Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Project management (10)
- Decision making (7)
- Engineering management (7)
- Knowledge management (7)
- Scheduling (7)
-
- Simulation (6)
- Systems theory (6)
- Complex systems (5)
- Risk management (5)
- Cybersecurity (4)
- Discrete event simulation (4)
- Interoperability (4)
- Management (4)
- Military (4)
- Modeling and simulation (4)
- Optimization (4)
- Quality control (4)
- Agent-based modeling (3)
- Complex systems governance (3)
- Complexity (3)
- Cybernetics (3)
- Decision-making (3)
- Emotional intelligence (3)
- Evaluation (3)
- Failure (3)
- Governance (3)
- Information technology (3)
- Knowledge transfer (3)
- Leadership (3)
- Mathematical models (3)
- Publication Year
- Publication
-
- Engineering Management & Systems Engineering Theses & Dissertations (196)
- Computational Modeling & Simulation Engineering Theses & Dissertations (13)
- Mechanical & Aerospace Engineering Theses & Dissertations (12)
- Engineering Management & Systems Engineering Projects for D. Eng. Degree (7)
- Psychology Theses & Dissertations (7)
Articles 1 - 30 of 244
Full-Text Articles in Engineering
Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane
Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane
Engineering Management & Systems Engineering Theses & Dissertations
Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.
With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …
Design And Implementation Of A Launching Method For Free To Oscillate Dynamic Stability Testing, Kristen M. Carey
Design And Implementation Of A Launching Method For Free To Oscillate Dynamic Stability Testing, Kristen M. Carey
Mechanical & Aerospace Engineering Theses & Dissertations
Magnetic Suspension and Balance Systems (MSBS) allow for static, forced oscillation and free to oscillate dynamic stability testing in a wind tunnel without the need for a physical support. The objectives of study are to assist in the application of the free to oscillate testing method in an MSBS to determine dynamic stability characteristics for various re-entry capsule designs.
This thesis discusses the development and testing of a launching method called the grabber for use in the MSBS Subsonic Wind Tunnel at NASA Langley Research Center. Aerodynamic tests were run to support the use of this method and compare the …
Human Psychology Factors Influencing Agile Team Autonomy In Post-Pandemic Remote Software Organizations, Ravikiran Kalluri
Human Psychology Factors Influencing Agile Team Autonomy In Post-Pandemic Remote Software Organizations, Ravikiran Kalluri
Engineering Management & Systems Engineering Theses & Dissertations
Agile project management methods are gaining in popularity in the software industry as software development teams are being asked to be adaptive to market needs and resilient to change and uncertainty. With increasing market uncertainty, global competition, and time-to-market pressure, it is becoming a challenge to develop an innovative product and deliver it on-time without the opportunity that comes from team autonomy to experiment and learn from failures in a remote workplace. To resolve this challenge, it is critical to understand the myriad human psychological factors in play that influence Agile team autonomy in a remote work environment.
