27,942 research outputs found

    volume 13, no. 2 (Fall 2008)

    Get PDF

    National Security Space Launch

    Get PDF
    The United States Space Force’s National Security Space Launch (NSSL) program, formerly known as the Evolved Expendable Launch Vehicle (EELV) program, was first established in 1994 by President William J. Clinton’s National Space Transportation Policy. The policy assigned the responsibility for expendable launch vehicles to the Department of Defense (DoD), with the goals of lowering launch costs and ensuring national security access to space. As such, the United States Air Force Space and Missile Systems Center (SMC) started the EELV program to acquire more affordable and reliable launch capability for valuable U.S. military satellites, such as national reconnaissance satellites that cost billions per satellite. In March 2019, the program name was changed from EELV to NSSL, which reflected several important features: 1.) The emphasis on “assured access to space,” 2.) transition from the Russian-made RD-180 rocket engine used on the Atlas V to a US-sourced engine (now scheduled to be complete by 2022), 3.) adaptation to manifest changes (such as enabling satellite swaps and return of manifest to normal operations both within 12 months of a need or an anomaly), and 4.) potential use of reusable launch vehicles. As of August 2019, Blue Origin, Northrop Grumman Innovation Systems, SpaceX, and United Launch Alliance (ULA) have all submitted proposals. From these, the U.S. Air Force will be selecting two companies to fulfill approximately 34 launches over a period of five years, beginning in 2022. This paper will therefore first examine the objectives for the NSSL as presented in the 2017 National Security Strategy, Fiscal Year 2019, Fiscal Year 2020, and Fiscal Year 2021 National Defense Authorization Acts (NDAA), and National Presidential Directive No. 40. The paper will then identify areas of potential weakness and gaps that exist in space launch programs as a whole and explore the security implications that impact the NSSL specifically. Finally, the paper will examine how the trajectory of the NSSL program could be adjusted in order to facilitate a smooth transition into new launch vehicles, while maintaining mission success, minimizing national security vulnerabilities, and clarifying the defense acquisition process.No embargoAcademic Major: EnglishAcademic Major: International Studie

    Examination of expense and investment policy for centrally managed items in the Air Force and Navy

    Get PDF
    Approved for public release, distribution unlimitedMBA Professional ReportA basic principle of fiscal law is the identification of an object of expenditure as either an investment or expense; the identification then determines the proper appropriation and means through which the item is acquired. Part of the decision logic for an investment/expense determination is whether the items are centrally managed. The policies and practices surrounding central management of items varies across military departments and sometimes varies within a military department. This report documents various processes, as they exist today, and chronicles changes that occurred recently in the U.S. Air Force. Analyzing those processes indicates unclear policy direction, which leads to nonstandard implementation and problems with compliance. The presence of centralized information technology seems to lessen confusion and aid standardization of practices. Recommendations are offered for policy makers who may be considering changing policies

    DATA SHARING FOR TASK EFFICIENCY DURING A FOREIGN HUMANITARIAN ASSISTANCE/DISASTER RELIEF EFFORT

    Get PDF
    This paper adapts Zigurs & Buckland’s (1998) Task Technology Fit theoretical framework for application to a virtual organization that exists for episodically during foreign humanitarian assistance/disaster relief efforts. Using the 2004 Indian Ocean tsunami, the 2010 Haiti earthquake, and more than 1000 lessons learned cases from the federal government, I examine how task activities, process support level, military command level and partner types influence the technology platform that is used for structured and unstructured data sharing in real time. The predicted fit between task and technology is supported; however, addition of consideration of the virtual nature of the internal and external partnerships that are required for foreign disaster relief efforts improves the explanatory model. Recommendations for theory changes and the practical implications of this research for future foreign disaster relief efforts are explored

