Harrison C. Schramm, D. Alderson, W. Carlyle, N. Dimitrov
Schramm was sponsored by Office of Naval Intelligence N2N6CS, 4251 Suitland Road, Washington, D.C. 20395
施拉姆是由海军情报办公室N2N6CS赞助的,地址是华盛顿特区苏特兰路4251号20395
{"title":"A game theoretic model of strategic conflict in cyberspace","authors":"Harrison C. Schramm, D. Alderson, W. Carlyle, N. Dimitrov","doi":"10.5711/1082598319105","DOIUrl":"https://doi.org/10.5711/1082598319105","url":null,"abstract":"Schramm was sponsored by Office of Naval Intelligence N2N6CS, 4251 Suitland Road, Washington, D.C. 20395","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"19 1","pages":"5-17"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"False Targets in Defending Systems against Two Sequential Attacks","authors":"G. Levitin, K. Hausken, H. B. Haim","doi":"10.5711/1082598319119","DOIUrl":"https://doi.org/10.5711/1082598319119","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"19 1","pages":"19-35"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
redicting a target event from temporal data using supervised learning alone presents a number of chal-lenges. It assumes that members falling into the same class have similar historical characteristics, which is a too strong an assump-tion. Additionally, it can be difficult for the algorithm to underline the differences from a large volume of data and multitude of temporal projections. In such situations, a combination of supervised and unsupervised learning proved to be superior in performance as compared to supervised learning alone. In the proposed methodology, we develop feature vectors of temporal events that are subsequently split into groups by similarity of spatio-temporal characteristics using a clustering algorithm. We then apply a supervised learning methodology to predict the class within each of these subpopulations. We show a dramatic improvement in predictive power of this joint methodology as compared to supervised learning alone. The case study that we use to demonstrate the methodology utilizes medical claims data to predict a patient’s short-term risk of myocardial infarction. In particular, we identify groups of people with temporal diagnostic patterns associated with a high-risk of myocardial infarction in the coming three months. We use these patterns as a profile reference for assessing the state of new patients. We demonstrate that the newly developed combined approach yields improved predictions for myocardial infarction over using classification alone.
{"title":"Semi-Supervised Approach to Predictive Analysis Using Temporal Data","authors":"Kimberly N Shenk, D. Bertsimas, N. Markuzon","doi":"10.5711/1082598319137","DOIUrl":"https://doi.org/10.5711/1082598319137","url":null,"abstract":"redicting a target event from temporal data using supervised learning alone presents a number of chal-lenges. It assumes that members falling into the same class have similar historical characteristics, which is a too strong an assump-tion. Additionally, it can be difficult for the algorithm to underline the differences from a large volume of data and multitude of temporal projections. In such situations, a combination of supervised and unsupervised learning proved to be superior in performance as compared to supervised learning alone. In the proposed methodology, we develop feature vectors of temporal events that are subsequently split into groups by similarity of spatio-temporal characteristics using a clustering algorithm. We then apply a supervised learning methodology to predict the class within each of these subpopulations. We show a dramatic improvement in predictive power of this joint methodology as compared to supervised learning alone. The case study that we use to demonstrate the methodology utilizes medical claims data to predict a patient’s short-term risk of myocardial infarction. In particular, we identify groups of people with temporal diagnostic patterns associated with a high-risk of myocardial infarction in the coming three months. We use these patterns as a profile reference for assessing the state of new patients. We demonstrate that the newly developed combined approach yields improved predictions for myocardial infarction over using classification alone.","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"19 1","pages":"37-50"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Military Operations Research Society (MORS) Oral History Project Interview of Mr. Arthur Stein and Dr. Annette Stein","authors":"E. P. Visco","doi":"10.5711/1082598319169","DOIUrl":"https://doi.org/10.5711/1082598319169","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"19 1","pages":"69-99"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-01DOI: 10.1002/9781118918937.CH6
M. Henchey, R. Batta, M. Karwan, A. Crassidis
{"title":"A Flight Time Approximation Model for Unmanned Aerial Vehicles: Estimating the Effects of Path Variations and Wind","authors":"M. Henchey, R. Batta, M. Karwan, A. Crassidis","doi":"10.1002/9781118918937.CH6","DOIUrl":"https://doi.org/10.1002/9781118918937.CH6","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"100 ","pages":"95-117"},"PeriodicalIF":0.7,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/9781118918937.CH6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50733959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1002/9781118918937.CH2
H. Tan
Abstract : The routing of unmanned ground vehicles for the surveillance and protection of key installations is modeled as a new variant of the Covering Tour Problem (CTP). The CTP structure provides both the routing and target sensing components of the installation protection problem. Our variant is called the in-transit Vigilant Covering Tour Problem (VCTP) and considers not only the vertex cover but also the additional edge coverage capability of the unmanned ground vehicle while sensing in-transit between vertices. The VCTP is formulated as a Traveling Salesman Problem (TSP) with a dual set covering structure involving vertices and edges. An empirical study compares the performance of the VCTP against the CTP on test problems modified from standard benchmark TSP problems to apply to the VCTP. The VCTP performed generally better with shorter tour lengths but at higher computational cost.
