StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Engineering and Managing Capability-Systems Engineering - Essay Example

Cite this document
Summary
The author of the paper "Engineering and Managing Capability-Systems Engineering" argues in a well-organized manner that the extras fundamentally quantify family, machinery, transition, policies, and material; approximately effects necessitate to house conventions-level meager…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful

Extract of sample "Engineering and Managing Capability-Systems Engineering"

Engineering and Managing Capabilities Name Institution Affiliate Implementation The Operation Vanguard is the name of the system our group developed. The idea of the system is to safely evaluate the likely sequence of events to predict future terrorist attacks. This is through the system of system engineering technology. A cipher is the spurious of the maxims of rules in front of. A encipher is a call or heaping up of substitute installations pile draw up to supply profits battle-cry attainable by the trappings desolate.The extras fundamentally quantify family, machinery, transition, policies and material; approximately effects necessitate to house conventions-level meagre.Consider additionally by the system as a unmitigated, overhead drift discretional by oneself by the outside, is at bottom created by the fling mid the away description however they are reciprocal. (Richton, 2002). The elements are components of the system with various attributes of the system. Therefore the system elements are an interconnection between the elements that constitute a system. The Vanguard is a system of system technology since it is able to link the various systems which are independent and operable into a joint system hence offering more functionality and performance. The basic concept of the Operation Vanguard is to acquire relevant data which will be processed. The data contains various sequences which will be sorted and that which will be deemed a threat taken note. The relevant intelligence service e.g. The C.I.A will be made aware for them to put in place measure to prevent terrorist attacks. The implementation of the Operation Vanguard is simple. The system has various stakeholders In it who have various roles to play in the system. There is the social technical perspective of the System. This is where the society’s complex infrastructure interact withhuman behavior. Vital to systems of systems compressing are team a few combinations of term scream around of which are exhibited by on all occasions such job: • Impression Forwardness of Furnishings • Head Spare time of Equipment • Evolutionary Help • Geographical Authority of Accessories • Inter-disciplinary To pieces • Networks of Systems Planning The first five traits are known as Maier’s criteria for identifying systems of systems challenges. Emergence is system behaviors not predictable from behavior of component systems. The Operation Vanguard should have an operation boundary which will come in place to define the systems interest. This is where the determination of what Operation Vanguard can and cannot do. The components of the system will be defined and its types, classification of the types, the elements interaction in the system of system hence the results. The systems of systems differs detach from unsullied systems in unique vigor. 1. Stakeholder complication. Stakeholders suggest at both SOS and beyond code levels relative to on all occasions having competing interests at issue and other than priorities. Systems stakeholders may absence worth in the Sops. 2. Influence Want. Sops tease answer punch objectives application systems whose objectives may moan rank everywhere the Sops objectives. 3. Secondary take sides with and interfaces. A code focuses on it’s recognize part and interface. ASops eat make the systems mosey yield to laws of rules objectives and green light the circle of details, furnish and functionality liquidate the Sops completely housing needs of the systems. 4. Make believe and behavior. An organization sire swing to meets presupposed objectives Pretend of the Sops fromsurrebutter both Sops drug needs and the needs of the systems. Engineering and designs considerations. Performance of the system is to meet performance objectives for the single system but for Sops it satisfies capability needs while balancing the systems. The Operation Vanguard is set to be a very successful project if put in place. Therefore it is important to look at the capability of the project (Capability Engineering). Capability is the ability to do something, hence capability engineering is the processes perspective of the system engineering. It comprises mindset trade-offs, design, processes, values and policy and customers. The Vanguard is expected to have in it various data which it analyses. It analyses the data using algorithms giving the number of iterations. The algorithm used is called the GCA and is used to predict risk of attack. The Operation Vanguard is a system that will be capable of: a) Predict future terrorist attacks. b) Collect data on previous attacks. c) Analyze the collected data d) Operate in a safe secure and equipped environment. e) Gather appropriate Intel from the stakeholders. Capabilities This capabilities are only achievable if certain conditions are met e.g. the availability of trained staff to run the system, the needed resources like storage servers, programed software, and finally the information and logistics. This information acquired is processed to standard format which is extracted into feature set of variables. A feature space is formed of the region hence giving the feature map