Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Operations Research, Systems Engineering and Industrial Engineering

PDF

Old Dominion University

Articles 1 - 30 of 244

Full-Text Articles in Engineering

Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane Aug 2023

Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane

Engineering Management & Systems Engineering Theses & Dissertations

Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.

With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …


Design And Implementation Of A Launching Method For Free To Oscillate Dynamic Stability Testing, Kristen M. Carey Aug 2023

Design And Implementation Of A Launching Method For Free To Oscillate Dynamic Stability Testing, Kristen M. Carey

Mechanical & Aerospace Engineering Theses & Dissertations

Magnetic Suspension and Balance Systems (MSBS) allow for static, forced oscillation and free to oscillate dynamic stability testing in a wind tunnel without the need for a physical support. The objectives of study are to assist in the application of the free to oscillate testing method in an MSBS to determine dynamic stability characteristics for various re-entry capsule designs.

This thesis discusses the development and testing of a launching method called the grabber for use in the MSBS Subsonic Wind Tunnel at NASA Langley Research Center. Aerodynamic tests were run to support the use of this method and compare the …


Human Psychology Factors Influencing Agile Team Autonomy In Post-Pandemic Remote Software Organizations, Ravikiran Kalluri May 2023

Human Psychology Factors Influencing Agile Team Autonomy In Post-Pandemic Remote Software Organizations, Ravikiran Kalluri

Engineering Management & Systems Engineering Theses & Dissertations

Agile project management methods are gaining in popularity in the software industry as software development teams are being asked to be adaptive to market needs and resilient to change and uncertainty. With increasing market uncertainty, global competition, and time-to-market pressure, it is becoming a challenge to develop an innovative product and deliver it on-time without the opportunity that comes from team autonomy to experiment and learn from failures in a remote workplace. To resolve this challenge, it is critical to understand the myriad human psychological factors in play that influence Agile team autonomy in a remote work environment.

The role …


Sealion Cubesat Mission Architecture Using Model Based Systems Engineering With A Docs As Code Approach, Kevin Yi-Tzu Chiu May 2023

Sealion Cubesat Mission Architecture Using Model Based Systems Engineering With A Docs As Code Approach, Kevin Yi-Tzu Chiu

Mechanical & Aerospace Engineering Theses & Dissertations

CubeSats are a growing population within the space industry. Every year, universities launch numerous amounts of CubeSats due to their inexpensive cost of development, launch, and deployment. However, this comes with numerous challenges. As the number of university-CubeSats grow, so too do the numbers that fail. With development teams consisting mainly of students with little to no training, proper and yet easy to use tools or methods should be implemented to help ensure mission success. Especially in the critical stages of planning before and during development, a technical approach to quickly track life cycle development of a CubeSat is needed. …


Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque Dec 2022

Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque

Electrical & Computer Engineering Theses & Dissertations

Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …


Learning Curve Characterization Within Complex Low-Rate Production Environments, Robert J. Gies Dec 2022

Learning Curve Characterization Within Complex Low-Rate Production Environments, Robert J. Gies

Engineering Management & Systems Engineering Theses & Dissertations

Traditional and current learning curve approaches, methods, and theories were deficient when addressing complex low-rate production systems. The purpose of this research was to address this problem and develop a learning curve approach that characterizes learning in low-rate production environments such as naval ship construction. This research identified the principal aspects that influence learning within this environment and developed a learning characterization more reflective of this environment.

There obviously exists a large body of knowledge covering learning. However, the research contained herein addresses learning as it relates to learning curves in low-rate production environments, such as naval shipbuilding. The various …


Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy Dec 2022

Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy

Engineering Management & Systems Engineering Theses & Dissertations

The United States Department of Defense (DoD) is rapidly working with DoD Services to move from multi-year (e.g., 7-10) traditional acquisition programs to a commercial industrybased approach for software development. While commercial technologies and approaches provide an opportunity for rapid fielding of mission capabilities to pace threats, the suitability of commercial technologies to meet hard-real-time requirements within a surface combat system is unclear. This research establishes technical data to validate the effectiveness and suitability of current commercial technologies to meet the hard-real-time demands of a DoD combat management system. (Moreland Jr., 2013) conducted similar research; however, microservices, containers, and container …