The role …
Sealion Cubesat Mission Architecture Using Model Based Systems Engineering With A Docs As Code Approach, Kevin Yi-Tzu Chiu
Sealion Cubesat Mission Architecture Using Model Based Systems Engineering With A Docs As Code Approach, Kevin Yi-Tzu Chiu
Mechanical & Aerospace Engineering Theses & Dissertations
CubeSats are a growing population within the space industry. Every year, universities launch numerous amounts of CubeSats due to their inexpensive cost of development, launch, and deployment. However, this comes with numerous challenges. As the number of university-CubeSats grow, so too do the numbers that fail. With development teams consisting mainly of students with little to no training, proper and yet easy to use tools or methods should be implemented to help ensure mission success. Especially in the critical stages of planning before and during development, a technical approach to quickly track life cycle development of a CubeSat is needed. …
Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque
Cyber Resilience Analytics For Cyber-Physical Systems, Md Ariful Haque
Electrical & Computer Engineering Theses & Dissertations
Cyber-physical systems (CPSs) are complex systems that evolve from the integrations of components dealing with physical processes and real-time computations, along with networking. CPSs often incorporate approaches merging from different scientific fields such as embedded systems, control systems, operational technology, information technology systems (ITS), and cybernetics. Today critical infrastructures (CIs) (e.g., energy systems, electric grids, etc.) and other CPSs (e.g., manufacturing industries, autonomous transportation systems, etc.) are experiencing challenges in dealing with cyberattacks. Major cybersecurity concerns are rising around CPSs because of their ever-growing use of information technology based automation. Often the security concerns are limited to probability-based possible attack …
Learning Curve Characterization Within Complex Low-Rate Production Environments, Robert J. Gies
Learning Curve Characterization Within Complex Low-Rate Production Environments, Robert J. Gies
Engineering Management & Systems Engineering Theses & Dissertations
Traditional and current learning curve approaches, methods, and theories were deficient when addressing complex low-rate production systems. The purpose of this research was to address this problem and develop a learning curve approach that characterizes learning in low-rate production environments such as naval ship construction. This research identified the principal aspects that influence learning within this environment and developed a learning characterization more reflective of this environment.
There obviously exists a large body of knowledge covering learning. However, the research contained herein addresses learning as it relates to learning curves in low-rate production environments, such as naval shipbuilding. The various …
Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy
Hard-Real-Time Computing Performance In A Cloud Environment, Alvin Cornelius Murphy
Engineering Management & Systems Engineering Theses & Dissertations
The United States Department of Defense (DoD) is rapidly working with DoD Services to move from multi-year (e.g., 7-10) traditional acquisition programs to a commercial industrybased approach for software development. While commercial technologies and approaches provide an opportunity for rapid fielding of mission capabilities to pace threats, the suitability of commercial technologies to meet hard-real-time requirements within a surface combat system is unclear. This research establishes technical data to validate the effectiveness and suitability of current commercial technologies to meet the hard-real-time demands of a DoD combat management system. (Moreland Jr., 2013) conducted similar research; however, microservices, containers, and container …
A Systems Theory-Based Framework For Environmental Scanning In Complex System Governance, Dale E. Baugh
A Systems Theory-Based Framework For Environmental Scanning In Complex System Governance, Dale E. Baugh
Engineering Management & Systems Engineering Theses & Dissertations
The purpose of this research was to develop a Systems Theory-based framework for Environmental Scanning (ES) in Complex System Governance (CSG) using an inductive research design. Complexity and uncertainty are normal for external environments in which today’s systems (organizations) exist. These environmental characteristics provide impetus for researchers to focus on organizational planning for disruptive external forces that could threaten system stability and future system existence. The ES function supports the requisite governance metasystemic functions to be enabled, executed, and evolved sufficiently well to promote continuous system viability. In this research the functioning of ES was examined from a diverse literature-based …
A Quality Systems Economic-Risk Design Theoretical Framework, Abdallah S. Thefeid
A Quality Systems Economic-Risk Design Theoretical Framework, Abdallah S. Thefeid
Engineering Management & Systems Engineering Theses & Dissertations
Quality systems, including control charts theory and sampling plans, have become essential tools to develop business processes. Since 1928, research has been conducted in developing the economic-risk designs for specific types of control charts or sampling plans. However, there has been no theoretical or applied research attempts to combine these related theories into a synthesized theoretical framework of quality systems economic-risk design. This research proposes to develop a theoretical framework of quality systems economic-risk design from qualitative research synthesis of the economic-risk design of sampling plan models and control charts models. This theoretical framework will be useful in guiding future …
Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan
Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan
Computer Science Theses & Dissertations
In-situ process monitoring for metals additive manufacturing is paramount to the successful build of an object for application in extreme or high stress environments. In selective laser melting additive manufacturing, the process by which a laser melts metal powder during the build will dictate the internal microstructure of that object once the metal cools and solidifies. The difficulty lies in that obtaining enough variety of data to quantify the internal microstructures for the evaluation of its physical properties is problematic, as the laser passes at high speeds over powder grains at a micrometer scale. Imaging the process in-situ is complex …
Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin
Predictors Of Email Response: Determinants Of The Intention Of Not Following Security Recommendations, Miguel Angel Toro-Jarrin
Engineering Management & Systems Engineering Theses & Dissertations
Organizations and government leaders are concerned about cyber incidents. For some time, researchers have studied what motivates people to act in ways that put the confidentiality, integrity, and availability of information in organizations at risk. Still, several areas remained unexplored, including the role of employees’ evaluation of the organizational systems and the role of value orientation at work as precursors of secure and insecure actions in relation to information technologies (information security [IS] action). The objective of this research project was to examine how the evaluations of formal and informal security norms are associated with the intention to follow them …
Finding Core Members Of A Hedonic Game, Daniele M. Vernon-Bido
Finding Core Members Of A Hedonic Game, Daniele M. Vernon-Bido
Computational Modeling & Simulation Engineering Theses & Dissertations
Agent-based modeling (ABM) is a frequently used paradigm for social simulation; however, there is little evidence of its use in strategic coalition formations. There are few models that explore coalition formation and even fewer that validate their results against an expected outcome. Cooperative game theory is often used to study strategic coalition formation but solving games involving a significant number of agents is computationally intractable. However, there is a natural linkage between ABM and the study of strategic coalition formation. A foundational feature of ABM is the interaction of agents and their environment. Coalition formation is primarily the result of …
Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci
Deep Learning Object-Based Detection Of Manufacturing Defects In X-Ray Inspection Imaging, Juan C. Parducci
Mechanical & Aerospace Engineering Theses & Dissertations
Current analysis of manufacturing defects in the production of rims and tires via x-ray inspection at an industry partner’s manufacturing plant requires that a quality control specialist visually inspect radiographic images for defects of varying sizes. For each sample, twelve radiographs are taken within 35 seconds. Some defects are very small in size and difficult to see (e.g., pinholes) whereas others are large and easily identifiable. Implementing this quality control practice across all products in its human-effort driven state is not feasible given the time constraint present for analysis.
This study aims to identify and develop an object detector capable …
Complex System Governance Leadership, David C. Walters
Complex System Governance Leadership, David C. Walters
Engineering Management & Systems Engineering Theses & Dissertations
The purpose of this research was to develop a systems theory-based framework for leadership in governance of complex systems. Recognizing complexity and uncertainty as norms for the environments in which organizations exist encouraged researchers to suggest complexity theory, complex systems, and complex adaptive systems as appropriate for addressing these conditions. Complex System Governance (CSG), based in systems theory, management cybernetics, and governance, endeavors to provide for the design, execution and evolution of functions that provide control, communication, coordination, and integration at the metasystem level to support operations and continued system existence (viability). From a management cybernetics perspective, CSG leadership has …
Lean Application: An Assessment Of 5s On Employee Attitudes And Productivity, Nickolaos Dimitrios Karvounis
Lean Application: An Assessment Of 5s On Employee Attitudes And Productivity, Nickolaos Dimitrios Karvounis
STEMPS Theses & Dissertations
This study examines the effect of the implementation of 5S on employee attitudes and productivity in an Asian based facility of a global manufacturing company. Utilizing an assessment of the 5S implementation in various areas of the facility and organizational performance data for each of those areas, a non-experimental, causal comparative approach is used to analyze the impact. The study concluded that statistically significant improvements from the implementation of 5S were found both in quality and product cost for this facility; however, the study also found statistical significance where the implementation of 5S led to a decrease in performance and …
