This document discusses developing a computational methodology to support decision making across all phases of the acquisition process. It aims to maximize the value delivered to warfighters while minimizing time and cost. The methodology incorporates data from testing and assessments to evaluate alternatives based on measures of effectiveness and performance. It also discusses prototypes for valuing specific systems like a camera and optimizing plug-and-play sensor configurations and portfolios based on threat assessments. The methodology aims to support valuation of individual components, systems-of-systems, and evolving needs.
August 25, 2015
COL Thomas A. Pugh, USA
Signal Commandant
U.S. Army Cyber Center of Excellence and Fort Gordon
This will provide an update from last year’s session of the US Army Signal School. The Signal Commandant will present the updated Signal School Lines of Effort and the current priorities and projects of the Signal School.
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
LTC Chris Wade, USA
The Office Chief of Cyber will provide a Cyber Personnel Overview focusing on the military occupational specialties (MOS) and areas of concentration (AOC) that enable Cyber Defensive and Offensive Operations.
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
August 25, 2015
Col. Stephen Elle, U.S. Army Cyber Center of Excellence & Fort Gordon
This discussion includes the new initiatives currently being designed such as the Future Leader Cyber Course, the Strategic Cyber Planners Course, and others. Additionally, the goal will be to ensure the materials prepared for the institutional and operational domain can also be used later for self-development.
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
Dale Manion and Phil Sines.
The Office Chief of Signal (OCOS) provides the strategic human resources planning and career programs management for approximately 60,000 Signal Enlisted, Warrant Officer and Officer’s that are critical to mission success of the Department of Defense Information Network (DoDIN) Operations worldwide.
August 25, 2015
COL Thomas A. Pugh, USA
Signal Commandant
U.S. Army Cyber Center of Excellence and Fort Gordon
This will provide an update from last year’s session of the US Army Signal School. The Signal Commandant will present the updated Signal School Lines of Effort and the current priorities and projects of the Signal School.
Office Chief of Cyber Personnel Presentation: TechNet Augusta 2015AFCEA International
LTC Chris Wade, USA
The Office Chief of Cyber will provide a Cyber Personnel Overview focusing on the military occupational specialties (MOS) and areas of concentration (AOC) that enable Cyber Defensive and Offensive Operations.
The Importance of Educating the Force on Cyberspace Operations: TechNet Augus...AFCEA International
August 25, 2015
Col. Stephen Elle, U.S. Army Cyber Center of Excellence & Fort Gordon
This discussion includes the new initiatives currently being designed such as the Future Leader Cyber Course, the Strategic Cyber Planners Course, and others. Additionally, the goal will be to ensure the materials prepared for the institutional and operational domain can also be used later for self-development.
Office Chief of Signal Personnel Presentation: TechNet Augusta 2015AFCEA International
Dale Manion and Phil Sines.
The Office Chief of Signal (OCOS) provides the strategic human resources planning and career programs management for approximately 60,000 Signal Enlisted, Warrant Officer and Officer’s that are critical to mission success of the Department of Defense Information Network (DoDIN) Operations worldwide.
Cyber Operations in Smart Megacities: TechNet Augusta 2015AFCEA International
Eric Bassel
SANS Director
SANS Institute
There has been a great deal of research about the future of warfare and it seems clear that the US Military’s strategy is intimately tied to highly-interconnected Megacities where over 80% of the world’s population currently resides.
LTC Jonathan Long, USA
Assistant TRADOC Capability Manager for Network & Services (TCM N&S)
Capability Development Integration Directorate, U.S. Army Cyber Center of Excellence
Practical Challenges to Deploying Highly Automated VehiclesAlison Chaiken
Presentation by Dr. Steven Shladover of UC Berkeley on Jan 24, 2019 as part of the Silicon Valley Automotive Open Source meetup group speak series
https://www.meetup.com/Silicon-Valley-Automotive-Open-Source/events/256100027/
Elevator pitches from Digital Railways competition consortia building dayKTN
20 x 2-minute, 2-slide presentations made during a networking session by delegates at the Transport KTN's Digital Railways information and consortia-building day on 25th March 2013.