    Research Recognition Evening

    Get PDF
    This is the 11th Research Recognition Evening. Professor Luqi is recognized for outstanding research achievement in the Department of Computer Science; Captain Scott Tyo, USAF, of the Department of Electrical and Computer Engineering is recognized for outstanding research achievement in the Information Warfare Academic Group; Research Professor John Hiles is recognized for outstanding research achievement in the Modeling, Virtual Environments, and Simulation (MOVES)Academic Group; Associate Professor Chris Olsen of the Department of Physics is recognized for outstanding research achievement in the Space Systems Academic Group; Associate Professor Andres Larraza of the Department of Physics is recognized for outstanding research achievement in the Undersea Warfare Academic Group; Professor Garth Hobson is recognized for outstanding research achievement in the Department of Aeronautics and Astronautics; The Department of Electrical and Computer Engineering recognizes two individuals this evening: Professor Murali Tummala is recognized for his leadership of the research and development effort to modernize the Navy’s Beartrap System for fleet anti-submarine warfare; Professor Phil Pace is recognized for a highly productive year in which he worked on five research projects funded by the Naval Air Systems Command, Johns Hopkins University, Naval Research Laboratory, the Office of Naval Research and DARPA; Associate Professor Wei Kang is recognized for outstanding research achievement in the Department of Mathematics; Professor Morris Driels is recognized for outstanding research achievement in the Department of Mechanical Engineering; Department of Meteorology recognizes Distinguished Professor Russell Elsberry and Research Associate Professor Lester Carr for their outstanding research contributions; The Department of Oceanography recognizes Research Associate Professor Julie McClean for outstanding research achievement; The Department of National Security Affairs recognizes Professor David Yost for outstanding research achievement; The Department of Operations Research recognizes Professor Al Washburn for research excellence; The Department of Physics recognizes Associate Professor Tom Hofler for outstanding research achievement; The Department of Systems Management recognizes two faculty for outstanding research achievement: Professor Joseph San Miguel and Assistant Professor Keith Snider; The Defense Resources Management Institute recognizes Assistant Professor Robert McNab for outstanding research achievement; The Institute for Joint Warfare Analysis recognizes Research Assistant Professor Nelson Irvine for outstanding research achievement. The 2000 Menneken Awaard recipient, Mark E. Nissen is Assistant Professor of Acquisition Management and Information Systems in the Graduate School of Business and Public Policy. Professor Jim Sanders and Associate Professor Scott Davis from the Physics Department are recognized for their very active role in the Monterey County Science Fair

    Crisis Communication Patterns in Social Media during Hurricane Sandy

    Full text link
    Hurricane Sandy was one of the deadliest and costliest of hurricanes over the past few decades. Many states experienced significant power outage, however many people used social media to communicate while having limited or no access to traditional information sources. In this study, we explored the evolution of various communication patterns using machine learning techniques and determined user concerns that emerged over the course of Hurricane Sandy. The original data included ~52M tweets coming from ~13M users between October 14, 2012 and November 12, 2012. We run topic model on ~763K tweets from top 4,029 most frequent users who tweeted about Sandy at least 100 times. We identified 250 well-defined communication patterns based on perplexity. Conversations of most frequent and relevant users indicate the evolution of numerous storm-phase (warning, response, and recovery) specific topics. People were also concerned about storm location and time, media coverage, and activities of political leaders and celebrities. We also present each relevant keyword that contributed to one particular pattern of user concerns. Such keywords would be particularly meaningful in targeted information spreading and effective crisis communication in similar major disasters. Each of these words can also be helpful for efficient hash-tagging to reach target audience as needed via social media. The pattern recognition approach of this study can be used in identifying real time user needs in future crises

    Sea Power and China's Strategic Choices

    Get PDF
    China's national goals have shifted from the need to guarantee its survival during the country's revolutionary days to the current state of securing stable economic development. This shift marks a full transition for China, changing from a closed country to a developing one that is irrevocably integrated with the rest of the world. Today, while this subject is a common discourse in scholarly and political circles, the international community is still coming to grips with the meaning and impact of China's evolving role on the world stage. It is not an easy issue and extends beyond economics

    An enterprise-level naval shipbuilding plan

    Get PDF
    Overview: This paper reviews the past performance of Australian naval shipbuilding, describes the pros and cons of a rolling production model, and unpicks the issues that the government will have to take into account. It concludes that we’re likely to see a bigger surface navy—potentially a much bigger one—as well as the sell-off of at least part of the currently government-owned ASC Pty Ltd. The paper also looks at strategies to manage the risks in the likely course of action and recommends mitigation strategies

    Summary of Research 2001, Department of Defense Analysis

    Get PDF
    The views expressed in this report are those of the authors and do not reflect the official policy or position of the Department of Defense or U.S. Government.This report contains project summaries of the research projects in the Department of Defense Analysis. A list of recent publications is also included, which consists of conference presentations and publications, books, contributions to books, published journal papers, and technical reports. Thesis abstracts of students advised by faculty in the Department are also included
    • …
    corecore