Military Operations Research最新文献

筛选
英文 中文
A game theoretic model of strategic conflict in cyberspace 网络空间战略冲突的博弈模型
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2014-03-01 DOI: 10.5711/1082598319105
Harrison C. Schramm, D. Alderson, W. Carlyle, N. Dimitrov
{"title":"A game theoretic model of strategic conflict in cyberspace","authors":"Harrison C. Schramm, D. Alderson, W. Carlyle, N. Dimitrov","doi":"10.5711/1082598319105","DOIUrl":"https://doi.org/10.5711/1082598319105","url":null,"abstract":"Schramm was sponsored by Office of Naval Intelligence N2N6CS, 4251 Suitland Road, Washington, D.C. 20395","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"19 1","pages":"5-17"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
False Targets in Defending Systems against Two Sequential Attacks 防范系统连续两次攻击的错误目标
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2014-03-01 DOI: 10.5711/1082598319119
G. Levitin, K. Hausken, H. B. Haim
{"title":"False Targets in Defending Systems against Two Sequential Attacks","authors":"G. Levitin, K. Hausken, H. B. Haim","doi":"10.5711/1082598319119","DOIUrl":"https://doi.org/10.5711/1082598319119","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"19 1","pages":"19-35"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Semi-Supervised Approach to Predictive Analysis Using Temporal Data 基于时间数据的半监督预测分析方法
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2014-03-01 DOI: 10.5711/1082598319137
Kimberly N Shenk, D. Bertsimas, N. Markuzon
{"title":"Semi-Supervised Approach to Predictive Analysis Using Temporal Data","authors":"Kimberly N Shenk, D. Bertsimas, N. Markuzon","doi":"10.5711/1082598319137","DOIUrl":"https://doi.org/10.5711/1082598319137","url":null,"abstract":"redicting a target event from temporal data using supervised learning alone presents a number of chal-lenges. It assumes that members falling into the same class have similar historical characteristics, which is a too strong an assump-tion. Additionally, it can be difficult for the algorithm to underline the differences from a large volume of data and multitude of temporal projections. In such situations, a combination of supervised and unsupervised learning proved to be superior in performance as compared to supervised learning alone. In the proposed methodology, we develop feature vectors of temporal events that are subsequently split into groups by similarity of spatio-temporal characteristics using a clustering algorithm. We then apply a supervised learning methodology to predict the class within each of these subpopulations. We show a dramatic improvement in predictive power of this joint methodology as compared to supervised learning alone. The case study that we use to demonstrate the methodology utilizes medical claims data to predict a patient’s short-term risk of myocardial infarction. In particular, we identify groups of people with temporal diagnostic patterns associated with a high-risk of myocardial infarction in the coming three months. We use these patterns as a profile reference for assessing the state of new patients. We demonstrate that the newly developed combined approach yields improved predictions for myocardial infarction over using classification alone.","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"19 1","pages":"37-50"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Military Operations Research Society (MORS) Oral History Project Interview of Mr. Arthur Stein and Dr. Annette Stein 美国军事行动研究学会(MORS)口述历史项目访谈Arthur Stein先生和Annette Stein博士
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2014-03-01 DOI: 10.5711/1082598319169
E. P. Visco
{"title":"Military Operations Research Society (MORS) Oral History Project Interview of Mr. Arthur Stein and Dr. Annette Stein","authors":"E. P. Visco","doi":"10.5711/1082598319169","DOIUrl":"https://doi.org/10.5711/1082598319169","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"19 1","pages":"69-99"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Flight Time Approximation Model for Unmanned Aerial Vehicles: Estimating the Effects of Path Variations and Wind 无人机的飞行时间近似模型:估计路径变化和风的影响
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2014-03-01 DOI: 10.1002/9781118918937.CH6
M. Henchey, R. Batta, M. Karwan, A. Crassidis
{"title":"A Flight Time Approximation Model for Unmanned Aerial Vehicles: Estimating the Effects of Path Variations and Wind","authors":"M. Henchey, R. Batta, M. Karwan, A. Crassidis","doi":"10.1002/9781118918937.CH6","DOIUrl":"https://doi.org/10.1002/9781118918937.CH6","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"100 ","pages":"95-117"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/9781118918937.CH6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50733959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The In-Transit Vigilant Covering Tour Problem of Routing Unmanned Ground Vehicles 覆盖无人地面车辆路线的途中警戒问题
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2013-12-01 DOI: 10.1002/9781118918937.CH2
H. Tan