Pitches from:
Selex ES
Cranfield University
Zircon
Magellium
Humaware
Altran
CoreThree
University of Huddersfield
Bellrock Technology
Rethinking Transport
NarecSolar
RDS
Coventry University
Loughborough University
TSE-n Metro UK
Delta Rail
Royal College of Art
LetsJoin
EuroTech
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratusAli Kafel
This white paper makes the case for:
Why Resiliency Management Needs to be in the Software Infrastructure. It Covers:
- Fault Management and Resiliency Management
- Seamless Protection for Faster and Simpler Devl
- Multiple Levels of Availability
- Speed of Service Restoration & Redundancy Restoration
- State Management
- Demonstrating Carrier Grade Availability and Resiliency
Automotive embedded systems now include numerous software-intensive functions that are critical from a safety point of view (e.g., braking, assisted driving, etc). These functions are distributed on the Electronic Control Units and they need to exchange large amount of data with real-time constraints. In this context, the communication system plays a major role and it has to respect stringent dependability constraints. Security, especially with the widespread of wireless networks, is now becoming a serious matter of concern too. In this talk, we will review the main threats to dependability and security in automotive communication systems, the existing technical solutions to attain them, and, highlight areas where developments might be needed.
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
COL James P. Ross, USA
Military Deputy to the Armaments Research, Development and Engineering Center
Project Manager Tactical Radios
COL Michael J. Thurston, USA
Project Manager Mission Command
Cyber Operations in Smart Megacities: TechNet Augusta 2015AFCEA International
Eric Bassel
SANS Director
SANS Institute
There has been a great deal of research about the future of warfare and it seems clear that the US Military’s strategy is intimately tied to highly-interconnected Megacities where over 80% of the world’s population currently resides.
LTC Jonathan Long, USA
Assistant TRADOC Capability Manager for Network & Services (TCM N&S)
Capability Development Integration Directorate, U.S. Army Cyber Center of Excellence
Practical Challenges to Deploying Highly Automated VehiclesAlison Chaiken
Presentation by Dr. Steven Shladover of UC Berkeley on Jan 24, 2019 as part of the Silicon Valley Automotive Open Source meetup group speak series
https://www.meetup.com/Silicon-Valley-Automotive-Open-Source/events/256100027/
Elevator pitches from Digital Railways competition consortia building dayKTN
20 x 2-minute, 2-slide presentations made during a networking session by delegates at the Transport KTN's Digital Railways information and consortia-building day on 25th March 2013.
Pitches from:
Selex ES
Cranfield University
Zircon
Magellium
Humaware
Altran
CoreThree
University of Huddersfield
Bellrock Technology
Rethinking Transport
NarecSolar
RDS
Coventry University
Loughborough University
TSE-n Metro UK
Delta Rail
Royal College of Art
LetsJoin
EuroTech
ETSI NFV#13 NFV resiliency presentation - ali kafel - stratusAli Kafel
This white paper makes the case for:
Why Resiliency Management Needs to be in the Software Infrastructure. It Covers:
- Fault Management and Resiliency Management
- Seamless Protection for Faster and Simpler Devl
- Multiple Levels of Availability
- Speed of Service Restoration & Redundancy Restoration
- State Management
- Demonstrating Carrier Grade Availability and Resiliency
Automotive embedded systems now include numerous software-intensive functions that are critical from a safety point of view (e.g., braking, assisted driving, etc). These functions are distributed on the Electronic Control Units and they need to exchange large amount of data with real-time constraints. In this context, the communication system plays a major role and it has to respect stringent dependability constraints. Security, especially with the widespread of wireless networks, is now becoming a serious matter of concern too. In this talk, we will review the main threats to dependability and security in automotive communication systems, the existing technical solutions to attain them, and, highlight areas where developments might be needed.