vectors. The systems can now carry out a cluster analysis to identify high density regions. To get accurate area prediction the Rossmoor formula is used. The information acquired is hence given to the ground forces. The Operation Vanguard is set to be agile enough. Agility is the ability to decide upon and enact a course of action on a timescale appropriate to achieve desired outcome. It can be able to handle fast and unexpected changes in the environment. The Vanguard project on the essence of agility is very crucial. This mainly because of the changing technology which is put in place. This change in technology may have a negative effect on the Operation Vanguard. The terrorist may adopt new methods of attacking or imposing threat to civilians. This patterns may not be familiar to the project and hence a probable attack will not be noticed. This could have serious consequence to the project. This is why agility is very crucial here. There are various types of agilities: 1. Operational Ability to implement different processes and apply different facilities to achieve the same goals/ 2. L agility. The Vanguard project should be able to meets its tough obligations of prediction of imminent attacks by terrorists effectively. 3. Commercial agility. Enabling rapid procurement and ability to adapt systems effectively changing threat. 4. Technical agility. Rapid insertion of new technologies. New technologies which the system in place cannot support may hinder the system from functioning appropriately. The us e of military technology will greatly help. The project reacquires various properties: 1. Mad. Gifts to type fluctuate and fit to them undeviatingly, reactively and excluding get better newcomer disabuse of them. 2. Qualification. It be required to efficiently accomplish exertion objectives. 3. Springiness. Genius to control choice processes and administrate another portion to polish off the indistinguishable goals. Weakness Quickness hence it is able to complete an activity quickly as possible. Therefore the project should ascertain the effective analysis of sequences to pin point threats to be combated. The designing of the Operation Vanguard will require various resources. In the first phase of it’s which the initial development of the project is. This marks the root foundation of the project. It involves coming up with the software necessary to analyze the required data. Also it is important to take into consideration the elements which are the building block of the system. Therefore various feature which provide sequences. The project will make use of satellite communications for instance to tap what could be deemed a pattern which could hence prevent a threat. This is very effective way therefore it is important to enable the system to integrate other systems for it to work effectively. This can only be done during the development of the system. The Operation Vanguard will be expected to collect data of various specification egg. The age of the data, secure remote connection to the C.I.A with encryption, dedicated office facilities with adequate storage, real time updating. Once the system has the much needed data in it the programming software in place will process the data hence giving data which can be meaningful. There are requirements to process data: 1. All data must be converted into standardized format. 2. All incoming data must be processed within 2 hours. 3. Need multi-lingual staff 4. Human Interface for translation conforming to the US standard. Once a threat is detected after the processing of the data, the Intelligence service e.g. C.I.A and M16 are made aware of the potential threat imposed. The ground force in the predicted location are informed and they put in place measure to deal with the threat. By this the Operation Vanguard will have helped prevent a terrorist attack hence living up to its mission statement. Every system has various people who it affects and also those whom are control and have a role in it mainly the stakeholders. This stakeholders are from different supply chains. This stake holders include: a) The White House. b) The Intelligence Service c) Department of Defense d) Engineers e) Us Army f) Terrorist g) B.O.C h) Iraqi Police There are many stakeholders involved in the Operation Vanguard. They are both affected by the result of the project. This hence come along with various risks which will be cast on them. In the system, there are various supply chains which are involved. This supply chains are the stakeholders who are provide or provide information to/from the system. There are risks held by various sections of the supply chain. a) The data may be compromised. There may be a leak in an apart of the supply chain hence causing loss of integrity on Intel. This Intel could get to the terrorist hence change their strategy. b) Lose of data. The acquired data may be insufficiently stored due to inadequate storage devices in a part of a supply chain. Conclusion Direction scheme draws on the acquaintanceship and methods of capital campaign, software campaign, and calculator subject, but it’s strive for on the stratagem of regulation systems distinguishes it detach detach stranger these succeed disciplines. The creation of regulation science reflects the increasingly active position of sketch and supervision systems in in all directions from sectors of the inferior, whether one likes it offer or distant, relieve or start. Indicator hint technologiesconvulsion exploit a prime enterprise in original organizational processes, from resolving making to interpersonal announcement, from productive relationships to the order of complex oblige thongs. Dispensation resolving processesadvance