Abstract
Routine maintenance processes (e.g., peacetime conditions) are not optimized for extreme maintenance conditions (e.g., aircraft or ship battle damage repair, extreme cold Alaska pipeline repair, and COVID-19 depot repair processes). In extreme contexts, modern information technology (e.g., machine learning [ML], additive manufacturing [AM], and Cloud in the Box [CIB]) is typically not being leveraged to optimize productivity and cycle time in these maintenance processes. Literature on process optimization does not address the use of modern technology for optimization in extreme maintenance conditions. This research aims to test the value added to information technology to optimize process productivity and cycle time for extreme maintenance conditions. It will extend the use of process optimization theory to include the effect of modern information technology as well as extreme maintenance contexts. This research is critical because failure to make correct repairs can affect the organization at its most vulnerable cyber infrastructure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams, D.: Bioinformatics. Genome.gov. (2022). https://www.genome.gov/genetics-glossary/Bioinformatics. Accessed 11 Nov 2022
Albert, D.S., Hayes, R.: Code of best practice: experimentation. Office of the Assistant Secretary of Defense, Washington, DC, Command and Control Research Program (CCRP) (2002)
Arthur, W.B.: The Nature of Technology: What it is and How It Evolves. Penguin Group (2009)
Bordetsky, A., Glose, C., Mullins, S., Bourakov, E.: Machine learning of semi-autonomous intelligent mesh networks operation expertise. In: Proceedings of the 52nd Hawaii International Conference on System Sciences. Hamilton Library, pp. 1221–1228 (2019). https://doi.org/10.24251/hicss.2019.149
Castillo, E.D.: Process Optimization: A Statistical Approach. Springer, Heidelberg (2011)
Edwards, W.: The theory of decision making. Psychol. Bull. 51(4), 380–417 (1954). https://doi.org/10.1037/h0053870
Glikson, E., Woolley, A.W.: Human trust in artificial intelligence: review of empirical research. Acad. Manag. Ann. 14(2), 627–660 (2020). https://doi.org/10.5465/annals.2018.0057
Goldfarb, A., Tucker, C.: Digital economics. J. Econ. Lit. 57(1), 3–43 (2019). https://doi.org/10.1257/jel.20171452
Grimes, J.G.: Department of defense net-centric spectrum management strategy (2006). https://doi.org/10.21236/ada454462
Hammer, M.: Reengineering work: don’t automate, obliterate. Harv. Bus. Rev. 1–8 (1990)
Hitt, L., Brynjolfsson, E., Walsham, G.: The three faces of it value: theory and evidence. In: ICIS 1994 Proceedings (1994). https://aisel.aisnet.org/icis1994/69
Hoadley, D.S., Lucas, N.J.: Artificial intelligence and national security. Report, Congressional Research Service, Washington DC (2018). https://digital.library.unt.edu/ark:/67531/metadc1157028/
Housel, T.J., Bell, A.H.: Measuring and Managing Knowledge. McGraw-Hill/Irwin (2001)
Housel, T., Ford, D., Mun, J., Hom, S.: Benchmarking naval shipbuilding with 3D laser scanning, additive manufacturing, and collaborative product lifecycle management. Acquisition Research Program Report No. NPS-AM-15-126. Naval Postgraduate School, Monterey (2015). https://dair.nps.edu/handle/123456789/2650
Housel, T., Shives, T.: In a conceptual model to account for the contribution of sustainable value creation in the public sector. In: 17TH EIASM Interdisciplinary Conference on Intangibles and Intellectual Capital - Non-Financial and Integrated Reporting, Governance and Value Creation Special Track On, Intellectual Capital and Public Sector (2022)
Housel, T., Kanevsky, V.A.: Reengineering business processes: a complexity theory approach to value added. INFOR: Inf. Syst. Oper. Res. 33(4), 248–262 (1995). https://doi.org/10.1080/03155986.1995.11732285
Huang, Y., Pan, X., Hu, L.: Rapid assessment of system-of-systems (SoS) mission reliability based on Markov chains. In: 2015 First International Conference on Reliability Systems Engineering (ICRSE). IEEE (2015)
Jamshidi, M.: System of Systems Engineering Innovation for the 21st Century. Wiley, Hoboken (2009)
Jowett, P., Rothwell, M.: The Economics of Information Technology. Macmillan, New York (1986)
Leonard-Barton, D., Kraus, W.: Implementing New Technology (2014). https://hbr.org/1985/11/implementing-new-technology. Accessed 27 Oct 2020
Liu, M., Zuo, H.F., Ni, X.C., Cai, J.: Research on a case-based decision support system for aircraft maintenance review board report. In: Huang, D.-S., Li, K., Irwin, G.W. (eds.) ICIC 2006. LNCS, vol. 4113, pp. 1030–1039. Springer, Heidelberg (2006). https://doi.org/10.1007/11816157_125