Expeditionary Network Communications (Engagement Theater Session 3): TechNet ...AFCEA International
COL James P. Ross, USA
Military Deputy to the Armaments Research, Development and Engineering Center
Project Manager Tactical Radios
COL Michael J. Thurston, USA
Project Manager Mission Command
Defesa de Doutorado: HAMSTER - healthy, mobility and security-based data comm...Daniel Fernando Pigatto
Thesis is available at: http://www.teses.usp.br/teses/disponiveis/55/55134/tde-11072017-085511/en.php
Abstract:
Advances in communications have been unarguably essential to enable modern systems and applications as we know them. Ubiquity has turned into reality, allowing specialised embedded systems to eminent ly grow and spread. That is notably the case of unmanned vehicles which have been creatively explored on applications that were not as efficient as they currently are, neither as innovative as recently accomplished. Therefore, towards the efficient operation of either unmanned vehicles and systems they integrate, in addition to communication improvements, it is highly desired that we carefully observe relevant , correlated necessities that may lead to the full insertion of unmanned vehicles to our everyday lives. Moreover, by addressing these demands on integrated solutions, better results will likely be produced. This thesis presents HAMSTER, the HeAlthy, Mobility and Security based data communication archiTEctuRe for unmanned vehicles, which addresses three main types of communications: machine-to-machine, machine-to-infrastructure and internal machine communications. Four additional elements on co-related requirements are provided alongside with HAMSTER for more accurate approaches regarding security and safety aspects (SPHERE platform), criticality analysis (NCI index), energy efficiency (NP platform) and mobility-oriented ad hoc and infrastructured communications (NIMBLE platform). Furthermore, three specialised versions are provided: unmanned aerial vehicles (Flying HAMSTER), unmanned ground vehicles (Running HAMSTER) and unmanned surface/ underwater vehicles (Swimming HAMSTER). The architecture validation is achieved by case studies on each feature addressed, leading to guidelines on the development of vehicles more likely to meet certification requirements, more efficient and secure communications, assertive approaches regarding criticality and green approaches on internal communications. Indeed, results prove the efficiency and effectiveness of HAMSTER architecture and its elements, as well as its flexibility in carrying out different experiments focused on various aspects of communication, which helps researchers and developers to achieve safe and secure communications in unmanned vehicles.
Delphi Integrated Radar and Camera System (RACam) 2016 teardown reverse costi...Yole Developpement
Delphi is the first to provide a single system combining 76Ghz Radar and Vision Sensing. With a compact design the system can be integrated behind the windshield and enables a broad array of active safety features, as lane tracking, collision avoidance or adaptive cruise control.
The visual detection is performed by a 1/3” CMOS Image Sensor supplied by a leader in the CIS automotive industry. The sensor is surmounted by a specific 7-lens module and the Mobileye EyeQ3 SoC is used for video processing. Concerning the radar function, Receiver and Transmitter chips from Infineon using SiGe HBT technology are assembled by wire bonding on the RF Board. The Antenna board uses a PTFE-based substrate and is equipped with planar antennas for transmission and reception of the RF signals.
Based on a complete teardown analysis of the Delphi RACam, the report provides the bill-of-material (BOM) and the manufacturing cost of the system. The report also includes analysis of the Image Sensor and Lens module. A structural analysis, with a comparison with Bosch MRR1, highlights the technical choices in RF design made by Delphi.
A physical analysis and manufacturing cost estimation of the Infineon RF chips is available in a separate report, which also includes a comparison with MMICs used in the Bosch MRR1 Radar.
More information on that report at http://www.i-micronews.com/reports.html
Learn what formal methods are and how they make developing bug-free, impenetrable source code a possibility in this webinar by TrustInSoft, the leading provider of formal methods-based code analysis tools.
These are PPT slides presented for the announcement of the result of xDR Challenge 2018. This presentation was given at the special session "A survey on Indoor Localization Competitions" in IPIN 2018.
These are PPT slides presented for the announcement of the result of xDR Challenge 2018. This presentation was given at the special session "A survey on Indoor Localization Competitions" in IPIN 2018.
These are PPT slides presented for the announcement of the result of xDR Challenge 2018. This presentation was given at the special session "A survey on Indoor Localization Competitions" in IPIN 2018.
COSMOS:
DevOps for Complex Cyber-physical Systems
Sebastiano Panichella
Zurich University of Applied Sciences (ZHAW)
Workshop on Adaptive CPSoS (WASOS) 2023
WSO2 Machine Learner takes data one step further, pairing data gathering and analytics with predictive intelligence: this helps you understand not just the present, but to predict scenarios and generate solutions for the future.
PDO Predictive Analytics Share for the Annual Research Forum 2015Faris Al-Kharusi
The Research Council of Oman's Annual Research Forum invited the Real-Time Operations Team of PDO to speak about the progress so far and emerging trends. Author: Faris Al-Kharusi.
