Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Engineering Management & Systems Engineering Theses & Dissertations

2012

Discipline
Keyword

Articles 1 - 12 of 12

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali Oct 2012

The Factors Behind A Successful Implementation Of Electronic Health Records Systems, Anjee Gorkhali

Engineering Management & Systems Engineering Theses & Dissertations

This research explores the role that budget for Information System (IS) and technical expertise of healthcare service provider staff play on the successful leap from a partial to exhaustive implementation of Electronic Health Records (EHR) Systems. Technical expertise in Information Systems might not be easily measurable directly, but there are a number of indicators that could be used as a proxy, such as: Information System (IS) Department Budget, number of IS staff and the extent of technical trainings provided by the IS department to the clinical staff. This research study hypothesizes that quality technical trainings conducted by an IS department …


Incorporating Memory And Learning Mechanisms Into Meta-Raps, Arif Arin Jul 2012

Incorporating Memory And Learning Mechanisms Into Meta-Raps, Arif Arin

Engineering Management & Systems Engineering Theses & Dissertations

Due to the rapid increase of dimensions and complexity of real life problems, it has become more difficult to find optimal solutions using only exact mathematical methods. The need to find near-optimal solutions in an acceptable amount of time is a challenge when developing more sophisticated approaches. A proper answer to this challenge can be through the implementation of metaheuristic approaches. However, a more powerful answer might be reached by incorporating intelligence into metaheuristics.

Meta-RaPS (Metaheuristic for Randomized Priority Search) is a metaheuristic that creates high quality solutions for discrete optimization problems. It is proposed that incorporating memory and learning …


Establishing Relationships Between Risk Management And Knowledge Transfer, Garrett S. Haltiwanger Jul 2012

Establishing Relationships Between Risk Management And Knowledge Transfer, Garrett S. Haltiwanger

Engineering Management & Systems Engineering Theses & Dissertations

Risk management (RM) and Knowledge management (KM) have mostly been treated as separate management philosophies. Risk management is a widely taught topic in academia and is practiced in industry. Knowledge management is being taught at increasingly more colleges and many companies are discovering a need for managing knowledge. This dissertation shows that some research has been conducted to apply the principles of knowledge management in establishing risk management plans. To a lesser extent there has been research conducted to apply the philosophies of risk management to identifying knowledge gaps and maintaining corporate knowledge. Both risk management and knowledge management are …


Probabilistic Resilience Quantification And Visualization Building Performance To Hurricane Wind Speeds, Berna Eren Tokgoz Jul 2012

Probabilistic Resilience Quantification And Visualization Building Performance To Hurricane Wind Speeds, Berna Eren Tokgoz

Engineering Management & Systems Engineering Theses & Dissertations

Natural and man made disasters are unpredictable and unavoidable in today's world. Their frequency of occurrence and damages keep increasing. Due to the efforts to reduce negative consequences from such disasters, the concept of resilience has gained so much popularity in disaster management area especially after disasters like the September 11 attacks and Hurricane Katrina. Complex systems of today are under operational risks because of increasing threats and their high level of vulnerability. Hence, such systems need to adapt the concept of resilience for continuous operations. Resilience is a proactive concept which should incorporate both pre-event (preparedness and mitigation) and …


Identifying Operations Research Systems Analysts' Technical Competencies: A Delphi Approach, William T. Winklbauer Jul 2012

Identifying Operations Research Systems Analysts' Technical Competencies: A Delphi Approach, William T. Winklbauer

Engineering Management & Systems Engineering Theses & Dissertations

After the attacks of September 11, 2011, the demands for more agile, adaptive, critical-thinking, and multi-talented U.S. Army Operations Research Systems Analysts (FA49s) have only increased. Tomorrow's joint operating environment demands U.S. Army FA49s to be ingenious, proactive, and multi-talented; proficient in their core competencies as military leaders as well as being proficient in their technical competencies as problem solvers in the operations research field.

The purpose of this study was to identify the technical competencies and knowledge, skills, and abilities (KSAs) required for future U.S. Army FA49s to perform their duties within the joint operating environment of the next …


An Investigation Into The Relationship Between An Engineering Manager's Purpose-Seeking Beliefs And Behaviors And The Engineering Manager's Perception Of Employee Creativity, Initiative And Purpose-Seeking Behavior, Charles Burton Daniels Apr 2012

An Investigation Into The Relationship Between An Engineering Manager's Purpose-Seeking Beliefs And Behaviors And The Engineering Manager's Perception Of Employee Creativity, Initiative And Purpose-Seeking Behavior, Charles Burton Daniels

Engineering Management & Systems Engineering Theses & Dissertations

Organizations have placed an overwhelming emphasis on extrinsic motivation of its workforce, normally in the form of financial incentives, in an attempt to assure individual and organizational high performance. While a significant level of financial resources is expended in this attempt to predict and influence employee behavior, no objective evidence exists of a favorable return of investment. In fact, the primary impact of most extrinsic motivation might actually be demotivation – the opposite of the intended use.