{"title":"The In-Transit Vigilant Covering Tour Problem of Routing Unmanned Ground Vehicles","authors":"H. Tan","doi":"10.1002/9781118918937.CH2","DOIUrl":"https://doi.org/10.1002/9781118918937.CH2","url":null,"abstract":"Abstract : The routing of unmanned ground vehicles for the surveillance and protection of key installations is modeled as a new variant of the Covering Tour Problem (CTP). The CTP structure provides both the routing and target sensing components of the installation protection problem. Our variant is called the in-transit Vigilant Covering Tour Problem (VCTP) and considers not only the vertex cover but also the additional edge coverage capability of the unmanned ground vehicle while sensing in-transit between vertices. The VCTP is formulated as a Traveling Salesman Problem (TSP) with a dual set covering structure involving vertices and edges. An empirical study compares the performance of the VCTP against the CTP on test problems modified from standard benchmark TSP problems to apply to the VCTP. The VCTP performed generally better with shorter tour lengths but at higher computational cost.","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"181 ","pages":"5-18"},"PeriodicalIF":0.7,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/9781118918937.CH2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50734330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model of “Evil” for Course of Action Analysis","authors":"G. S. Reed, Greg B. Tackett","doi":"10.5711/1082598318461","DOIUrl":"https://doi.org/10.5711/1082598318461","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"18 1","pages":"61-76"},"PeriodicalIF":0.7,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paul J. Nicholas, J. Pepper, Carol I. Weaver, David Gibbons, M. Muratore
A mobile ad hoc network (MANET) is an autonomous communications system of mobile nodes equipped with radio transmitters and receivers. This research explores three critical challenges faced by communications planners in employing MANET technology within the US Marine Corps infantry battalion. First, we examine and quantify the ability of MANETs to support communications between highly mobile units operating in potentially rugged terrain over long distances with relatively low-power radios. We also analyze the ability of MANETs to use intermediate nodes to overcome the inherent range limitations of higher frequencies. Finally, we consider the challenge of allocating bandwidth to MANET systems to enable sufficient throughput rates. To explore these challenges, we conduct a rigorous comparative analysis using various network simulation and optimization techniques. We develop a network formulation to model key aspects of communications systems, and then simulate and gauge network performance in environments ranging from low-fidelity, theoretical representations to realistic, high-fidelity combat scenarios. We quantify the benefit that MANETs can provide to tactical communications networks over traditional point-to-point networks. We also quantify the value of the use of unmanned aircraft systems (UASs) as airborne nodes in MANETs, a capability especially useful in communications scenarios involving rugged terrain and large distances. We also find that due to MANET fragility in high-loss environments, tactics may need to be modified to support the full use of MANET communications. To our knowledge, we are the first to rigorously examine and quantify the value of MANET technology within the Marine Corps infantry battalion.
{"title":"Simulation and Analysis of Mobile Ad hoc Network Technology in the US Marine Corps Infantry Battalion","authors":"Paul J. Nicholas, J. Pepper, Carol I. Weaver, David Gibbons, M. Muratore","doi":"10.5711/1082598318419","DOIUrl":"https://doi.org/10.5711/1082598318419","url":null,"abstract":"A mobile ad hoc network (MANET) is an autonomous communications system of mobile nodes equipped with radio transmitters and receivers. This research explores three critical challenges faced by communications planners in employing MANET technology within the US Marine Corps infantry battalion. First, we examine and quantify the ability of MANETs to support communications between highly mobile units operating in potentially rugged terrain over long distances with relatively low-power radios. We also analyze the ability of MANETs to use intermediate nodes to overcome the inherent range limitations of higher frequencies. Finally, we consider the challenge of allocating bandwidth to MANET systems to enable sufficient throughput rates. To explore these challenges, we conduct a rigorous comparative analysis using various network simulation and optimization techniques. We develop a network formulation to model key aspects of communications systems, and then simulate and gauge network performance in environments ranging from low-fidelity, theoretical representations to realistic, high-fidelity combat scenarios. We quantify the benefit that MANETs can provide to tactical communications networks over traditional point-to-point networks. We also quantify the value of the use of unmanned aircraft systems (UASs) as airborne nodes in MANETs, a capability especially useful in communications scenarios involving rugged terrain and large distances. We also find that due to MANET fragility in high-loss environments, tactics may need to be modified to support the full use of MANET communications. To our knowledge, we are the first to rigorously examine and quantify the value of MANET technology within the Marine Corps infantry battalion.","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"18 1","pages":"19-35"},"PeriodicalIF":0.7,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Social Network Analysis to Inform Stabilization Efforts","authors":"Brandon J. Bernardoni, R. Deckro, M. Robbins","doi":"10.5711/1082598318437","DOIUrl":"https://doi.org/10.5711/1082598318437","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"18 1","pages":"37-60"},"PeriodicalIF":0.7,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supervised Link Prediction in Social Networks with Positive and Unlabeled Examples","authors":"Phi Vu Tran","doi":"10.5711/1082598318353","DOIUrl":"https://doi.org/10.5711/1082598318353","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"15 1","pages":"53-62"},"PeriodicalIF":0.7,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70948325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}