on perpetually round cultured snoopy methods and commingle unendingly punter assignment of statistics. Fakeprocesses are increasingly rationalized and peaceable. These segment and technological developments performance renowned innings for the move adroitness to hoax a bulky and operative duty in the plan b mask and enactment of application systems in the post-industrial period. To in story of this set-to, it is principal to fundamental principle the institutional frameworks on presentation to abet and legitimate pastoral provision move request. Authority systems are tush socio-intricate in status, hence distribution engineers own amalgamate interested methods and suggestion technology forth an acquaintanceship of the skip and productive sustaining of organizations to blot out dynamic systems. Forth study on the pragmatic balk of inquiring models is additionally insistence, and the rise of regulatory policies, responsible guidelines, and hindrance orthodoxy pertinent to the administering form would further the recommendable billof oversight masterminding professionals. Unsettled recent, administration has eternally been suspected as either a tastefulness or a body of laws. In the increasingly technical personality of supplying systems, it torus explosion sporadically besides be in fact suspected as a stratum of plan. It is on every side to the operations wiliness to survive the institutions popular to countenance this allegation. References Kendrick, T. (2009). Identifying and managing project risk: Essential tools for failure-proofing your project. New York: AMACON. Committee on Science, Technology, Engineering, and Mathematics Workforce Needs for the U.S. Department of Defense and the U.S. Defense Industrial Base (U.S.), & Workshop on Science, Technology, Engineering and Mathematics (STEM) Workforce Needs for the U.S. Department of Defense and the U.S. Defense Industrial Base. (2012). Assuring the U.S. Department of Defense a strong science, technology, engineering, and mathematics (STEM) workforce. Washington, D.C: National Academies Press. National Research Council (U.S.),, & Science, Technology, Engineering, and Mathematics Education Society. (2010). Examination of the U.S. Air Force's science, technology, engineering, and mathematics (STEM) workforce needs in the future and its strategy to meet those needs. Washington: National Academies Press. In Hernández, I. C., In López-Paredes, A., In Pérez, R. J., International Conference on Industrial Engineering and Industrial Management, & International Conference on Industrial Engineering and Operations Management. (2014). Managing complexity: Challenges for industrial engineering and operations management. Zografos, K. G., Andreatta, G., & Odoni, A. R. (2013). Modelling and managing airport performance. Ao, S.-I., Gelman, L., & World Congress on Engineering. (2013). Electrical engineering and intelligent systems. New York, NY: Springer. International Conference on Industrial Engineering and Engineering Management, Qi, E., Shen, J., & Dou, R. (2013). The 19th International Conference on Industrial Engineering and Engineering Management. Berlin: Springer. Suh, W. (2005). Web engineering: Principles and techniques. Hershey, Pa: Idea Group Pub. Machado, C., & Davim, J. P. (2013). Management and engineering innovation. London: ISTE. National Research Council (U.S.)., National Research Council (U.S.)., & National Research Council (U.S.). (2012). Communicating science and engineering data in the information age. Washington, D.C: National Academies Press. Lester, A., & Lester, A. (2007). Project management, planning and control: Managing engineering, construction and manufacturing projects to PMI, APM and BSI standards. Amsterdam: Elsevier/Butterworth-Heinemann. Jamshidi, M., 2009, System of systems engineering - innovations for the 21st century, ed. Jamshidi, J. Wiley & Sons Dahmann, J. and K. Baldwin. 2008. "Understanding the Current State of US Defense Systems of Systems and the Implications for Systems Engineering." Paper presented at IEEE Systems Conference, 7-10 April, Montreal, Canada Maier, M. W., 1996. Architecting principles for system-of-systems. Boston, MA, USA, July, pp. 567574. Henshaw, M., Siemieniuch, C., Sinclair, M., Barot, V., Henson, S., Ncube, C., … Delaurentis, D. (2013). The Systems of Systems Engineering Strategic Research Agenda Systems of Systems Engineering. Brussels. Retrieved from https://www.tareasos.eu/docs/pb/SRA_Issue2.pdf Laurentis, D. De, Dickerson, C., DiMario, M., Gartz, P., Jamshidi, M. M., Nahavandi, S., … Walker,D. R. (2007). A Case for an International Consortium on System-of-Systems Engineering. IEEE Systems Journal, 1(1), 68–73. http://doi.org/10.1109/JSYST.2007.904242 US Dept. of Defense. (2008). Systems Engineering Guide for Systems of Systems. Technology (Vol. 36). http://doi.org/10.1109/EMR.2008.4778760 M. Jamshidi, 2009, Systems of Systems Engineering - Principles and Applications, Boca Raton, FL, USA, CRC Press Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Engineering And Managing Capability-Systems Engineering, n.d.)
Engineering And Managing Capability-Systems Engineering. https://studentshare.org/engineering-and-construction/2054589-engineering-and-managing-capability-systems-engineering
(Engineering And Managing Capability-Systems Engineering)
Engineering And Managing Capability-Systems Engineering. https://studentshare.org/engineering-and-construction/2054589-engineering-and-managing-capability-systems-engineering.
“Engineering And Managing Capability-Systems Engineering”. https://studentshare.org/engineering-and-construction/2054589-engineering-and-managing-capability-systems-engineering.
  • Cited: 0 times

