiveness’s role in acquiring and sustaining U.S. weapons systems from 1958 to 2022. An understanding is vital because the acquisition system has recently undergone a significant change. In the 64 year period covered by this study there have been many changes to the Department of Defense acquisition and sustainment processes. The investigation used three qualitative methods: a structured literature review, a grounded theory analysis of the structured literature review, and a historiography of the initial grounded theory results. The research identified five epochs, the first two lasting approximately 22 years each. The last epoch is still in its early period. Each epoch corresponds to a change in the acquisition process. There are four conclusions. First, system effectiveness does not serve its original intent and purpose. Second, analysis of source documents provides insight into why system effectiveness plays a diminished role. Third, the original approach to system effectiveness may have relevance for today’s problems and challenges. Finally, an integrated research methodology is valuable for making sense of conflicting information spread over time.
Journal Article
Methodology for Selecting the Preferred Networked Computer System Solution for Dynamic Continuous Defense Missions
2018
This paper presents a methodology for addressing the challenges and opportunities in defining and selecting the preferred Networked Computer System (NCS) solution in response to specified United States Defense mission planning requirements. The identified set of mission requirements are aligned with existing computer system capabilities allowing them to be acquired and processed as candidates to be included as part of the preferred NCS solution. In performing the proper selection process, decision making process is required in being able to properly select the preferred NCS by utilizing associated models for analysis. The models will then be applied towards NCS mission planning in analyzing an NCS solution’s effectiveness in terms of operational availability, mission reliability, capability sustainment and lifecycle cost. The analysis and models were developed in response to the need to develop defense mission planning capability solutions by utilizing existing computer systems enabling the Department of Defense acquisition professionals to perform a practical approach in selecting and defining the preferred NCS for satisfying a mission.
Journal Article
Performance assessments of iris recognition in tactical biometric devices
by
Matey, James R
,
Stracener, Jerrell T
,
Faddis, Kelly N
in
Access control
,
Algorithms
,
Applied sciences
2013
Tactical biometric devices are used to establish the identity of individuals of interest in various military and law-enforcement scenarios. Most testing of these devices has been conducted in laboratory settings rather than in operationally-realistic tactical scenarios. This study describes an experiment which can viably replace this paradigm by measuring the performance of handheld biometric devices in a variety of tactical environments. The experimental procedure assessed the collectability, quality and matchability of images collected in operationally-realistic scenarios. Iris recognition accuracy was measured using several commercial algorithms. Results illustrate performance degradation in operational results relative to laboratory results; the collection limitations of the devices in operationally-realistic settings; and the effects of operators, subjects, devices and environments on performance. The authors believe that this experiment is unique in its exploration of these elements and that the powerful results presented suggest a need for refinement of design and procurement criteria.
Journal Article
Approach for Acquiring Computer Systems to Satisfy Mission Capabilities
by
Tian, Jeff
,
Tolentino, Glenn
,
Stracener, Jerrell
in
Budgets
,
Computer science
,
Defense spending
2017
Defense Computer Systems developed and maintained over the years has resulted in thousands of disparate, compartmented, focused, and mission driven systems that are utilized daily for deliberate and crisis mission planning activities. The defense acquisition community is responsible for the development and sustainment of these systems over the course of its systems engineering lifecycle from conception, utilization, and eventually the decommissioning of these systems. While missions are being planned, and satisfied by existing computer systems, there are new missions being proposed which cannot be satisfied by a single existing computer system capability. Therefore, this raises the question whether a Networked Computer System (NCS) using combinations of existing and developmental computer systems is preferred in order to satisfy new capability requirements. This paper explores an approach in identifying a preferred NCS solution and determining the effectiveness in satisfying a mission.
Journal Article
Systems engineering-based tool for identifying critical research systems
2016
[...]of these technical and management process actions, the RSPO has adopted a multipronged institutional approach to managing the acquisition of key information required for support, improvement, and strategic planning for critical research activities. Research Administration Background Education, research, and services constitute the three major responsibilities of universities (Boyer, 1996). Because of the inherent complexity of optimizing and simultaneously balancing these three different mission areas, the resultant university structure that results from it is one that requires a critical, evolving, and well thought out management process.