Application Of A Blockchain Enabled Model In Disaster Aids Supply Network Resilience, Farinaz Sabz Ali Pour
Application Of A Blockchain Enabled Model In Disaster Aids Supply Network Resilience, Farinaz Sabz Ali Pour
Engineering Management & Systems Engineering Theses & Dissertations
The disaster area is a dynamic environment. The bottleneck in distributing the supplies may be from the damaged infrastructure or the unavailability of accurate information about the required amounts. The success of the disaster response network is based on collaboration, coordination, sovereignty, and equality in relief distribution. Therefore, a reliable dynamic communication system is required to facilitate the interactions, enhance the knowledge for the relief operation, prioritize, and coordinate the goods distribution. One of the promising innovative technologies is blockchain technology which enables transparent, secure, and real-time information exchange and automation through smart contracts. This study analyzes the application of …
A Behavioral Model For Simultaneous Event Execution In Sequential Discrete Event System Simulations, Brian David S. Dilinila
A Behavioral Model For Simultaneous Event Execution In Sequential Discrete Event System Simulations, Brian David S. Dilinila
Computational Modeling & Simulation Engineering Theses & Dissertations
The sequential execution of simultaneous events in a discrete event system simulation can cause unexpected behavior in a system. Current studies have provided approaches such as applying a priority order for simultaneous events. However, this is still a problem because executing simultaneous events in sequential order can still lead to two issues of simultaneous event conflicts: the case where simultaneous events cause changes to state variables required by other simultaneous events and the case where two or more simultaneous events cause changes to the same state variables. The objective of this thesis is to develop a behavioral model as a …
Specification, Control, And Applications Of Z-Source Circuit Breakers For The Protection Of Dc Power Networks, Sagar Bhatta
Specification, Control, And Applications Of Z-Source Circuit Breakers For The Protection Of Dc Power Networks, Sagar Bhatta
Electrical & Computer Engineering Theses & Dissertations
There is a highly-increasing demand for the DC power transmission and distribution in modern power systems for the integration of newly-installed renewable energy resources and storage systems to the existing utilities. Application of DC power systems in electric ships, battery energy devices, high-voltage DC networks, smart grids, electric vehicles, microgrids, and wind farms is a recent trend that is being highly investigated. The fault protection of DC systems is an essential but challenging issue that needs careful attention to maintain system operation reliability and device safety. In this research, the specification, control, and application of Z-source breakers (ZCBs) are investigated …
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Authentication Schemes' Impact On Working Memory, Janine D. Mator
Psychology Theses & Dissertations
Authentication is the process by which a computing system validates a user’s identity. Although this process is necessary for system security, users view authentication as a frequent disruption to their primary tasks. During this disruption, primary task information must be actively maintained in working memory. As a result, primary task information stored in working memory is at risk of being lost or corrupted while users authenticate. For over two decades, researchers have focused on developing more memorable passwords by replacing alphanumeric text with visual graphics (Biddle et al., 2012). However, very little attention has been given to the impact authentication …
Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya
Cybersecurity Risk Assessment Using Graph Theoretical Anomaly Detection And Machine Learning, Goksel Kucukkaya
Engineering Management & Systems Engineering Theses & Dissertations
The cyber domain is a great business enabler providing many types of enterprises new opportunities such as scaling up services, obtaining customer insights, identifying end-user profiles, sharing data, and expanding to new communities. However, the cyber domain also comes with its own set of risks. Cybersecurity risk assessment helps enterprises explore these new opportunities and, at the same time, proportionately manage the risks by establishing cyber situational awareness and identifying potential consequences. Anomaly detection is a mechanism to enable situational awareness in the cyber domain. However, anomaly detection also requires one of the most extensive sets of data and features …
Using Interacting Multiple Model Filters To Indicate Program Risk, Amy Sunshine Smith-Carroll
Using Interacting Multiple Model Filters To Indicate Program Risk, Amy Sunshine Smith-Carroll
Engineering Management & Systems Engineering Theses & Dissertations
Technology development has increased exponentially. Program managers are pushed to accelerate development. There are many resources available to program managers that enable acceleration, such as: additional resources in the form of funding, people and technology. There are also negative impacts to acceleration, such as: inclusion, inexperience program managers, and communication. This research seeks to identify the limit to which a program or project can be accelerated before the program manager begins to accept an unacceptable amount of pre-determined risk.
