Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 48

Full-Text Articles in Physical Sciences and Mathematics

Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch Jan 2024

Methods That Support The Validation Of Agent-Based Models: An Overview And Discussion, Andrew Collins, Matthew Koehler, Christopher Lynch

Engineering Management & Systems Engineering Faculty Publications

Validation is the process of determining if a model adequately represents the system under study for the model’s intended purpose. Validation is a critical component in building the credibility of a simulation model with its end-users. Effectively conducting validation can be a daunting task for both novice and experienced simulation developers. Further compounding the difficult task of conducting validation is that there is no universally accepted approach for assessing a simulation. These challenges are particularly relevant to the paradigm of Agent-Based Modeling and Simulation (ABMS) because of the complexity found in these models’ mechanisms and in the real-world situations they …


Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan Jan 2024

Abmscore: A Heuristic Algorithm For Forming Strategic Coalitions In Agent-Based Simulation, Andrew J. Collins, Gayane Grigoryan

Engineering Management & Systems Engineering Faculty Publications

Integrating human behavior into agent-based models has been challenging due to its diversity. An example is strategic coalition formation, which occurs when an individual decides to collaborate with others because it strategically benefits them, thereby increasing the expected utility of the situation. An algorithm called ABMSCORE was developed to help model strategic coalition formation in agent-based models. The ABMSCORE algorithm employs hedonic games from cooperative game theory and has been applied to various situations, including refugee egress and smallholder farming cooperatives. This paper discusses ABMSCORE, including its mechanism, requirements, limitations, and application. To demonstrate the potential of ABMSCORE, a new …


An Ioe Blockchain-Based Network Knowledge Management Model For Resilient Disaster Frameworks, Amir Javadpour, Farinaz Sabz Ali Pour, Arun Kumar Sangaiah, Weizhe Zhang, Forough Ja'far, Ashish Singh Jan 2023

An Ioe Blockchain-Based Network Knowledge Management Model For Resilient Disaster Frameworks, Amir Javadpour, Farinaz Sabz Ali Pour, Arun Kumar Sangaiah, Weizhe Zhang, Forough Ja'far, Ashish Singh

Engineering Management & Systems Engineering Faculty Publications

The disaster area is a constantly changing environment, which can make it challenging to distribute supplies effectively. The lack of accurate information about the required goods and potential bottlenecks in the distribution process can be detrimental. The success of a response network is dependent on collaboration, coordination, sovereignty, and equal distribution of relief resources. To facilitate these interactions and improve knowledge of supply chain operations, a reliable and dynamic logistic system is essential. This study proposes the integration of blockchain technology, the Internet of Things (IoT), and the Internet of Everything (IoE) into the disaster management structure. The proposed disaster …


Teaching Analytics Online: A Self-Study Of Professional Practice, Andrew J. Collins, Brandon Butler, James F. Leathrum Jr., Christopher J. Lynch Jan 2023

Teaching Analytics Online: A Self-Study Of Professional Practice, Andrew J. Collins, Brandon Butler, James F. Leathrum Jr., Christopher J. Lynch

Engineering Management & Systems Engineering Faculty Publications

As the COVID-19 pandemic caused severe disruption to education enterprises throughout the world, the main response by educational institutions was to move to online learning environments. The purpose of this study was to understand better how instructors could improve online learning for a professional-level week-long short course in a highly technical area (data analytics), which had, pre-COVID, been a hands-on computer, laboratory-based learning experience. The authors used self-study of professional practice to elicit and understand the major issues and concerns of the transition to an online learning environment. Under the guidance of a colleague in teacher education, three course instructors …


Embok 5.0 - Industry 4.0/5.0 Manifest And Latent Dimensions Mapping To The Asem Embok, T. Steven Cotter Jan 2023

Embok 5.0 - Industry 4.0/5.0 Manifest And Latent Dimensions Mapping To The Asem Embok, T. Steven Cotter

Engineering Management & Systems Engineering Faculty Publications

Industry 3.0 automation emerged replacing human labor with high volume processes and robotics. Industry 4.0, cyber-physical systems, and Industry 5.0, mass customization and cognitive systems, are in the early stages of emergence. Research into the impact of Industry 4.0 and 5.0 is focused at the strategic or organizational levels or on the technological challenges. Research into the impact of Industry 4.0 and 5.0 on engineering management has been limited to their impact on project management. This leaves open the question of the directions in which ASEM should evolve the Engineering Management Body of Knowledge (EMBOK) under the emergence of Industry …


Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour Jan 2022

Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour

Engineering Management & Systems Engineering Faculty Publications

In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …


A Literature Review On Combining Heuristics And Exact Algorithms In Combinatorial Optimization, Hesamoddin Tahami, Hengameh Fakhravar Jan 2022

A Literature Review On Combining Heuristics And Exact Algorithms In Combinatorial Optimization, Hesamoddin Tahami, Hengameh Fakhravar

