Cyber-attackers exploit people, processes, and technologies to steal high-value organizational data. The corresponding attacks are complex, cost organizations millions of dollars to resolve, and require rapid-response, architecture-based mitigation. Consequently, Cybersecurity strategies that...
This study is inspired by the current tendencies of technological changes. The main purpose of this study is to analyze the factors that impact the generation of change requirements, methods of measuring those changes and the impact of those changes on the evolution of a system. Although many...
Knowledge Management (KM) has been globally adopted by many enterprises and small teams to garner the benefits of identifying and organizing intellectual capital and enabling collaboration and innovation. Research and developments within KM is continuous which enhance practices to current users...
Managing multiple projects (MMP) is a current trend in project management. Thistype of management has become common in many industries, particularly in the oil andgas industry. It is not easy for one project manager to manage multiple projectssimultaneously and effectively. To date, there has...
The ISO 9000 family of standards, first issued in 1987, has been accepted as the worldwide standard for quality management systems, having more than one million companies, representing 178 countries, registered to it as of 2009. Companies implement this standard either voluntarily and...
A multi-objective energy efficient and flexible data center design has been of interest for all in the industry that are familiar with data center costs. A survey of 416 CIO's conducted by the CIO Data center Strategies Survey, suggested that the data center operating costs are steady at 25% of...
The purpose of this study was to propose an effective knowledge elicitation method and representation scheme that empowers humanitarian assistance/disaster relief (HA/DR) analysts and experts to create analytic models without the aid of data scientists and methodologists while addressing the...
The majority of aviation accidents are caused by human error. Augmentedcognition and automation systems enhance pilot performance by evaluatingsystem limitations and flight precision and performance. This study examines thehuman-machine interface in cockpit design using the tenets of...
Over the last several decades the technology revolution has compounded system complexity with the integration of multi-spectral sensors and interactive command and control systems. These complexities create additional challenges for requirement developers to produce an encompassing set of...
While system complexity is on the rise across many product lines, the resources required to successfully design and implement complex systems remain constrained. Because financiers of complex systems development efforts actively monitor project implementation cost, project performance models are...
Cloud computing offers the advantage of on-demand, reliable and cost efficient computing solutions without the capital investment and management resources to build and maintain in-house data centers and network infrastructures. Scalability of cloud solutions enable consumers to upgrade or...
There are significant challenges involved in regulating the growing commercial human spaceflight industry. The safety of the crew and passengers should be protected; however, care should be taken not to overburden the industry with too many or too stringent, or perhaps inapplicable,...
PurposeThe purpose of this paper is to explore how the application of Systems Engineering tools and techniques can be applied to rapidly process and analyze the vast amounts of data present in social media in order to yield practical knowledge for Command and Control (C2)...
Functionality and performance have been key elements of requirements generation for major systems, especially within the Department of Defense (DoD). However, rising cost growth rates and decreasing funding has led to legislation requiring DoD to factor cost into requirements selection and to...
Risk identification is the most important step in the risk management process because risks that are unidentified are implicitly assumed and unmanaged. Projects face the challenge of increasing complexity and uncertainty. Risk management has taken advantage of powerful quantitative tools to...
Effects of Geographic and Demographic Dispersion on the Performance of Systems Engineering TeamsGlobalization and the increasing complexity of systems require collaboration across multidisciplinary teams. Systems Engineering (SE) teams are often geographically and demographically dispersed; such...
Exhaustion of current version of Internet Protocol version 4 (IPv4) addresses initiated development of next-generation Internet Protocol version 6 (IPv6) [82, 83]. IPv6 is acknowledged to provide more address space, better address design, and greater security; however, IPv6 and IPv4 are not fully...
Universities are havens for research development, with access to facilities, equipment, and, most importantly, people; idea exchange and knowledge development create an environment that is conducive to the growth of research productivity. The outcome of this productivity is contingent upon the...
Department of Defense (DoD) leadership released the Better Buying Power initiatives to help DoD do more with less. A key tenet of these initiatives is to increase small business roles in DoD contracting opportunities. Reasons for increasing small business opportunities include promoting...
Every year, the Department of Defense (DoD) invests billions of dollars on the development of major defense acquisition programs. In return, many of these weapon systems have been plagued with cost overruns and schedule delays during the Engineering and Manufacturing Development phase. Under...