A Systems Theory-Based Framework For Environmental Scanning In Complex System Governance, Dale E. Baugh Dec 2022

A Systems Theory-Based Framework For Environmental Scanning In Complex System Governance, Dale E. Baugh

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this research was to develop a Systems Theory-based framework for Environmental Scanning (ES) in Complex System Governance (CSG) using an inductive research design. Complexity and uncertainty are normal for external environments in which today’s systems (organizations) exist. These environmental characteristics provide impetus for researchers to focus on organizational planning for disruptive external forces that could threaten system stability and future system existence. The ES function supports the requisite governance metasystemic functions to be enabled, executed, and evolved sufficiently well to promote continuous system viability. In this research the functioning of ES was examined from a diverse literature-based …


A Quality Systems Economic-Risk Design Theoretical Framework, Abdallah S. Thefeid Aug 2022

A Quality Systems Economic-Risk Design Theoretical Framework, Abdallah S. Thefeid

Engineering Management & Systems Engineering Theses & Dissertations

Quality systems, including control charts theory and sampling plans, have become essential tools to develop business processes. Since 1928, research has been conducted in developing the economic-risk designs for specific types of control charts or sampling plans. However, there has been no theoretical or applied research attempts to combine these related theories into a synthesized theoretical framework of quality systems economic-risk design. This research proposes to develop a theoretical framework of quality systems economic-risk design from qualitative research synthesis of the economic-risk design of sampling plan models and control charts models. This theoretical framework will be useful in guiding future …


Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan Aug 2022

Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan

Computer Science Theses & Dissertations

In-situ process monitoring for metals additive manufacturing is paramount to the successful build of an object for application in extreme or high stress environments. In selective laser melting additive manufacturing, the process by which a laser melts metal powder during the build will dictate the internal microstructure of that object once the metal cools and solidifies. The difficulty lies in that obtaining enough variety of data to quantify the internal microstructures for the evaluation of its physical properties is problematic, as the laser passes at high speeds over powder grains at a micrometer scale. Imaging the process in-situ is complex …


Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin Aug 2022

Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin

Engineering Management & Systems Engineering Theses & Dissertations

Organizations and government leaders are concerned about cyber incidents. For some time, researchers have studied what motivates people to act in ways that put the confidentiality, integrity, and availability of information in organizations at risk. Still, several areas remained unexplored, including the role of employees’ evaluation of the organizational systems and the role of value orientation at work as precursors of secure and insecure actions in relation to information technologies (information security [IS] action). The objective of this research project was to examine how the evaluations of formal and informal security norms are associated with the intention to follow them …


Finding Core Members Of A Hedonic Game, Daniele M. Vernon-Bido May 2022

Finding Core Members Of A Hedonic Game, Daniele M. Vernon-Bido

Computational Modeling & Simulation Engineering Theses & Dissertations

Agent-based modeling (ABM) is a frequently used paradigm for social simulation; however, there is little evidence of its use in strategic coalition formations. There are few models that explore coalition formation and even fewer that validate their results against an expected outcome. Cooperative game theory is often used to study strategic coalition formation but solving games involving a significant number of agents is computationally intractable. However, there is a natural linkage between ABM and the study of strategic coalition formation. A foundational feature of ABM is the interaction of agents and their environment. Coalition formation is primarily the result of …


Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci May 2022

Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci

Mechanical & Aerospace Engineering Theses & Dissertations

Current analysis of manufacturing defects in the production of rims and tires via x-ray inspection at an industry partner’s manufacturing plant requires that a quality control specialist visually inspect radiographic images for defects of varying sizes. For each sample, twelve radiographs are taken within 35 seconds. Some defects are very small in size and difficult to see (e.g., pinholes) whereas others are large and easily identifiable. Implementing this quality control practice across all products in its human-effort driven state is not feasible given the time constraint present for analysis.

