Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158035
J. Buckingham, J. Bailey
The Army research laboratory (ARL) at White Sands Missile Range, New Mexico is developing a new weather information gathering resource to provide the Army with the capability to gather meteorological data from battlefield areas that are data sparse. This new resource deemed DAMTA (disposable, air-droppable, meteorological tower array) will consist of multiple individual meteorological towers which will be dispersed over selected battlefield locations by helicopter. They will collect and transmit weather data such as wind direction, wind speed, humidity, barometric pressure and temperature for up to 30 days. The authors received $100K to investigate the inclusion of imagery sensors on the DAMTA to enable users to see near real-time, remote images of the sky and horizon to assist in gathering weather information for mission planning. The project involved purchase, testing, analysis and selection of the best available off-the-shelf imagery sensors (cameras) to be integrated with the DAMTA.
{"title":"Imagery enhancement to meteorological collection platform","authors":"J. Buckingham, J. Bailey","doi":"10.1109/SIEDS.2003.158035","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158035","url":null,"abstract":"The Army research laboratory (ARL) at White Sands Missile Range, New Mexico is developing a new weather information gathering resource to provide the Army with the capability to gather meteorological data from battlefield areas that are data sparse. This new resource deemed DAMTA (disposable, air-droppable, meteorological tower array) will consist of multiple individual meteorological towers which will be dispersed over selected battlefield locations by helicopter. They will collect and transmit weather data such as wind direction, wind speed, humidity, barometric pressure and temperature for up to 30 days. The authors received $100K to investigate the inclusion of imagery sensors on the DAMTA to enable users to see near real-time, remote images of the sky and horizon to assist in gathering weather information for mission planning. The project involved purchase, testing, analysis and selection of the best available off-the-shelf imagery sensors (cameras) to be integrated with the DAMTA.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158021
E. V. Jones, V.J. Lyford, M. K. Qazi, N. J. Solan, Y. Y. Haimes
Virginia's Critical Infrastructure Protection (CLP) study implements risk assessment and management methodologies upon eight case studies located in the commonwealth of Virginia. Research was undertaken because of a growing national concern involving infrastructures that are so vital that their incapacity or destruction would jeopardize the security of the United States. Furthermore, the project's pertinence is palpable in the wake of 9-11. The report demonstrates the efficacy of the risk assessment and risk management methodologies and its output will be utilized in the development of a computer-based tool for use by Virginia Department of Transportation (VDOT) employees. The net result of the project's analysis extends beyond the immediate benefits of the risk management output generated by individual case studies. Rather, the analysis below helped highlight errors and highlight commonalities that will be utilized in the development of a more robust and more effective computer-based risk management tool.
{"title":"Virgina's critical infrastructure protection study","authors":"E. V. Jones, V.J. Lyford, M. K. Qazi, N. J. Solan, Y. Y. Haimes","doi":"10.1109/SIEDS.2003.158021","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158021","url":null,"abstract":"Virginia's Critical Infrastructure Protection (CLP) study implements risk assessment and management methodologies upon eight case studies located in the commonwealth of Virginia. Research was undertaken because of a growing national concern involving infrastructures that are so vital that their incapacity or destruction would jeopardize the security of the United States. Furthermore, the project's pertinence is palpable in the wake of 9-11. The report demonstrates the efficacy of the risk assessment and risk management methodologies and its output will be utilized in the development of a computer-based tool for use by Virginia Department of Transportation (VDOT) employees. The net result of the project's analysis extends beyond the immediate benefits of the risk management output generated by individual case studies. Rather, the analysis below helped highlight errors and highlight commonalities that will be utilized in the development of a more robust and more effective computer-based risk management tool.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128669091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158017
C. Hall, K. Lynch, B. Millard, M. Parks
We seek to apply the systems engineering process to one of West Point's Association of Graduates (AOG) fundraising project. The United States Military Academy (USMA) receives a substantial portion of its funding from the federal government, yet must look to outside sources to underwrite the cost of some projects. The proposed rugby center is one of these projects. USMA's rugby team consistently finishes within the top four schools in the nation, but it lacks an adequate training facility. We examine the process used to raise the money to fund such a facility. Fundraising is often thought of as an art, rather than a systematic process. Despite the delicate nature of fundraising, it can still benefit from a detailed systems engineering examination. We seek to bring together the art of fundraising and the mechanics of systems engineering to produce a better result.