This deck has been reviewed by PDO for public domain share however all rights are reserved by the organization.
AFCEA Defense Health Agency (DHA) Brainstorming Session NotesAFCEA International
Results from a one day, invitation only non-attribution session to discuss DHA current information technology and related issues and brainstorm to generate a list of potential priorities
and focus areas for a new incoming CIO.
List of participating organizations:
AFCEA International
Booz Allen Hamilton
Deloitte
DLT Solutions
Hewlett Packard Enterprise
Microsoft
Mitre
Noblis
Price Waterhouse Coopers
Wells Analytics
Mike Novak
Tellabs
This session will focus on the underlying GPON (Gigabit Passive Optical Network) and All-Secure PON infrastructure, the implications to the Layer-1 design, using Armored Interlocking Fiber to deploy NIPR/SIPR data and voice requirements.
Paul Chernek
Deputy, TRADOC Capability Manager for Tactical Radios (TCM-TR)
Capability Development Integration Directorate, U.S. Army Cyber Center of Excellence
David Brown
Director of CyberTalent
SANS Institute
Jim Michaud
Director of HR Business Development
SANS Institute
The SANS Institute, in partnership with selected veteran-friendly employers, has established VetSuccess in Cybersecurity to match skilled U.S. military veterans with today’s most compelling cybersecurity-related jobs.
Defending Your Base of Operations: How Industrial Control Systems are Being T...AFCEA International
Mike Assante
Lead for Training for ICS and SCADA
SANS Industrial Control
We are used to taking the fight to the enemy, but we are entering into an age where it is expected that the enemy will be doing the same.
Expeditionary Network Communications: Engagement Theater Session 3 at TechNet...AFCEA International
August 25, 2015
COL James P. Ross, USA
Military Deputy to the Armaments Research, Development and Engineering Center
Project Manager Tactical Radios
COL Michael J. Thurston, USA
Project Manager Mission Command
Key highlights include how developers have implemented Soldier feedback into improved operational network capability, fielding priorities for Army network Capability Set efforts, and discussion of needed technology to enhance these capabilities.
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOChristina Parmionova
The 2024 World Health Statistics edition reviews more than 50 health-related indicators from the Sustainable Development Goals and WHO’s Thirteenth General Programme of Work. It also highlights the findings from the Global health estimates 2021, notably the impact of the COVID-19 pandemic on life expectancy and healthy life expectancy.
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
2. Topics
• DoD acquisition: beyond the horse blanket
• Acquisition key elements technical approach
• Valuation first steps: WFPAC prototype
• Plug-n-play portfolio first steps: VIR prototype
• Acquisition valuation R&D
2
3. DoD Acquisition Horse Blanket
3
INTEGRATED DEFENSE AT&L LIFE CYCLE MANAGEMENT CHART
https://dap.dau.mil 5/26/2010
4. DoD Acquisition On DoDI 5000.02
4www.acq.osd.mil/fo/docs/DSD%205000.02_Memo+Doc.pdf
“…engages throughout the life cycle of the program to
provide feedback and updates.”
“Testing should normally include user feedback to
support design and operational use improvements.”
“…. post-deployment assessment will be conducted..”