This study aims to identify and develop an object detector capable …


Complex System Governance Leadership, David C. Walters May 2022

Complex System Governance Leadership, David C. Walters

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this research was to develop a systems theory-based framework for leadership in governance of complex systems. Recognizing complexity and uncertainty as norms for the environments in which organizations exist encouraged researchers to suggest complexity theory, complex systems, and complex adaptive systems as appropriate for addressing these conditions. Complex System Governance (CSG), based in systems theory, management cybernetics, and governance, endeavors to provide for the design, execution and evolution of functions that provide control, communication, coordination, and integration at the metasystem level to support operations and continued system existence (viability). From a management cybernetics perspective, CSG leadership has …


Lean Application: An Assessment Of 5s On Employee Attitudes And Productivity, Nickolaos Dimitrios Karvounis Dec 2021

Lean Application: An Assessment Of 5s On Employee Attitudes And Productivity, Nickolaos Dimitrios Karvounis

STEMPS Theses & Dissertations

This study examines the effect of the implementation of 5S on employee attitudes and productivity in an Asian based facility of a global manufacturing company. Utilizing an assessment of the 5S implementation in various areas of the facility and organizational performance data for each of those areas, a non-experimental, causal comparative approach is used to analyze the impact. The study concluded that statistically significant improvements from the implementation of 5S were found both in quality and product cost for this facility; however, the study also found statistical significance where the implementation of 5S led to a decrease in performance and …


Application Of A Blockchain Enabled Model In Disaster Aids Supply Network Resilience, Farinaz Sabz Ali Pour Jul 2021

Application Of A Blockchain Enabled Model In Disaster Aids Supply Network Resilience, Farinaz Sabz Ali Pour

Engineering Management & Systems Engineering Theses & Dissertations

The disaster area is a dynamic environment. The bottleneck in distributing the supplies may be from the damaged infrastructure or the unavailability of accurate information about the required amounts. The success of the disaster response network is based on collaboration, coordination, sovereignty, and equality in relief distribution. Therefore, a reliable dynamic communication system is required to facilitate the interactions, enhance the knowledge for the relief operation, prioritize, and coordinate the goods distribution. One of the promising innovative technologies is blockchain technology which enables transparent, secure, and real-time information exchange and automation through smart contracts. This study analyzes the application of …


A Behavioral Model For Simultaneous Event Execution In Sequential Discrete Event System Simulations, Brian David S. Dilinila Apr 2021

A Behavioral Model For Simultaneous Event Execution In Sequential Discrete Event System Simulations, Brian David S. Dilinila

Computational Modeling & Simulation Engineering Theses & Dissertations

The sequential execution of simultaneous events in a discrete event system simulation can cause unexpected behavior in a system. Current studies have provided approaches such as applying a priority order for simultaneous events. However, this is still a problem because executing simultaneous events in sequential order can still lead to two issues of simultaneous event conflicts: the case where simultaneous events cause changes to state variables required by other simultaneous events and the case where two or more simultaneous events cause changes to the same state variables. The objective of this thesis is to develop a behavioral model as a …


Specification, Control, And Applications Of Z-Source Circuit Breakers For The Protection Of Dc Power Networks, Sagar Bhatta Apr 2021

Specification, Control, And Applications Of Z-Source Circuit Breakers For The Protection Of Dc Power Networks, Sagar Bhatta

Electrical & Computer Engineering Theses & Dissertations

There is a highly-increasing demand for the DC power transmission and distribution in modern power systems for the integration of newly-installed renewable energy resources and storage systems to the existing utilities. Application of DC power systems in electric ships, battery energy devices, high-voltage DC networks, smart grids, electric vehicles, microgrids, and wind farms is a recent trend that is being highly investigated. The fault protection of DC systems is an essential but challenging issue that needs careful attention to maintain system operation reliability and device safety. In this research, the specification, control, and application of Z-source breakers (ZCBs) are investigated …


Authentication Schemes' Impact On Working Memory, Janine D. Mator Apr 2021

Authentication Schemes' Impact On Working Memory, Janine D. Mator

Psychology Theses & Dissertations

Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …


Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya Apr 2021

Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya

Engineering Management & Systems Engineering Theses & Dissertations

The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …


Using Interacting Multiple Model Filters To Indicate Program Risk, Amy Sunshine Smith-Carroll Dec 2020