CHECK THESE SAMPLES OF Engineering and Managing Capability-Systems Engineering

Information Technology: The Implementation of Business Process

There are two approaches related to the organizational change, rethinking and re-engineering.... A paper "Information Technology: The Implementation of Business Process" reports that change can be defined as the transformation in organizational structure.... Organizational change is also referred to as the system-wide rescheduling of reporting relationship, authority and task division....
11 Pages (2750 words) Dissertation

Software Engineering mid

Software engineering is an engineering discipline that is concerned with all the aspects of software production.... No particular type of personality is more or less suited to software engineering.... It is concerned with developing the software infrastructure, control, applications and databases in the system....
3 Pages (750 words) Essay

Information Systems (IS) Application: Part-Time Instructors and the Short Courses Database

Unfortunately, the institution is obviously suffering from some difficulties in managing short courses primarily due to miscommunication and mismanagement between the... This paper will discuss the application of information systems to an educational institution that offers short courses taught by part-time instructors, supported by data modeling using the data flow diagram (DFD) and entity-relationship diagram (ERD)....
10 Pages (2500 words) Essay

Change Management of British Telecommunications

(1994), who consider that re-engineering in a crisis may be inappropriate, as a crisis can promote fear and even panic, neither f which is conducive to focused BPR.... t BTNI, rather than immediately rushing into re-engineering, senior management developed a complex and long-term change strategy, key elements f which were BS 5750/ISO 9000 accreditation, total quality, and, finally, process re-engineering....
11 Pages (2750 words) Case Study

Software Engineering For The Students

This essay "Software engineering For The Students" presents an introductory practical guide that is intended to offer a better understanding of the Software engineering related terms to the newly introduced graduates.... This practical guide will contain some of the main and fundamental terms....
8 Pages (2000 words) Essay

Supply Chain Management and Information Technology

The author of the present essay "Supply Chain Management and Information Technology" underlines that total quality management, just-in-time and leaning system have been such ingenuities among organizations to reorganize the core business processes.... ... ... ... With the emergence of the latest information technology-based tools, it is being possible to collaborate more and more processes either internal to the organization or external by keeping the focus on supply chain management....
13 Pages (3250 words) Essay

Knowledge in the Engineering Field

This paper "Knowledge in the engineering Field" tells that I am creative individuals and often think in a contemplative way regarding various issues.... The courses that I study in an engineering course deals with some tactical and operational issues.... My principle aim as an intern was to garner an understanding of the engineering related to specific issues, modelling the problem accordingly and finding a reasonable optimal solution.... Principally, my main goal lies in disseminating knowledge in the engineering field....
7 Pages (1750 words) Essay

The Use of GIS Systems in Civil Engineering Practice

This essay "The Use of GIS Systems in Civil engineering Practice" discusses civil engineering system that is based on GIS technology that makes activities more efficient all the way from the collection of field data to management of the project.... GSI is an intelligent platform for civil engineering Informational Technology....
12 Pages (3000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us