Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway Apr 2012

Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway

Engineering Management & Systems Engineering Theses & Dissertations

For a number of years, the United States Federal Government has been formulating the Next Generation Air Transportation System plans for National Airspace System improvement. These improvements attempt to address air transportation holistically, but often address individual improvements in one arena such as ground or in-flight equipment.

In fact, air transportation system designers have had only limited success using traditional Operations Research and parametric modeling approaches in their analyses of innovative operations. They need a systemic methodology for modeling of safety-critical infrastructure that is comprehensive, objective, and sufficiently concrete, yet simple enough to be deployed with reasonable investment. The methodology …


Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill Apr 2012

Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill

Engineering Management & Systems Engineering Theses & Dissertations

Risk for homeland security and homeland defense is often considered to be a function of threat, vulnerability, and consequence. But what is that function? And are we defining and measuring these terms consistently? Threat, vulnerability, and consequence assessments are conducted, often separately, and data from one assessment could be drastically different from that of another due to inconsistent definitions of terms and measurements, differing data collection methods, or varying data sources. It has also long been a challenge to integrate these three disparate assessments to establish an overall picture of risk to a given asset. Further, many agencies conduct these …


Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk Apr 2012

Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this research is to explore the conceptual background of agility in knowledge management, re-conceptualize it and extend it to military applications with a special focus on Counterinsurgency (COIN).

An initial qualitative exploration of agility in knowledge management was performed. Three different concepts and their interrelationships were analyzed: (1) knowledge management, (2) agility in operations, and (3) military organizations in the COIN environment. Findings from this initial qualitative analysis were used to inductively redefine, re-conceptualize and extend the concept of Agile Knowledge Management (AKM), as well as, to compare and adapt the AKM concept to the military environment …


An Analysis Of Factors Affecting The Effective Use Of Knowledge Management In Counter Improvised Explosive Device (C-Ied) Operations, Umit Gencer Apr 2012

An Analysis Of Factors Affecting The Effective Use Of Knowledge Management In Counter Improvised Explosive Device (C-Ied) Operations, Umit Gencer

Engineering Management & Systems Engineering Theses & Dissertations

This dissertation investigates factors that influence effective use of Knowledge Management (KM) in Counter Improvised Explosive Device (C-IED) operations in the military.

The study suggests that effective KM program is determined by the interaction of three organizational capabilities: knowledge infrastructure, knowledge process, and leadership orientation.

A self-administrated survey was conducted on 300 NATO staff officers who have served in C-IED environments. A structural equation modeling technique was used to test a set of hypotheses using 118 completed responses collected from the survey.

The results suggest that out of the 11 constructs within the model; two are rated as 'attribute needs …