Using Interacting Multiple Model Filters To Indicate Program Risk, Amy Sunshine Smith-Carroll

Engineering Management & Systems Engineering Theses & Dissertations

Technology development has increased exponentially. Program managers are pushed to accelerate development. There are many resources available to program managers that enable acceleration, such as: additional resources in the form of funding, people and technology. There are also negative impacts to acceleration, such as: inclusion, inexperience program managers, and communication. This research seeks to identify the limit to which a program or project can be accelerated before the program manager begins to accept an unacceptable amount of pre-determined risk.

This research will utilize estimation algorithms used by sensor systems to estimate the current and future state of objects in space. …


An Investigation On The Effectiveness Of A Problem Structuring Method In A Group Decision-Making Process, Ying Thaviphoke Dec 2020

An Investigation On The Effectiveness Of A Problem Structuring Method In A Group Decision-Making Process, Ying Thaviphoke

Engineering Management & Systems Engineering Theses & Dissertations

There is no shortage of methods to address messy problems. A messy problem is a system of problems with multiple stakeholders who may hold different views of what is feasible or desirable. Decision-makers in a messy problem are prone to committing an error – especially the Type III error. One of the ways to mitigate the chance of committing the error in a messy problem is to reach a group consensus. Problem Structuring Methods (PSM) are the collections of participatory modeling methods that aim to tackle a messy problem. Despite the positive reports, literature indicates some challenges and criticisms of …


Parametric Study Of Residual Stresses In Wire And Arc Additive Manufactured Parts, Hisham Khaled Jamil Abusalma Dec 2020

Parametric Study Of Residual Stresses In Wire And Arc Additive Manufactured Parts, Hisham Khaled Jamil Abusalma

Mechanical & Aerospace Engineering Theses & Dissertations

Wire and Arc Additive Manufacturing (WAAM) is a cost-effective additive manufacturing process due to its capability to fabricate large metal parts with high deposition rate and low equipment cost. Although this method is gaining popularity in manufacturing industry, more research is needed to understand process parameters’ effects on residual stress (RS) distribution and part distortion. As such, a 3D thermo-elastic-plastic transient model was established in ABAQUS and employed to investigate the effect of process parameters such as the torch speed, the deposition power and the interlayer dwell time on RS distribution and distortion in WAAM part. The numerical model utilized …


A Core Reference Hierarchical Primitive Ontology For Electronic Medical Records Semantics Interoperability, Ziniya Zahedi Aug 2020

A Core Reference Hierarchical Primitive Ontology For Electronic Medical Records Semantics Interoperability, Ziniya Zahedi

Engineering Management & Systems Engineering Theses & Dissertations

Currently, electronic medical records (EMR) cannot be exchanged among hospitals, clinics, laboratories, pharmacies, and insurance providers or made available to patients outside of local networks. Hospital, laboratory, pharmacy, and insurance provider legacy databases can share medical data within a respective network and limited data with patients. The lack of interoperability has its roots in the historical development of electronic medical records. Two issues contribute to interoperability failure. The first is that legacy medical record databases and expert systems were designed with semantics that support only internal information exchange. The second is ontological commitment to the semantics of a particular knowledge …


A Quest To Identify The Emerging Leadership Skills In Vuca World And Investigation Of Their Applications In Various Organizational Levels And Security Environments, Ali Can Kucukozyigit Aug 2020

A Quest To Identify The Emerging Leadership Skills In Vuca World And Investigation Of Their Applications In Various Organizational Levels And Security Environments, Ali Can Kucukozyigit

Engineering Management & Systems Engineering Theses & Dissertations

The theoretical framework of this research is based on “skills approach” that emphasizes the leader’s capabilities (skills, knowledge, and capabilities) that can be learned, taught, and fostered. VUCA (Volatile, Uncertain, Complex and Ambiguous) environment is chosen as the focal point of this research as the leadership skills are extracted from studies referring to such environment. Although the acronym is dominantly used in management and business domains, the military also uses it to describe the complex operational environments like in Iraq and Afghanistan. The identification of individual leadership skills and delivering the right skill, at the right time, to the right …


Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz Aug 2020

Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz

Engineering Management & Systems Engineering Theses & Dissertations

Cyber-systems provide convenience, ubiquity, economic advantage, and higher efficiency to both individuals and organizations. However, vulnerabilities of the cyber domain also offer malicious actors with the opportunities to compromise the most sensitive information. Recent cybersecurity incidents show that a group of hackers can cause a massive data breach, resulting in companies losing competitive advantage, reputation, and money. Governments have since taken some actions in protecting individuals and companies from such crime by authorizing federal agencies and developing regulations. To protect the public from losing their most sensitive records, governments have also been compelling companies to follow cybersecurity regulations. If companies …


A Framework For Adaptive Capacity In Complex Systems, Abdulrahman Alfaqiri Aug 2020

A Framework For Adaptive Capacity In Complex Systems, Abdulrahman Alfaqiri

Engineering Management & Systems Engineering Theses & Dissertations

Complex systems are characterized by their high level of inter-connectivity, ambiguity, and emergence. Therefore, a failure in one element of a system (e.g. cyber layer) due to external or internal disturbances can lead to a cascade effect that may influence all elements of the system. Consequently, the complex system will not be able to perform its functional performance. Threats related to complex systems are very dynamic, fast, complex and damage can be severe. Thus, to respond to the dynamic and unpredictable nature of these threats, complex systems need to be highly adaptive to survive and thrive in the face of …


Human Error In Commercial Fishing Vessel Accidents: An Investigation Using The Human Factors Analysis And Classification System, Peter J. Zohorsky Aug 2020

Human Error In Commercial Fishing Vessel Accidents: An Investigation Using The Human Factors Analysis And Classification System, Peter J. Zohorsky

Engineering Management & Systems Engineering Theses & Dissertations

The commercial fishing industry is frequently described as one of the most hazardous occupations in the United States. The objective, to maximize the catch, is routinely challenged by a variety of elements due to the environment, the vessel, the crew, and several external considerations and how they interact with each other. The analysis of fishing vessel accidents can be complicated due to the diverse nature of the industry, including the species caught, the type and size of boat that is employed, how far travelled from their homeport, and the adequacy of the support organizations ensuring safe and uninterrupted operations. This …


Application Of Theory Of Constraints (Toc) In Managing Project Information Constraints, Ferdinand Z. Prantl Apr 2020

Application Of Theory Of Constraints (Toc) In Managing Project Information Constraints, Ferdinand Z. Prantl

Engineering Management & Systems Engineering Projects for D. Eng. Degree

The scope of this doctoral project is the non-traditional application of Drum-Buffer-Rope (DBR) from the area of Theory of Constraints (ToC) in mitigating disruption in distribution facilities during phased upgrades caused by information constraint. The relevance of this project is that industrial equipment upgrades pose a significant risk of disrupting the operation of automated distribution facilities. It is partly due to a very high expected availability rate, as well as tight coupling with other upstream and downstream elements of the larger supply chain network. As a consequence of disruption in this scenario, losses incurred not only within the facility being …


Dod Mission Engineering And Integration Explorative-Exploitative Architecture For Technology Innovation, Jose L. Bricio-Neto Apr 2020

Dod Mission Engineering And Integration Explorative-Exploitative Architecture For Technology Innovation, Jose L. Bricio-Neto

Engineering Management & Systems Engineering Theses & Dissertations

The ability of U.S. Department of Defense to achieve timely innovation in support of U.S. National Defense and Military Strategies continues to increase in significance. The growing challenges in U.S. Department of Defense (DoD) technological innovation in a context of global security and rapid pace of global competitiveness continue to reveal many shortcomings in current weapon systems development and acquisition practice. As the pace of technological innovation is accelerating, the DoD faces the challenge that the same disruptive technological advances are also being made available to or developed by its adversaries. Based on literature review, no innovation system theory exists …