“…The Bayesian method converts the results of statistically significant test of hypothesis into the real probability of the event (MacKay 2003). Likewise Bayesian Priors, Posteriors, and Estimators can be utilized for CSFs cases (Wackerly, Mendenhall et al 2007) (Dekhtyar, Goldsmith et al 2009;Louvieris, Gregoriades et al 2010). In past, Bayesian method has been employed to assess CSFs for military decision support, (Louvieris, Gregoriades et al 2010).…”
Section: Bayesian Method Theory Concept and Calculationsmentioning
ud-din Shami (2017): Enterprise systems' life cycle in pursuit of resilient smart factory for emerging aircraft industry: a synthesis of Critical Success Factors'(CSFs), theory, knowledge gaps, and implications, Enterprise Information Systems,
“…The Bayesian method converts the results of statistically significant test of hypothesis into the real probability of the event (MacKay 2003). Likewise Bayesian Priors, Posteriors, and Estimators can be utilized for CSFs cases (Wackerly, Mendenhall et al 2007) (Dekhtyar, Goldsmith et al 2009;Louvieris, Gregoriades et al 2010). In past, Bayesian method has been employed to assess CSFs for military decision support, (Louvieris, Gregoriades et al 2010).…”
Section: Bayesian Method Theory Concept and Calculationsmentioning
ud-din Shami (2017): Enterprise systems' life cycle in pursuit of resilient smart factory for emerging aircraft industry: a synthesis of Critical Success Factors'(CSFs), theory, knowledge gaps, and implications, Enterprise Information Systems,
“…The ATA describes Node ability to adapt to the dynamically changing operational environment, at the given time. It is a function of time, the Complexity factor and the LOC, given by LOC 6 1 exp t ATA LOC T LOC Compexity…”
Section: Complexity P M E S I Inmentioning
confidence: 99%
“…Such changes will be reflected in the military domain with the objective to share and exploit data, information, knowledge and wisdom [3]; to design an open, scalable, robust and secured communication environment; to move interoperability to the conceptual level [4]; to eliminate the burden of the omnipresent digitalization of operation execution; and finally to fully integrate cyber domain into the other military domains [5]. These changes and new factors in the Post-Information Age formulate new requirements for the command and control approaches in the military domain, mainly real time simulation support and the semi-automated, decision making process within all military domains [6][7][8][9].…”
The Post-Information Age brings new challenges into the military operational environment. The current approach of the extreme hierarchical command and control cannot be sustained in this complex and dynamic environment. Thus, making the search for new command and control approaches is a critical activity. The description and classification of command and control approaches is expressed in a very abstract way. The article describes a unique, quantification technique of command and control approaches. The quantification is demonstrated by Use Case with self-synchronization as the selected command and control approach. In the Use Case, the deterministic dynamic model is implemented. The results achieved from the model demonstrate a variance of a single parameter, on which the quality of the selected Command and Control approach in the given operational scenario quantifies.
“…Along the next years, continuations of these efforts are found in Cohen et al (1996), Lehner et al (1997) and Fisher et al (2003), for instance. More recent research still point to the need to develop new forms of treatment to the problem (Laxmisan et al, 2007;Louvieris et al, 2010;Larson, 2010;Walk, 2011).…”
A methodology to deal with choice by a group of decision makers is here developed. Its first step consists on obtaining individual evaluations of the available options. These evaluations are seen as estimates of location parameters of random variables and each vector of individual evaluations of the whole set of options is transformed into a vector of probabilities of being ranked as the best choice by that individual decision maker. The next step is the probabilistic composition of such individual vectors of probabilities into a unique vector of aggregate preferences. To do that different composition procedures may be applied. The comparison of the results of distinct composition strategies is employed to detect outliers in the individual evaluations and, fnally, to filter the best options. After the initial evaluations are obtained, the whole process may be automatically developed. This makes the methodology particularly useful when fast decisions are needed. Its applicability is here illustrated by a case of daily revision of a stocks portfolio.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.