Journal Article
System Autonomy Modeling During Early Concept Definition
2014
The current rapid systems engineering design methods, such as AGILE, significantly reduce the development time. This results in the early availability of incremental capabilities, increases the importance of accelerating and effectively performing early concept trade studies. Current system autonomy assessment tools are level based and are used to provide the levels of autonomy attained during field trials. These tools have limited applicability in earlier design definition stages. An algorithmic system autonomy tool is needed to facilitate trade off studies, analyses of alternatives and concept of operations performed during those very early phases. We developed our contribution to such a tool and described it in this paper.
Journal Article
Performance assessments of iris recognition in tactical biometric devices
by
Matey, James R
,
Stracener, Jerrell T
,
Faddis, Kelly N
in
Biometric recognition systems
,
Biometrics
,
Collection
2013
Tactical biometric devices are used to establish the identity of individuals of interest in various military and law-enforcement scenarios. Testing of these devices has been conducted in laboratory settings rather than in operationally-realistic tactical scenarios. This study describes an experiment which can viably replace this paradigm by measuring the performance of handheld biometric devices in a variety of tactical environments. The experimental procedure assessed the collectability, quality and matchability of images collected in operationally-realistic scenarios. Iris recognition accuracy was measured using several commercial algorithms. Results illustrate performance degradation in operational results relative to laboratory results; the collection limitations of the devices in operationally-realistic settings; and the effects of operators, subjects, devices and environments on performance. The authors believe that this experiment is unique in its exploration of these elements and that the powerful results presented suggest a need for refinement of design and procurement criteria.
Journal Article
Improving tactical biometric systems through the application of systems engineering
by
Matey, James R
,
Faddis, Kelly N
,
Stracener, Jerrell
in
Acceptance
,
Access control
,
Applied sciences
2013
To date, the impact of tactical biometric systems has been limited by designs driven by subsystem performance metrics and little consideration for the operational environment in which they are deployed. The design of these systems may be significantly improved by the application of systems engineering practices that consider these and other factors. This study discusses limitations of the current system design approach and proposes a methodology to improve designs. These improvements in design have the potential to dramatically increase the effectiveness and acceptance of biometric technologies in operational environments.
Journal Article
Report project for:QUEUING THEORYEMIS 7370: Probability and Statistics for Scientists and EngineersFall 2014
by
Alshehri, Wafaa
,
Stracener, Jerrell
in
التحليل الإحصائي
,
الدراسات الهندسية
,
المشروعات الهندسية
2019
The queuing theory deals with the most undesirable lines on our life Undesirable. We experience the queues in several parts on our life. For instance, we get into line at bank, supermarkets, salons, petrol stations, and public departments, and waste many minuets or can be hours by only waiting to be served. Moreover, there are several invisible queues that we see them only from the software and hardware system such as request by user into web service get into the queue until finish. The goals of this paper to know how implementing of the queuing theory in multiple places could increase the efficiency of the work system that can effect positively the profits by decreasing the waiting time in the queues. Introduction Historically, the queuing theory was raised by Agenr Krarup Erlang when he treated congestion problems in the beginning of 20th century. His work was an inspiration to many engineers to implement the queuing theory to deal with the queuing problems .After that results of the queuing theory have been used in many sides such as operation research, traffic engineering, and computer science. The organization that care of business profits and clients can be provided as queuing theory. The queuing theory is the mathematical study of reducing waiting lines. We can predict the time and the length of queues by using the queuing theory. Hence, using the queuing theory has become fundamental part of many business sectors. Considerable body of entrepreneurs or the responsible of the work system have shown that queuing theory can be useful in real business world by setting the balance between the capacity problems against the productivity and services. Moreover, it manages losing sales, customers, and money due to the waiting time. Reducing the waiting time, and providing appropriate service to clients in short period are important elements that should be considered for any service provider. In many stores and public department, management has tried to minimize the frustration of customers by increasing the speed of the checkout and cashier lines. How to implement the queuing theory? There are two elements to deal with. They are service time and arrivals rate. Each of those elements must be collected and applied to the theory. The theory aims to generate a simple model that helps maximize service time and increase customer satisfaction. This paper will apply the queuing theory to development the system work, the capacity of production, and increasing the profits as an attempt to make it better and better. Thus, we need model to analyze such situations
Journal Article