Lutkevich, B.: What is a supply chain? - Definition, models and best practices. WhatIs.com (2021). https://www.techtarget.com/whatis/definition/supply-chain. Accessed 11 Nov 2022
Maule, R.: Acquisition data analytics for supply chain cybersecurity. In: Proceedings of the Seventeenth Annual Acquisition Research Symposium, pp. 1–11. Naval Postgraduate School (2020)
Miller, K., O’Halloran, B., Pollman, A., Feeley, M.: Securing the internet of battlefield things while maintaining value to the warfighter. Inf. Warfare J. 18(2), 74–84 (2019)
Miller, K., Bordetsky, A., Mun, J., Maule, R., Pollman, A.: Merging future knowledgebase system of systems with artificial intelligence/machine learning engines to maximize reliability and availability for decision support. Milit. Oper. Res. J. 26(4), 77–96 (2021). https://doi.org/10.5711/1082598326477
Mirowski, P.: Why there’s (as yet) no such thing as an economics of knowledge. In: Kincaid, E.H., Ross, D. (eds.) The Oxford Handbook of Philosophy of Economics. Oxford University Press (2009)
Mun, J.: Readings in certified quantitative risk management (CQRM): applying Monte Carlo risk simulation, strategic real options, stochastic forecasting, portfolio optimization, data analytics, business intelligence, and decision modeling. IIPER (2015)
Mun, J., Housel, T.: A primer on applying monte carlo simulation, real options analysis, knowledge value added, forecasting, and portfolio optimization. NPS Acquisitions White Paper (2010). https://doi.org/10.21236/ada518628
Niedermann, F., Schwarz, H.: Deep business optimization: making business process optimization theory work in practice. In: Halpin, T., et al. (eds.) BPMDS/EMMSAD -2011. LNBIP, vol. 81, pp. 88–102. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-21759-3_7
Nielsen, M.: Reinventing Discovery: The New Era of Networked Science. Princeton University Press (2012)
Nissen, M.E.: Harnessing Knowledge Dynamics. IRM Press (2006)
O’Connor, P.D.T., Kleyner, A.: Practical Reliability Engineering, 5th edn. Wiley, Hoboken (2012)
Phillips, M.S.: Revisiting John Boyd and the OODA loop in our time of transformation. Defense Acquisit. J. L(5), 8–11 (2021). https://www.dau.edu
Russell, S.J.: Human Compatible: Artificial Intelligence and the Problem of Control. Penguin Books (2020)
Shapiro, C., Varian, H.:Information Rules: A Strategic Guide to the Network Economy. Harvard Business School Press (1999). https://doi.org/10.2307/1183273
Simon, H.A., et al.: Decision making and problem solving. Interfaces 17(5), 11–31 (1987). http://www.jstor.org/stable/25061004
Stoica, I., et al.: The Berkeley data analysis system (BDAS): an open-source platform for big data analytics. Technical report AFRL-RI-RS-TR-2017-173. University of California, Berkeley (2017)
Susto, G.A., Schirru, A., Pampuri, S., McLoone, S., Beghi, A.: Machine learning for predictive maintenance: a multiple classifier approach.IEEE Trans. Industr. Inform. 11(3), 812–820 (2015)
Vanajakumari, M., Mittal, S., Stoker, G., Clark, U., Miller, K.: Towards a leader-driven supply chain cybersecurity framework analysis of security features and vulnerabilities in public/open Wi-FI. J. Inf. Syst. Appl. Res. 14(2), 42–52 (2021)
Wooten, J.: Failure is not fatal, but failure to change might be. Defense Acquisit. J. L(5), 31–36 (2021). https://www.dau.edu
Zhao, Y., Kendall, T., Johnson, B.: Big data and deep analytics applied to the common tactical air picture (CTAP) and combat identification (CID). In: Proceedings of the 8th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (2016). https://doi.org/10.5220/0006086904430449
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
The views expressed in this paper are those of the authors and do not reflect the official Navy policy or position of the NAVAIR, Department of Defense, or the U.S. Government. This paper is not a product of NAVAIR.
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Miller, K., Mun, J. (2023). Cyber Technologies, Machine Learning, Additive Manufacturing, and Cloud in the Box to Enable Optimized Maintenance Processes in Extreme Conditions. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2023. Lecture Notes in Computer Science, vol 14045. Springer, Cham. https://doi.org/10.1007/978-3-031-35822-7_43
Download citation
DOI: https://doi.org/10.1007/978-3-031-35822-7_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-35821-0
Online ISBN: 978-3-031-35822-7
eBook Packages: Computer ScienceComputer Science (R0)