{"title":"Army rugby center funding plan","authors":"C. Hall, K. Lynch, B. Millard, M. Parks","doi":"10.1109/SIEDS.2003.158017","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158017","url":null,"abstract":"We seek to apply the systems engineering process to one of West Point's Association of Graduates (AOG) fundraising project. The United States Military Academy (USMA) receives a substantial portion of its funding from the federal government, yet must look to outside sources to underwrite the cost of some projects. The proposed rugby center is one of these projects. USMA's rugby team consistently finishes within the top four schools in the nation, but it lacks an adequate training facility. We examine the process used to raise the money to fund such a facility. Fundraising is often thought of as an art, rather than a systematic process. Despite the delicate nature of fundraising, it can still benefit from a detailed systems engineering examination. We seek to bring together the art of fundraising and the mechanics of systems engineering to produce a better result.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128088734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158032
A.S. Bahora, T. Collins, S. Davis, S. Goknur, J. Kearns, T. Liễu, T. Nguyen, J. Zeng, B. Horowitz, S. Patek
The catastrophes of September 11, 2001 put Arlington County's emergency response system to the test. They revealed capabilities and limitations otherwise overlooked during previous standard emergency response assessments. There were three key issues in the response to 9/11 that are recurring in jurisdictions across the nation: 1) reliance on voice-oriented communications; 2) limited situational awareness; and 3) lack of interoperability. A concept of operations integrating current commercially available technology in a system designed for the emergency response coordinator addresses these issues. To visualize this concept, a graphical user interface that displays the required functionalities described in the concept of operations is presented. High-ranking emergency response personnel from Arlington County, Virginia have conveyed that this solution is, indeed, feasible. The next step towards implementation includes exploring peer-to-peer networks in integrating the technologies described.
{"title":"Integrated peer-to-peer applications for advanced emergency response systems. Part I. Concept of operations","authors":"A.S. Bahora, T. Collins, S. Davis, S. Goknur, J. Kearns, T. Liễu, T. Nguyen, J. Zeng, B. Horowitz, S. Patek","doi":"10.1109/SIEDS.2003.158032","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158032","url":null,"abstract":"The catastrophes of September 11, 2001 put Arlington County's emergency response system to the test. They revealed capabilities and limitations otherwise overlooked during previous standard emergency response assessments. There were three key issues in the response to 9/11 that are recurring in jurisdictions across the nation: 1) reliance on voice-oriented communications; 2) limited situational awareness; and 3) lack of interoperability. A concept of operations integrating current commercially available technology in a system designed for the emergency response coordinator addresses these issues. To visualize this concept, a graphical user interface that displays the required functionalities described in the concept of operations is presented. High-ranking emergency response personnel from Arlington County, Virginia have conveyed that this solution is, indeed, feasible. The next step towards implementation includes exploring peer-to-peer networks in integrating the technologies described.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134243279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158038
D. Nguyen, A. Redd, B. Junko, D. Sanders, M. McGinnis
The U.S. Army is undergoing a transition in personnel, doctrine, and equipment as it postures itself to better support our nation in the upcoming years. We examine the personnel transformation aspect, and in particular the scheduling and synchronization of unit manning. We address the need for change, the proposed format of those solutions, and the insights developed while constructing a scheduling tool to synchronize unit manning with rotational concepts and transformation.