This research will utilize estimation algorithms used by sensor systems to estimate the current and future state of objects in space. …
An Investigation On The Effectiveness Of A Problem Structuring Method In A Group Decision-Making Process, Ying Thaviphoke
An Investigation On The Effectiveness Of A Problem Structuring Method In A Group Decision-Making Process, Ying Thaviphoke
Engineering Management & Systems Engineering Theses & Dissertations
There is no shortage of methods to address messy problems. A messy problem is a system of problems with multiple stakeholders who may hold different views of what is feasible or desirable. Decision-makers in a messy problem are prone to committing an error – especially the Type III error. One of the ways to mitigate the chance of committing the error in a messy problem is to reach a group consensus. Problem Structuring Methods (PSM) are the collections of participatory modeling methods that aim to tackle a messy problem. Despite the positive reports, literature indicates some challenges and criticisms of …
Parametric Study Of Residual Stresses In Wire And Arc Additive Manufactured Parts, Hisham Khaled Jamil Abusalma
Parametric Study Of Residual Stresses In Wire And Arc Additive Manufactured Parts, Hisham Khaled Jamil Abusalma
Mechanical & Aerospace Engineering Theses & Dissertations
Wire and Arc Additive Manufacturing (WAAM) is a cost-effective additive manufacturing process due to its capability to fabricate large metal parts with high deposition rate and low equipment cost. Although this method is gaining popularity in manufacturing industry, more research is needed to understand process parameters’ effects on residual stress (RS) distribution and part distortion. As such, a 3D thermo-elastic-plastic transient model was established in ABAQUS and employed to investigate the effect of process parameters such as the torch speed, the deposition power and the interlayer dwell time on RS distribution and distortion in WAAM part. The numerical model utilized …
A Core Reference Hierarchical Primitive Ontology For Electronic Medical Records Semantics Interoperability, Ziniya Zahedi
A Core Reference Hierarchical Primitive Ontology For Electronic Medical Records Semantics Interoperability, Ziniya Zahedi
Engineering Management & Systems Engineering Theses & Dissertations
Currently, electronic medical records (EMR) cannot be exchanged among hospitals, clinics, laboratories, pharmacies, and insurance providers or made available to patients outside of local networks. Hospital, laboratory, pharmacy, and insurance provider legacy databases can share medical data within a respective network and limited data with patients. The lack of interoperability has its roots in the historical development of electronic medical records. Two issues contribute to interoperability failure. The first is that legacy medical record databases and expert systems were designed with semantics that support only internal information exchange. The second is ontological commitment to the semantics of a particular knowledge …
A Quest To Identify The Emerging Leadership Skills In Vuca World And Investigation Of Their Applications In Various Organizational Levels And Security Environments, Ali Can Kucukozyigit
A Quest To Identify The Emerging Leadership Skills In Vuca World And Investigation Of Their Applications In Various Organizational Levels And Security Environments, Ali Can Kucukozyigit
Engineering Management & Systems Engineering Theses & Dissertations
The theoretical framework of this research is based on “skills approach” that emphasizes the leader’s capabilities (skills, knowledge, and capabilities) that can be learned, taught, and fostered. VUCA (Volatile, Uncertain, Complex and Ambiguous) environment is chosen as the focal point of this research as the leadership skills are extracted from studies referring to such environment. Although the acronym is dominantly used in management and business domains, the military also uses it to describe the complex operational environments like in Iraq and Afghanistan. The identification of individual leadership skills and delivering the right skill, at the right time, to the right …
Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz
Cyber-Assets At Risk (Car): Monetary Impact Of Personally Identifiable Information Data Breaches On Companies, Omer Ilker Poyraz
Engineering Management & Systems Engineering Theses & Dissertations