{"title":"The In-Transit Vigilant Covering Tour Problem of Routing Unmanned Ground Vehicles","authors":"H. Tan","doi":"10.1002/9781118918937.CH2","DOIUrl":"https://doi.org/10.1002/9781118918937.CH2","url":null,"abstract":"Abstract : The routing of unmanned ground vehicles for the surveillance and protection of key installations is modeled as a new variant of the Covering Tour Problem (CTP). The CTP structure provides both the routing and target sensing components of the installation protection problem. Our variant is called the in-transit Vigilant Covering Tour Problem (VCTP) and considers not only the vertex cover but also the additional edge coverage capability of the unmanned ground vehicle while sensing in-transit between vertices. The VCTP is formulated as a Traveling Salesman Problem (TSP) with a dual set covering structure involving vertices and edges. An empirical study compares the performance of the VCTP against the CTP on test problems modified from standard benchmark TSP problems to apply to the VCTP. The VCTP performed generally better with shorter tour lengths but at higher computational cost.","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"181 ","pages":"5-18"},"PeriodicalIF":0.7,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/9781118918937.CH2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50734330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Model of “Evil” for Course of Action Analysis 行动过程分析中的“恶”模型
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2013-12-01 DOI: 10.5711/1082598318461
G. S. Reed, Greg B. Tackett
{"title":"A Model of “Evil” for Course of Action Analysis","authors":"G. S. Reed, Greg B. Tackett","doi":"10.5711/1082598318461","DOIUrl":"https://doi.org/10.5711/1082598318461","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"18 1","pages":"61-76"},"PeriodicalIF":0.7,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulation and Analysis of Mobile Ad hoc Network Technology in the US Marine Corps Infantry Battalion 美国海军陆战队步兵营移动自组织网络技术仿真与分析
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2013-12-01 DOI: 10.5711/1082598318419
Paul J. Nicholas, J. Pepper, Carol I. Weaver, David Gibbons, M. Muratore
{"title":"Simulation and Analysis of Mobile Ad hoc Network Technology in the US Marine Corps Infantry Battalion","authors":"Paul J. Nicholas, J. Pepper, Carol I. Weaver, David Gibbons, M. Muratore","doi":"10.5711/1082598318419","DOIUrl":"https://doi.org/10.5711/1082598318419","url":null,"abstract":"A mobile ad hoc network (MANET) is an autonomous communications system of mobile nodes equipped with radio transmitters and receivers. This research explores three critical challenges faced by communications planners in employing MANET technology within the US Marine Corps infantry battalion. First, we examine and quantify the ability of MANETs to support communications between highly mobile units operating in potentially rugged terrain over long distances with relatively low-power radios. We also analyze the ability of MANETs to use intermediate nodes to overcome the inherent range limitations of higher frequencies. Finally, we consider the challenge of allocating bandwidth to MANET systems to enable sufficient throughput rates. To explore these challenges, we conduct a rigorous comparative analysis using various network simulation and optimization techniques. We develop a network formulation to model key aspects of communications systems, and then simulate and gauge network performance in environments ranging from low-fidelity, theoretical representations to realistic, high-fidelity combat scenarios. We quantify the benefit that MANETs can provide to tactical communications networks over traditional point-to-point networks. We also quantify the value of the use of unmanned aircraft systems (UASs) as airborne nodes in MANETs, a capability especially useful in communications scenarios involving rugged terrain and large distances. We also find that due to MANET fragility in high-loss environments, tactics may need to be modified to support the full use of MANET communications. To our knowledge, we are the first to rigorously examine and quantify the value of MANET technology within the Marine Corps infantry battalion.","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"18 1","pages":"19-35"},"PeriodicalIF":0.7,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using Social Network Analysis to Inform Stabilization Efforts 利用社会网络分析为稳定工作提供信息
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2013-12-01 DOI: 10.5711/1082598318437
Brandon J. Bernardoni, R. Deckro, M. Robbins
{"title":"Using Social Network Analysis to Inform Stabilization Efforts","authors":"Brandon J. Bernardoni, R. Deckro, M. Robbins","doi":"10.5711/1082598318437","DOIUrl":"https://doi.org/10.5711/1082598318437","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"18 1","pages":"37-60"},"PeriodicalIF":0.7,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Supervised Link Prediction in Social Networks with Positive and Unlabeled Examples 具有正样例和未标记样例的社会网络的监督链接预测
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2013-09-01 DOI: 10.5711/1082598318353
Phi Vu Tran
{"title":"Supervised Link Prediction in Social Networks with Positive and Unlabeled Examples","authors":"Phi Vu Tran","doi":"10.5711/1082598318353","DOIUrl":"https://doi.org/10.5711/1082598318353","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"15 1","pages":"53-62"},"PeriodicalIF":0.7,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信