{"title":"Scheduling and readiness considerations for a unit manning system","authors":"D. Nguyen, A. Redd, B. Junko, D. Sanders, M. McGinnis","doi":"10.1109/SIEDS.2003.158038","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158038","url":null,"abstract":"The U.S. Army is undergoing a transition in personnel, doctrine, and equipment as it postures itself to better support our nation in the upcoming years. We examine the personnel transformation aspect, and in particular the scheduling and synchronization of unit manning. We address the need for change, the proposed format of those solutions, and the insights developed while constructing a scheduling tool to synchronize unit manning with rotational concepts and transformation.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123496602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158037
S. Avula, Jinshan Tang, S. Acton
A novel algorithm for image retrieval is presented. The basic idea of the new algorithm is that the constituent segments of the images are used to retrieve images within a digital library. Image retrieval using segments is distinctive in that the local features of the image are used to retrieve the image instead of the typically utilized global features. In our algorithm, the given image is first segmented into dominant components and then the features of these components are extracted to perform retrieval. The features corresponding to each component are used to calculate the distance between components in the matching process. Each image is ranked based on the component wise distance measure with respect to the query component. One of the advantages of the algorithm is that, for a given retrieval image, the user can select a query segment with which to perform retrieval, thus it can satisfy different needs from different users.
{"title":"Image retrieval using segmentation","authors":"S. Avula, Jinshan Tang, S. Acton","doi":"10.1109/SIEDS.2003.158037","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158037","url":null,"abstract":"A novel algorithm for image retrieval is presented. The basic idea of the new algorithm is that the constituent segments of the images are used to retrieve images within a digital library. Image retrieval using segments is distinctive in that the local features of the image are used to retrieve the image instead of the typically utilized global features. In our algorithm, the given image is first segmented into dominant components and then the features of these components are extracted to perform retrieval. The features corresponding to each component are used to calculate the distance between components in the matching process. Each image is ranked based on the component wise distance measure with respect to the query component. One of the advantages of the algorithm is that, for a given retrieval image, the user can select a query segment with which to perform retrieval, thus it can satisfy different needs from different users.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123701581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158027
S. Donovan, T. Mahoney, N. Pelletier, M. Schmidt, M. Kwinn
The terrorist attacks of September 11, 2001 dramatically changed America's feeling of security. The American people called for stricter security standards on all flights. On November 19, 2001, President George W. Bush signed the Aviation and Transportation Security Act, establishing a new law. Under this new law, the transportation security administration (TSA) would be responsible for regulating all airport security throughout the US. Among other things, this law states that 100% of passenger baggage must be screened for explosives, weapons, and other harmful materials or objects at all federally regulated airports no later than December 31, 2002. We focus on using systems engineering to solve the problem of screening all passengers and luggage while maintaining smooth airport operations that satisfy the traveler.
{"title":"A systems approach to John Wayne airport security","authors":"S. Donovan, T. Mahoney, N. Pelletier, M. Schmidt, M. Kwinn","doi":"10.1109/SIEDS.2003.158027","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158027","url":null,"abstract":"The terrorist attacks of September 11, 2001 dramatically changed America's feeling of security. The American people called for stricter security standards on all flights. On November 19, 2001, President George W. Bush signed the Aviation and Transportation Security Act, establishing a new law. Under this new law, the transportation security administration (TSA) would be responsible for regulating all airport security throughout the US. Among other things, this law states that 100% of passenger baggage must be screened for explosives, weapons, and other harmful materials or objects at all federally regulated airports no later than December 31, 2002. We focus on using systems engineering to solve the problem of screening all passengers and luggage while maintaining smooth airport operations that satisfy the traveler.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122442161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158030
J. Davis, E. Hill, L. Spradley, M. Wright, W. Scherer, Y. Zhang
Current technology enables multifaceted federations to increase the availability of privileged information. Unfortunately, the availability of such information also significantly increases security risks. We present a system design for monitoring the security of an integrated public safety network called capital wireless integration network (CapWIN). CapWIN is a diverse mixture of public and private networks that share information in order to provide public safety and transportation services for metropolitan Washington, DC. It is imperative that the members of integrated systems such as CapWIN be aware of the security status of the other participants in order to anticipate security breaches and respond accordingly. As of now, there are few means by which the members of such systems can obtain real-time information pertaining to the security status of all other participating parties. The system presented here integrates these disparate agencies by utilizing existing security information available from each agency within the enterprise.