Cyber-systems provide convenience, ubiquity, economic advantage, and higher efficiency to both individuals and organizations. However, vulnerabilities of the cyber domain also offer malicious actors with the opportunities to compromise the most sensitive information. Recent cybersecurity incidents show that a group of hackers can cause a massive data breach, resulting in companies losing competitive advantage, reputation, and money. Governments have since taken some actions in protecting individuals and companies from such crime by authorizing federal agencies and developing regulations. To protect the public from losing their most sensitive records, governments have also been compelling companies to follow cybersecurity regulations. If companies …
A Framework For Adaptive Capacity In Complex Systems, Abdulrahman Alfaqiri
A Framework For Adaptive Capacity In Complex Systems, Abdulrahman Alfaqiri
Engineering Management & Systems Engineering Theses & Dissertations
Complex systems are characterized by their high level of inter-connectivity, ambiguity, and emergence. Therefore, a failure in one element of a system (e.g. cyber layer) due to external or internal disturbances can lead to a cascade effect that may influence all elements of the system. Consequently, the complex system will not be able to perform its functional performance. Threats related to complex systems are very dynamic, fast, complex and damage can be severe. Thus, to respond to the dynamic and unpredictable nature of these threats, complex systems need to be highly adaptive to survive and thrive in the face of …
Human Error In Commercial Fishing Vessel Accidents: An Investigation Using The Human Factors Analysis And Classification System, Peter J. Zohorsky
Human Error In Commercial Fishing Vessel Accidents: An Investigation Using The Human Factors Analysis And Classification System, Peter J. Zohorsky
Engineering Management & Systems Engineering Theses & Dissertations
The commercial fishing industry is frequently described as one of the most hazardous occupations in the United States. The objective, to maximize the catch, is routinely challenged by a variety of elements due to the environment, the vessel, the crew, and several external considerations and how they interact with each other. The analysis of fishing vessel accidents can be complicated due to the diverse nature of the industry, including the species caught, the type and size of boat that is employed, how far travelled from their homeport, and the adequacy of the support organizations ensuring safe and uninterrupted operations. This …
Application Of Theory Of Constraints (Toc) In Managing Project Information Constraints, Ferdinand Z. Prantl
Application Of Theory Of Constraints (Toc) In Managing Project Information Constraints, Ferdinand Z. Prantl
Engineering Management & Systems Engineering Projects for D. Eng. Degree
The scope of this doctoral project is the non-traditional application of Drum-Buffer-Rope (DBR) from the area of Theory of Constraints (ToC) in mitigating disruption in distribution facilities during phased upgrades caused by information constraint. The relevance of this project is that industrial equipment upgrades pose a significant risk of disrupting the operation of automated distribution facilities. It is partly due to a very high expected availability rate, as well as tight coupling with other upstream and downstream elements of the larger supply chain network. As a consequence of disruption in this scenario, losses incurred not only within the facility being …
Dod Mission Engineering And Integration Explorative-Exploitative Architecture For Technology Innovation, Jose L. Bricio-Neto
Dod Mission Engineering And Integration Explorative-Exploitative Architecture For Technology Innovation, Jose L. Bricio-Neto
Engineering Management & Systems Engineering Theses & Dissertations
The ability of U.S. Department of Defense to achieve timely innovation in support of U.S. National Defense and Military Strategies continues to increase in significance. The growing challenges in U.S. Department of Defense (DoD) technological innovation in a context of global security and rapid pace of global competitiveness continue to reveal many shortcomings in current weapon systems development and acquisition practice. As the pace of technological innovation is accelerating, the DoD faces the challenge that the same disruptive technological advances are also being made available to or developed by its adversaries. Based on literature review, no innovation system theory exists …