Handbook of military and defense operations research
Material type:
TextSeries: Chapman & Hall/CRC Series in Operations ResearchPublication details: Boca Raton CRC Press 2025Description: xix, 553 pISBN: - 9781032497488
- 355.4072073 SCA
| Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Book
|
Indian Institute of Management LRC General Stacks | Operations Management & Quantitative Techniques | 355.4072073 SCA (Browse shelf(Opens below)) | 1 | Available | 009091 |
Table contents:
Part I Approaches
1 Modern Data Analytics for the Military Operations Researcher
Raymond R. Hill
2 Microsoft Excel: The Universal Tool of Analysis
Joseph M. Lindquist and Charles A. Sulewski
3 Multiattribute Decision Modeling in Defense Applications
Roger Chapman Burk
4 Military Workforce Planning and Modeling
Nathaniel D. Bastian and Andrew O. Hall
5 Military Assessments
Lynette M.B. Arnhart and Marvin L. King III
6 Threatcasting in a Military Setting
Natalie Vanatta and Brian David Johnson
7 Analytical Modeling of Stochastic Systems
Roger Chapman Burk
8 Modern Methods for Characterization of Social Networks through Network Models
Christine M. Schubert Kabban, Fairul Mohd‑Zaid, and Richard F. Deckro
9 Process Optimization through an 8‑Step Structured Problem‑Solving Method
David M. Bernacki, Robert E. Hamm Jr., and Hung‑da Wan
10 Simulation Optimization
Shane N. Hall, Brian M. Wade, and Benjamin G. Thengvall
11 Analytical Test Planning for Defense Acquisitions
Darryl K. Ahner and Gina Sigler
12 Influence Diagrams for Risk Management in Military and Defense
Cameron A. MacKenzie
13 Wavelet Methods for Time Series Forecasting
Jared Nystrom, Raymond R. Hill, Andrew Geyer, Joseph J. Pignatiello Jr., and Eric Chicken
14 Simulation Validation Literature Review
Matthew C. Ledwith, Raymond R. Hill, Lance E. Champagne, and Edward D. White
Part II Applications
15 A Model for and Inventory of Cybersecurity Values: Metrics and Best Practices
Natalie M. Scala and Paul L. Goethals
16 Applying Information Theory to Validate Commanders’ Critical Information Requirements
Mark A.C. Timms, David R. Mandel, and Jonathan D. Nelson
17 Modeling and Analysis of the Army’s Sustainable Readiness Model Scheduling Problem
Adria Markowski and Subhash Sarin
18 Applying High Performance Computing Analytics for Understanding Weather Impacts on Installations
Randy Buchanan, John Richards, Hyeyon Bastian, Brendon Hoch, Christina Rinaudo, and Natalie Myers
Part III Soft Skills and Perspectives
19 Why Won’t They Use Our Model?
Wilson L. Price and Walt DeGrange
20 Lessons Learned from Military Fast Jet Life Support System Test Planning
Sarah Burke and Steven Thorsen
[https://www.routledge.com/Handbook-of-Military-and-Defense-Operations-Research/Scala-HowardII/p/book/9781032497488]
Tracing its roots back to World War II, operations research (OR) has become a vital tool in military and defense strategy. The second edition of the Handbook of Military and Defense Operations Research highlights this evolution, showcasing how OR integrates with cutting-edge areas like artificial intelligence, cybersecurity, and big data analytics.
This volume is more than a historical account; it is a practical guide. The volume features expert voices and offers insights into OR applications in modern security challenges. Readers will discover a blend of theory and real-world case studies, making it an essential resource for both newcomers and seasoned defense analysis professionals.
Dive into this handbook to explore the rich, dynamic field of military and defense operations research, a discipline at the heart of global security and strategic decision-making.
New to the second edition:
Reorganized into a three-part structure
Extensive revisions throughout
Numerous new exercises, examples, and case studies
Several new chapters
(https://www.routledge.com/Handbook-of-Military-and-Defense-Operations-Research/Scala-HowardII/p/book/9781032497488)
There are no comments on this title.