5. Acquisition Enterprise Issues
• No structure for multiple, required feedback loops
– Ad hoc and random methods for use experience capture
• Limited and unquantified information horizons at every step
– Don’t know what we don’t know; redundancy is inherent in process
• Fails to aggregate and fuse laboratory, simulation and field test results and
assessments
• Focused at big-ticket item acquisition; no formal methods for addressing
“small r” requirements
• Does not address expected explosion in plug-n-play systems and components
• No scalable (down, as well as up) methodology for portfolio analysis
– Portfolios developed by BOGSAT
• Need intelligent methods for projecting pop-up and urgent acquisition needs
and integration into portfolio decisions
5
6. Topics
• DoD acquisition: beyond the horse blanket
• Acquisition key elements technical approach
• Valuation first steps: WFPAC prototype
• Plug-n-play portfolio first steps: VIR prototype
• Acquisition valuation R&D
6
7. Objectives
• Develop a scientifically sound computational methodology for
decision support at all phases of the acquisition process
• Maximize value/time/cost delivered to the warfighter
• Assure the methodology can be applied across the military
value-chain enterprise and accounts for entire life-cycle of assets
• Incorporate laboratory, simulation and field test results and
assessments
• Develop a prototype acquisition valuation system for proof of
concept
7
8. Life-Cycle & Value-Driven Acquisition
• Acquisition should account for entire equipment life-cycle shown above
• Driven by maximizing the value per time per cost delivered to the warfighter
• Responsive to current and future missions and corresponding commanders’ priorities
• Scientifically well-founded methodology incorporating all relevant data
– From R&D through development, allocation and maintenance
– Including laboratory and field test and evaluation
– Operational assessments and requests for enhancements
• Account for uncertainties including possible future conflicts and new technology
developments
• Adaptable and robust to uncertainties in current and future operations and in current
and future technology developments
• Optimizes trade-offs between competing alternatives 8
9. Acquisition Valuation
• Value analysis begins with the end goal – value to the
warfighter – and works backwards to acquisition
• Outcomes are characterized by Measures of Effectiveness
(MOEs)
• Valuation of MOEs depends on Measures of Performance
(MOPs)
• MOPs measure a system’s capabilities relative to its intended
warfighting application, including factors such as frequency of
maintenance and life-cycle cost
9
10. Valuing Acquisitions: MOEs
10
Use MOEs
• Operation Success
• Mission Success
• Effective Engagement Choices
• Effective Engagement Methods
• Operate Inside Opposition’s Decision Cycle
• Situation Awareness Completeness
• Maintain Force Capability
• Effective C2
• Effective Force Application
• Effective Engagement ISR
• Effective Targeting
Provide MOEs
• Materials Availability
• Effective Allocation
• Effective Maintenance
Acquire MOEs
• Maximize Value to Warfighter Per Cost
• Minimize Total Cost
• Fill Capability Gaps
11. Portfolio Anytime Analysis
• Develop a portfolio valuation objective function based on
mission priorities and MOE/MOP estimates
– Scientific foundation is multi-attribute utility theory (MAU)
• Concurrently elicit subjective priorities over current and
future missions as a function of time
– Deductive reasoning rules used to support smart auto-fill
– Can be done at various levels of abstraction
• Concurrently, for each potential acquisition, estimate or
develop probabilistic estimates of MOEs/MOPs for current
and future conflicts and missions
– Fuse available laboratory, simulation and field test results
• Perform anytime optimization to compute acquisition
portfolio that maximizes objective function
11
12. Topics
• DoD acquisition: beyond the horse blanket
• Acquisition key elements technical approach
• Valuation first steps: WFPAC prototype
• Plug-n-play portfolio first steps: VIR prototype
• Acquisition valuation R&D
12
13. 13
WFPAC Methodology
• Decision-theoretic methodology for valuation of the Wide
Area Focal Plane Array Camera (WFPAC) in the context of
small-unit Persistent ISR (PISR) support
• Marshal MOPs from asset purpose and requirements
• Determine MOEs for the relevant asset classes
• Use SME elicitation to weight MOPs value to MOEs
• Determine MOPs actual numbers for WFPAC from laboratory
and field tests
• Roll-up the MOPs to the MOEs, then roll up the MOEs to
determine the asset valuation
