logo Hurry, Grab up to 30% discount on the entire course
Order Now logo

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Alfred DoddData mining
(5/5)

709 Answers

Hire Me
expert
Francis OrtizPsychology
(5/5)

661 Answers

Hire Me
expert
Violeta BaoMarketing
(5/5)

625 Answers

Hire Me
expert
Ligia QuintanaMarketing
(5/5)

943 Answers

Hire Me
Others
(5/5)

The Office of Acquisition Analytics and Policy, which is part of the Office of the Under Secretary of Defense for Acquisition and Sustainment

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Executive Summary

The Office of Acquisition Analytics and Policy, which is part of the Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)), tasked IDA to assess the feasibility of using machine leaning to analyze contracts for major defense acquisition programs (MDAPs). The goal of the analysis was to extract data from contracts and predict program performance. The study was divided into three stages: crawling, walking, and running.

Crawling

The crawling stage consisted of building a dataset. During this stage of the analysis, contracts were collected and processed.1 The contracts chosen were listed in Selected Acquisition Reports (SARs) between December 1997 and December 2018, and were from MDAPs that were no longer reporting as of November 2019. Examining contracts from this period ensured that each program was more than 90 percent complete. Additionally, the dataset was limited to this period so that program performance outcomes were known which is necessary when using machine learning algorithms for predictive purposes. We collected 24,364 contract files in PDF format spanning 149 contract numbers and 34 MDAPs. (The MDAPs and their associated contract numbers are in Appendix B.) Finally, we used the Institute for Defense Analyses Text Analytics (IDATA) capability to turn the collected files into a machine-readable dataset.

Walking

In the walking stage, contract data were evaluated by training machine learning algorithms on our data to answer relatively simple questions. This activity ensured that the dataset was of reasonable quality, the machine-learning algorithms were functioning properly, and reasonable answers were produced. During this stage, word clouds were generated for each program. The following figures show the word clouds for two programs, CH-47F and ATACMS-APAM, respectively.

(5/5)
Attachments:

Related Questions

. The fundamental operations of create, read, update, and delete (CRUD) in either Python or Java

CS 340 Milestone One Guidelines and Rubric  Overview: For this assignment, you will implement the fundamental operations of create, read, update,

. Develop a program to emulate a purchase transaction at a retail store. This  program will have two classes, a LineItem class and a Transaction class

Retail Transaction Programming Project  Project Requirements:  Develop a program to emulate a purchase transaction at a retail store. This

. The following program contains five errors. Identify the errors and fix them

7COM1028   Secure Systems Programming   Referral Coursework: Secure

. Accepts the following from a user: Item Name Item Quantity Item Price Allows the user to create a file to store the sales receipt contents

Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip

. The final project will encompass developing a web service using a software stack and implementing an industry-standard interface. Regardless of whether you choose to pursue application development goals as a pure developer or as a software engineer

CS 340 Final Project Guidelines and Rubric  Overview The final project will encompass developing a web service using a software stack and impleme