In this research the prevailing literature was examined and a conclusion about the power of both extrinsic and intrinsic motivation was synthesized to …


A Discrete Event Simulation Of Network Centric Operations: Modeling Unbalanced Combat Configurations In Symmetric Engagements, Mahmoud Turki Khasawneh Apr 2012

A Discrete Event Simulation Of Network Centric Operations: Modeling Unbalanced Combat Configurations In Symmetric Engagements, Mahmoud Turki Khasawneh

Engineering Management & Systems Engineering Theses & Dissertations

Network Centric Operations (NCO) has been dubbed the most significant revolution in military affairs (RMA) in the past 200 years. The promise of NCO is based on the notion that information sharing and connectivity is fundamental to the effectiveness of a combat force. This due to the ability of a properly networked force to self-synchronize itself as it engages enemy forces. The purposeful arrangement of assets in a combat force is what makes it 'properly networked'. What is a purposeful arrangement of combat assets? How should a force organize to enhance information sharing and connectivity? And how does connectivity within …


Examining Combat Effectiveness In Asymmetric Engagements With Balanced Forces Using The Information Age Combat Model, Nevan E. N. Shearer Apr 2012

Examining Combat Effectiveness In Asymmetric Engagements With Balanced Forces Using The Information Age Combat Model, Nevan E. N. Shearer

Engineering Management & Systems Engineering Theses & Dissertations

With advances in networked communications, the capabilities of command and control (C2) have come to play an increasingly larger role in battlefield success. Within the past two decades a new military strategy has evolved, known as Network-Centric Operations (NCO), which puts information superiority on the frontline. Moreover, the information advantage that is gained through information superiority is translated into a tactical war-fighting advantage.

A research gap has been identified in the investigation of networked combat force configurations in the realm of asymmetric engagements. Specifically, the research question is, how should an information age combat force be networked in order to …


Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway Apr 2012

Evaluating Network Analysis And Agent Based Modeling For Investigating The Stability Of Commercial Air Carrier Schedules, Sheila Ruth Conway

Engineering Management & Systems Engineering Theses & Dissertations

For a number of years, the United States Federal Government has been formulating the Next Generation Air Transportation System plans for National Airspace System improvement. These improvements attempt to address air transportation holistically, but often address individual improvements in one arena such as ground or in-flight equipment.

In fact, air transportation system designers have had only limited success using traditional Operations Research and parametric modeling approaches in their analyses of innovative operations. They need a systemic methodology for modeling of safety-critical infrastructure that is comprehensive, objective, and sufficiently concrete, yet simple enough to be deployed with reasonable investment. The methodology …


Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill Apr 2012

Risk Quadruplet: Integrating Assessments Of Threat, Vulnerability, Consequence, And Perception For Homeland Security And Homeland Defense, Kara Norman Hill

Engineering Management & Systems Engineering Theses & Dissertations

Risk for homeland security and homeland defense is often considered to be a function of threat, vulnerability, and consequence. But what is that function? And are we defining and measuring these terms consistently? Threat, vulnerability, and consequence assessments are conducted, often separately, and data from one assessment could be drastically different from that of another due to inconsistent definitions of terms and measurements, differing data collection methods, or varying data sources. It has also long been a challenge to integrate these three disparate assessments to establish an overall picture of risk to a given asset. Further, many agencies conduct these …


Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk Apr 2012

Agile Knowledge Management; A Review, Reconceptualization, And Extension To Military Applications, Dogan Ozturk

Engineering Management & Systems Engineering Theses & Dissertations

The purpose of this research is to explore the conceptual background of agility in knowledge management, re-conceptualize it and extend it to military applications with a special focus on Counterinsurgency (COIN).

An initial qualitative exploration of agility in knowledge management was performed. Three different concepts and their interrelationships were analyzed: (1) knowledge management, (2) agility in operations, and (3) military organizations in the COIN environment. Findings from this initial qualitative analysis were used to inductively redefine, re-conceptualize and extend the concept of Agile Knowledge Management (AKM), as well as, to compare and adapt the AKM concept to the military environment …


An Analysis Of Factors Affecting The Effective Use Of Knowledge Management In Counter Improvised Explosive Device (C-Ied) Operations, Umit Gencer Apr 2012

An Analysis Of Factors Affecting The Effective Use Of Knowledge Management In Counter Improvised Explosive Device (C-Ied) Operations, Umit Gencer

Engineering Management & Systems Engineering Theses & Dissertations

This dissertation investigates factors that influence effective use of Knowledge Management (KM) in Counter Improvised Explosive Device (C-IED) operations in the military.

The study suggests that effective KM program is determined by the interaction of three organizational capabilities: knowledge infrastructure, knowledge process, and leadership orientation.

A self-administrated survey was conducted on 300 NATO staff officers who have served in C-IED environments. A structural equation modeling technique was used to test a set of hypotheses using 118 completed responses collected from the survey.

The results suggest that out of the 11 constructs within the model; two are rated as 'attribute needs …