Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Engineering

Demand Responsive Signal Control Strategy (Drsc) Incorporating Queue Length Information In Real-Time Signal Control, Rahul Rajbhara Jul 2012

Demand Responsive Signal Control Strategy (Drsc) Incorporating Queue Length Information In Real-Time Signal Control, Rahul Rajbhara

Civil & Environmental Engineering Theses & Dissertations

Most of the existing vehicle detection systems, namely inductive loops, video cameras etc. are incapable of measuring the queue lengths at signalized intersections. However, with the advent of modern technology, newer detection methods such as probe vehicles equipped with wireless communications (Connected Vehicles), particularly under the Vehicle Infrastructure Integration [52), and radar detection currently provide this capability [53). This thesis presents a Demand Responsive Signal Control Strategy (termed as DRSC) for an isolated signalized intersection. The control strategy incorporates real-time queue length information (obtained from probe vehicles) into the signal control logic. Demand based maximum green time for each upcoming/new …


Towards Managing And Understanding The Risk Of Underwater Terrorism, Richard J. Gay Jul 2012

Towards Managing And Understanding The Risk Of Underwater Terrorism, Richard J. Gay

Engineering Management & Systems Engineering Theses & Dissertations

This dissertation proposes a methodology to manage and understand the risk of underwater terrorism to critical infrastructures utilizing the parameters of the risk equation. Current methods frequently rely on statistical methods, which suffer from a lack of appropriate historical data to produce distributions and do not integrate epistemic uncertainty. Other methods rely on locating subject matter experts who can provide judgment and then undertaking an associated validation of these judgments.

Using experimentation, data from unclassified successful, or near successful, underwater attacks are analyzed and instantiated as a network graph with the key characteristics of the risk of terrorism represented as …


Using Decision-Making Techniques In Support Of Simulation Training Transfer Selections, Jane Taylor Bachman Jul 2012

Using Decision-Making Techniques In Support Of Simulation Training Transfer Selections, Jane Taylor Bachman

Computational Modeling & Simulation Engineering Theses & Dissertations

A general methodological approach for determining the selection of military training simulations with respect to military training requirements has not been developed. This thesis undertakes a literature review, which indicated that there was a need for a multi-criteria decision making model to assist acquisition and/or training planners in making training selection decisions. The Analytical Hierarchy Process (AHP) Model was selected from a multi-criteria decision-making model candidate list for evaluation of its efficacy in selecting military training simulations based upon the military training requirements. Four separate trainee populations, Alpha, Beta, Charlie, and Delta, were evaluated. Results from the Alpha study case …


Establishing Relationships Between Risk Management And Knowledge Transfer, Garrett S. Haltiwanger Jul 2012

Establishing Relationships Between Risk Management And Knowledge Transfer, Garrett S. Haltiwanger

Engineering Management & Systems Engineering Theses & Dissertations

Risk management (RM) and Knowledge management (KM) have mostly been treated as separate management philosophies. Risk management is a widely taught topic in academia and is practiced in industry. Knowledge management is being taught at increasingly more colleges and many companies are discovering a need for managing knowledge. This dissertation shows that some research has been conducted to apply the principles of knowledge management in establishing risk management plans. To a lesser extent there has been research conducted to apply the philosophies of risk management to identifying knowledge gaps and maintaining corporate knowledge. Both risk management and knowledge management are …


Integrating Probe Vehicles And Stationary Detector Data To Construct Accurate Cumulative Curves To Study Bottlenecks, Khairul Azfi Anuar Apr 2012

Integrating Probe Vehicles And Stationary Detector Data To Construct Accurate Cumulative Curves To Study Bottlenecks, Khairul Azfi Anuar

Civil & Environmental Engineering Theses & Dissertations

Advancements in sensors technologies have given researchers and practitioners access to an immense amount of traffic data from multiple types of sensors. However, because of the diversity of the data types, developing a relationship between the different data sources can be challenging. To further complicate the issue, the presence of error or noise makes it difficult to infer any reliable conclusions from the data. To develop a relationship between different data sources, a new methodology is proposed in this thesis for fusing stationary detector data and probe vehicle data to construct an accurate cumulative curve. To remove or to reduce …


An Investigation Into The Relationship Between An Engineering Manager's Purpose-Seeking Beliefs And Behaviors And The Engineering Manager's Perception Of Employee Creativity, Initiative And Purpose-Seeking Behavior, Charles Burton Daniels Apr 2012

An Investigation Into The Relationship Between An Engineering Manager's Purpose-Seeking Beliefs And Behaviors And The Engineering Manager's Perception Of Employee Creativity, Initiative And Purpose-Seeking Behavior, Charles Burton Daniels

Engineering Management & Systems Engineering Theses & Dissertations

Organizations have placed an overwhelming emphasis on extrinsic motivation of its workforce, normally in the form of financial incentives, in an attempt to assure individual and organizational high performance. While a significant level of financial resources is expended in this attempt to predict and influence employee behavior, no objective evidence exists of a favorable return of investment. In fact, the primary impact of most extrinsic motivation might actually be demotivation – the opposite of the intended use.

