Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

A Study Of Onboarding And Turnover Mediating Variables In U.S. Air Force Officers, Brett S. Bowers Sep 2019

A Study Of Onboarding And Turnover Mediating Variables In U.S. Air Force Officers, Brett S. Bowers

Theses and Dissertations

Employee retention, while always a concern in the workplace, has become a greater challenge for organizations in recent years. Today’s working class has displayed a propensity to change jobs more rapidly than previous generations, exacerbating not only turnover rates but also the costs associated with them (Frankel, 2016). This challenge is especially relevant to the United States Air Force, which has experienced difficulty retaining young officers in recent years. The problems resulting from this voluntary turnover are exceedingly impactful to the military command structure, as senior leaders must work their way up from the lowest ranks. As such, the Air …


Operational Decision Making Under Uncertainty: Inferential, Sequential, And Adversarial Approaches, Andrew J. Keith Aug 2019

Operational Decision Making Under Uncertainty: Inferential, Sequential, And Adversarial Approaches, Andrew J. Keith

Theses and Dissertations

Modern security threats are characterized by a stochastic, dynamic, partially observable, and ambiguous operational environment. This dissertation addresses such complex security threats using operations research techniques for decision making under uncertainty in operations planning, analysis, and assessment. First, this research develops a new method for robust queue inference with partially observable, stochastic arrival and departure times, motivated by cybersecurity and terrorism applications. In the dynamic setting, this work develops a new variant of Markov decision processes and an algorithm for robust information collection in dynamic, partially observable and ambiguous environments, with an application to a cybersecurity detection problem. In the …