{"title":"Network security monitoring - intrusion detection","authors":"J. Davis, E. Hill, L. Spradley, M. Wright, W. Scherer, Y. Zhang","doi":"10.1109/SIEDS.2003.158030","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158030","url":null,"abstract":"Current technology enables multifaceted federations to increase the availability of privileged information. Unfortunately, the availability of such information also significantly increases security risks. We present a system design for monitoring the security of an integrated public safety network called capital wireless integration network (CapWIN). CapWIN is a diverse mixture of public and private networks that share information in order to provide public safety and transportation services for metropolitan Washington, DC. It is imperative that the members of integrated systems such as CapWIN be aware of the security status of the other participants in order to anticipate security breaches and respond accordingly. As of now, there are few means by which the members of such systems can obtain real-time information pertaining to the security status of all other participating parties. The system presented here integrates these disparate agencies by utilizing existing security information available from each agency within the enterprise.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117239264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158001
Y. Martínez, L.B. Valencia
Since 1994, the Colombian electricity market has been operating under a new structure. The Colombian government undertook a liberalization process, and trading activity was created. The traders face not only increasing competition, but also high-risk levels due to factors not considered previously. In the trading system, the agents are implicitly undertaking the risk associated with market variations and are demanding for new procedures to manage risk. This is an initial attempt to introduce an existing financial methodology (portfolio theory) to develop a risk management strategy for the electricity trading in Colombia which was developed in three steps.
{"title":"Portfolio theory based approach to risk management in electricity markets: Colombian case study","authors":"Y. Martínez, L.B. Valencia","doi":"10.1109/SIEDS.2003.158001","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158001","url":null,"abstract":"Since 1994, the Colombian electricity market has been operating under a new structure. The Colombian government undertook a liberalization process, and trading activity was created. The traders face not only increasing competition, but also high-risk levels due to factors not considered previously. In the trading system, the agents are implicitly undertaking the risk associated with market variations and are demanding for new procedures to manage risk. This is an initial attempt to introduce an existing financial methodology (portfolio theory) to develop a risk management strategy for the electricity trading in Colombia which was developed in three steps.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115105060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2003-04-24DOI: 10.1109/SIEDS.2003.158040
S. O. DeLong, C.T. Speegle
The "intelligent power plant project" (IPPP) is an interdisciplinary capstone project consisting of systems engineering, mechanical engineering and computer science students from the United States Military Academy at West Point. In order to maximize power plant efficiency and ultimately reduce costs, we designed a computer system to acquire and process data in order to provide an optimal operating method for the West Point cogeneration power plant (WPCPP). Neural networks provided the framework for the intelligent power plant analysis tool (IPPAT). When coupled with a graphical user interface (GUI), IPPAT allows the plant operator to analyze the power plant, monitor predictions, control the plant in an optimal manner, and provide the supervisor with information assurance. The systems approach used to solve this problem and the subsequent challenges of managing an interdisciplinary capstone team will be discussed here.
{"title":"Applying the systems methodology in the design of the West Point cogeneration power plant","authors":"S. O. DeLong, C.T. Speegle","doi":"10.1109/SIEDS.2003.158040","DOIUrl":"https://doi.org/10.1109/SIEDS.2003.158040","url":null,"abstract":"The \"intelligent power plant project\" (IPPP) is an interdisciplinary capstone project consisting of systems engineering, mechanical engineering and computer science students from the United States Military Academy at West Point. In order to maximize power plant efficiency and ultimately reduce costs, we designed a computer system to acquire and process data in order to provide an optimal operating method for the West Point cogeneration power plant (WPCPP). Neural networks provided the framework for the intelligent power plant analysis tool (IPPAT). When coupled with a graphical user interface (GUI), IPPAT allows the plant operator to analyze the power plant, monitor predictions, control the plant in an optimal manner, and provide the supervisor with information assurance. The systems approach used to solve this problem and the subsequent challenges of managing an interdisciplinary capstone team will be discussed here.","PeriodicalId":256790,"journal":{"name":"IEEE Systems and Information Engineering Design Symposium, 2003","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127260062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}