16. 16
MOE/MOPs Valuation Roll-up
Levitt, T.S., “Persistent ISR Valuation Framework: Modeling Technical Approach”, George Mason University C4I
Center Technical Report, 18 May 2012: from p. 12
=C6*G6+C7*G7
CBA ED F G
2
1
3
5
4
7
6
17. Topics
• DoD acquisition: beyond the horse blanket
• Acquisition key elements technical approach
• Valuation first steps: WFPAC prototype
• Plug-n-play portfolio first steps: VIR prototype
• Acquisition valuation R&D
17
18. VIR Objectives
• Develop a real-time method for allocating netcentric
plug-and-play tactical collection assets
– Adapt and optimize for missions
– Account for evolution of tactical red and blue situation
• Provide a smart-push of information to the warfighter
– Identify mission and context-specific conditions of interest that should
generate alerts
– Provide semi-automation to enable ISR asset force multiplication effect
• Make the methodology consistent across the military
value-chain enterprise
– Support acquisition, deployment and operation with a uniform and
scientifically sound technical approach
– Develop a common core algorithmic approach
18
20. Admissible Configurations
COI Key → A: Ambush I: IED H: HVI
Sensor Key → MSIDS: video UGS: seismic, acoustic & magnetic vehicle detector and counter
IRID: IR intrusion detector Night Imager: EO and IR detection-triggered image capture
Exploitation Key → MASF: Detect and Comm ADDT: Dismount Detector AECT: Biometric Recognition
Communications Key → Comm: hard wire or radio MASF: radio RR: Radio Repeater
Report Key → User: Human Operator SMSS: Mobile Manned Ground Platform
VS: Video Scout UAV Manned Hand-Portable Downlink
COI ↓ AC# ↓ 1 2 3 4 5 6 7 8 9
A, I, H 1 GBOSS User
A, I, H 2 GBOSS Lite User
A, I 3 Shadow/LEAP VS VS VS VS VS
A, I 4 Shadow/LEAP SMSS
A, I, H 5 MSIDS User
A, I 6 UGS Comm SMSS
A 7 IRID Comm SMSS
A, I, H 8 Night Imager Comm SMSS
A, I 9 UGS MASF SMSS
A 10 IRID MASF SMSS
A, I, H 11 Night Imager MASF SMSS
A, I 12 Night Imager ADDT Comm SMSS
H 13 Night Imager AECT Comm SMSS
A, I 14 UGS MASF Comm Night Imager Comm SMSS
A, I 15 UGS MASF Comm Night Imager ADDT Comm SMSS
A, I, H 16 Night Imager MASF SMSS Shadow/LEAP VS VS VS VS VS
A, I 17 Night Imager ADDT Comm Shadow/LEAP SMSS
A, I 18 Night Imager ADDT Comm Shadow/LEAP VS VS VS VS VS
A, I 19 UGS MASF Comm Night Imager ADDT Comm Shadow/LEAP SMSS
A, I 20 UGS Comm RR Comm SMSS
A 21 IRID Comm RR Comm SMSS
A, I, H 22 Night Imager Comm RR Comm SMSS
A, I 23 UGS MASF RR Comm SMSS
A 24 IRID MASF RR Comm SMSS
A, I, H 25 Night Imager MASF RR Comm SMSS
A, I 26 Night Imager ADDT Comm RR Comm SMSS
H 27 Night Imager AECT Comm RR Comm SMSS
A, I 28 UGS MASF Comm RR Comm Night Imager Comm SMSS
A, I 29 UGS MASF Comm RR Comm Night Imager ADDT Comm SMSS
Component
20
22. Threat Stochastic Process
IED TSP Total = (Blue Force Presence Value + Red Force Presence Value + Terrain Value)
* IsRoad * IsRadius
IED TSP Total
22
23. Collection Plan Optimization
• Solved assignment problem with
– 14 kinds of ISR assets
– 29 different admissible configurations (some may be unavailable based
on number of ISR assets available)
– 6178 surveillance zones in 3 FOB Operating Regions
– MIP size: 222,000 variables, 179,000 constraints
• Problem formulated in MPL and solved in CPLEX
– Total solution time on standard laptop is < 30 seconds
– 15 - 20 seconds to load data from Excel/Text files into MPL
– < 10 seconds for CPLEX to solve
– Additional time (~ 1 minute) for MPL to write the solution back to Excel
23
26. Portfolio Analysis
• Display focuses on seven types of components.
• At small budgets, the GBOSS, GBLite, and UAV were not
affordable relative to their value
26
27. Topics
• DoD acquisition: beyond the horse blanket
• Acquisition key elements technical approach
• Valuation first steps: WFPAC prototype
• Plug-n-play portfolio first steps: VIR prototype
• Acquisition valuation R&D
27
28. Anytime Valuation R&D
• Distributed valuation
– Concurrent valuations at multiple locations with varying available information
– Hierarchy naturally corresponds to force structure and asset control
• Account for future portfolio candidates and pop-up
technology disruptors
• Support systems and systems-of-systems plug-and-play
– Acquisition of system components with variable future systems’ needs
• Reconcile commanders’ alternative subjective priorities
– Over current and future missions
• Pedigree of asset and mission-focused reasoning
– Meta-data maintains historical knowledge and decision rationales
– Supports valuation adaptation to evolving mission space
• Transition path from legacy systems and methods
28