In this research the prevailing literature was examined and a conclusion about the power of both extrinsic and intrinsic motivation was synthesized to …


An Analysis Of Factors Affecting The Effective Use Of Knowledge Management In Counter Improvised Explosive Device (C-Ied) Operations, Umit Gencer Apr 2012

An Analysis Of Factors Affecting The Effective Use Of Knowledge Management In Counter Improvised Explosive Device (C-Ied) Operations, Umit Gencer

Engineering Management & Systems Engineering Theses & Dissertations

This dissertation investigates factors that influence effective use of Knowledge Management (KM) in Counter Improvised Explosive Device (C-IED) operations in the military.

The study suggests that effective KM program is determined by the interaction of three organizational capabilities: knowledge infrastructure, knowledge process, and leadership orientation.

A self-administrated survey was conducted on 300 NATO staff officers who have served in C-IED environments. A structural equation modeling technique was used to test a set of hypotheses using 118 completed responses collected from the survey.

The results suggest that out of the 11 constructs within the model; two are rated as 'attribute needs …


Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway Apr 2012

Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway

Engineering Management & Systems Engineering Theses & Dissertations

For a number of years, the United States Federal Government has been formulating the Next Generation Air Transportation System plans for National Airspace System improvement. These improvements attempt to address air transportation holistically, but often address individual improvements in one arena such as ground or in-flight equipment.

In fact, air transportation system designers have had only limited success using traditional Operations Research and parametric modeling approaches in their analyses of innovative operations. They need a systemic methodology for modeling of safety-critical infrastructure that is comprehensive, objective, and sufficiently concrete, yet simple enough to be deployed with reasonable investment. The methodology …


Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk Apr 2012

Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this research is to explore the conceptual background of agility in knowledge management, re-conceptualize it and extend it to military applications with a special focus on Counterinsurgency (COIN).

An initial qualitative exploration of agility in knowledge management was performed. Three different concepts and their interrelationships were analyzed: (1) knowledge management, (2) agility in operations, and (3) military organizations in the COIN environment. Findings from this initial qualitative analysis were used to inductively redefine, re-conceptualize and extend the concept of Agile Knowledge Management (AKM), as well as, to compare and adapt the AKM concept to the military environment …


Analysis Of Primary-Secondary Incident Events On Urban Freeways, Hongbing Zhang Apr 2012

Analysis Of Primary-Secondary Incident Events On Urban Freeways, Hongbing Zhang

Civil & Environmental Engineering Theses & Dissertations

The objective of this study is to understand the nature of primary and secondary traffic incidents, assess their impacts and explore the implications in traffic operations, safety, and planning. To achieve the objective, a queue-based secondary incident identification method was developed and applied based on detailed incident, traffic and geometric data sets from Hampton Roads, Virginia. This identification method can overcome the limitations in earlier studies and identify secondary incidents in both road directions. An innovative event categorization defines the term "primary-secondary incident event", as one characterized by a primary incident and one or more associated secondary incidents in both …


Spatial Analysis Of Travel Behavior And Response To Traveler Information, Xin Wang Apr 2012

Spatial Analysis Of Travel Behavior And Response To Traveler Information, Xin Wang

Civil & Environmental Engineering Theses & Dissertations

Transportation planners have long recognized that it is urgent to integrate emerging spatial analysis with travel behavior studies. A clearer understanding of the spatial interactions among travelers and the complex environment they face has the potential to reap benefits of the ongoing technologies of travel behavior, spatial analysis and Advanced Traveler Information Systems (ATIS).

Considering that spatial patterns have been overlooked in the literature of travel behavior and ATIS, the main objective of this research is to use robust methods of spatial analysis to enhance the understanding of how the associations between traveler decisions, built environment and socio-demographic characteristics are …


Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill Apr 2012

Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill

Engineering Management & Systems Engineering Theses & Dissertations

Risk for homeland security and homeland defense is often considered to be a function of threat, vulnerability, and consequence. But what is that function? And are we defining and measuring these terms consistently? Threat, vulnerability, and consequence assessments are conducted, often separately, and data from one assessment could be drastically different from that of another due to inconsistent definitions of terms and measurements, differing data collection methods, or varying data sources. It has also long been a challenge to integrate these three disparate assessments to establish an overall picture of risk to a given asset. Further, many agencies conduct these …


A Framework For Delivering Contextually Appropriate Opportunities For Warfighter Practice, Michael Allan White Jan 2012

A Framework For Delivering Contextually Appropriate Opportunities For Warfighter Practice, Michael Allan White

Computational Modeling & Simulation Engineering Theses & Dissertations

Computer-based modeling and simulation has been a training staple in the military domain since the first aircraft simulators were adopted. More recently, virtual environments based on modeling, simulation and serious games, have introduced relatively low-cost, yet high value additions to the learning environment. As these virtual environments have proliferated, many researchers have investigated the relationship between theoretical foundations of learning, learner development and content delivery, and applied their findings in an attempt to bolster learning, yet performance deficiencies continue to exist. This study asserts that performance deficiencies exist in part because of insufficient contextually appropriate opportunities to practice.

This work …