Engineering Management & Systems Engineering Faculty Publications

There are several approaches for solving hard optimization problems. Mathematical programming techniques such as (integer) linear programming-based methods and metaheuristic approaches are two extremely effective streams for combinatorial problems. Different research streams, more or less in isolation from one another, created these two. Only several years ago, many scholars noticed the advantages and enormous potential of building hybrids of combining mathematical programming methodologies and metaheuristics. In reality, many problems can be solved much better by exploiting synergies between these approaches than by “pure” classical algorithms. The key question is how to integrate mathematical programming methods and metaheuristics to achieve such …


Humans And The Core Partition: An Agent-Based Modeling Experiment, Andrew J. Collins, Sheida Etemadidavan Jan 2022

Humans And The Core Partition: An Agent-Based Modeling Experiment, Andrew J. Collins, Sheida Etemadidavan

Engineering Management & Systems Engineering Faculty Publications

Although strategic coalition formation is traditionally modeled using cooperative game theory, behavioral game theorists have repeatedly shown that outcomes predicted by game theory are different from those generated by actual human behavior. To further explore these differences, in a cooperative game theory context, we experiment to compare the outcomes resulting from human participants’ behavior to those generated by a cooperative game theory solution mechanism called the core partition. Our experiment uses an interactive simulation of a glove game, a particular type of cooperative game, to collect the participant’s decision choices and their resultant outcomes. Two different glove games are considered, …


Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng Jan 2022

Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng

Engineering Management & Systems Engineering Faculty Publications

A growing trend in requirements elicitation is the use of machine learning (ML) techniques to automate the cumbersome requirement handling process. This literature review summarizes and analyzes studies that incorporate ML and natural language processing (NLP) into demand elicitation. We answer the following research questions: (1) What requirement elicitation activities are supported by ML? (2) What data sources are used to build ML-based requirement solutions? (3) What technologies, algorithms, and tools are used to build ML-based requirement elicitation? (4) How to construct an ML-based requirements elicitation method? (5) What are the available tools to support ML-based requirements elicitation methodology? Keywords …


Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla Jan 2022

Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla

Engineering Management & Systems Engineering Faculty Publications

In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …


A Probabilistic Perspective Of Human-Machine Interaction, Mustafa Canan, Mustafa Demir, Samuel Kovacic Jan 2022

A Probabilistic Perspective Of Human-Machine Interaction, Mustafa Canan, Mustafa Demir, Samuel Kovacic

Engineering Management & Systems Engineering Faculty Publications

Human-machine interaction (HMI) has become an essential part of the daily routine in organizations. Although the machines are designed with state-of-the-art Artificial Intelligence applications, they are limited in their ability to mimic human behavior. The human-human interaction occurs between two or more humans; when a machine replaces a human, the interaction dynamics are not the same. The results indicate that a machine that interacts with a human can increase the mental uncertainty that a human experiences. Developments in decision sciences indicate that using quantum probability theory (QPT) improves the understanding of human decision-making than merely using classical probability theory (CPT). …


A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil Jan 2021

A Monte-Carlo Analysis Of Monetary Impact Of Mega Data Breaches, Mustafa Canan, Omer Ilker Poyraz, Anthony Akil

Engineering Management & Systems Engineering Faculty Publications

The monetary impact of mega data breaches has been a significant concern for enterprises. The study of data breach risk assessment is a necessity for organizations to have effective cybersecurity risk management. Due to the lack of available data, it is not easy to obtain a comprehensive understanding of the interactions among factors that affect the cost of mega data breaches. The Monte Carlo analysis results were used to explicate the interactions among independent variables and emerging patterns in the variation of the total data breach cost. The findings of this study are as follows: The total data breach cost …


Interactive Agent-Based Simulation For Experimentation: A Case Study With Cooperatve Game Theory, Andrew J. Collins, Sheida Etemadidavan Jan 2021

Interactive Agent-Based Simulation For Experimentation: A Case Study With Cooperatve Game Theory, Andrew J. Collins, Sheida Etemadidavan

Engineering Management & Systems Engineering Faculty Publications

Incorporating human behavior is a current challenge for agent-based modeling and simulation (ABMS). Human behavior includes many different aspects depending on the scenario considered. The scenario context of this paper is strategic coalition formation, which is traditionally modeled using cooperative game theory, but we use ABMS instead; as such, it needs to be validated. One approach to validation is to compare the recorded behavior of humans to what was observed in our simulation. We suggest that using an interactive simulation is a good approach to collecting the necessary human behavior data because the humans would be playing in precisely the …


Enhancing Cyberweapon Effectiveness Methodology With Se Modeling Techniques: Both For Offense And Defense, C. Ariel Pinto, Matthew Zurasky, Fatine Elakramine, Safae El Amrani, Raed M. Jaradat, Chad Kerr, Vidanelage L. Dayarathna Jan 2021

Enhancing Cyberweapon Effectiveness Methodology With Se Modeling Techniques: Both For Offense And Defense, C. Ariel Pinto, Matthew Zurasky, Fatine Elakramine, Safae El Amrani, Raed M. Jaradat, Chad Kerr, Vidanelage L. Dayarathna

Engineering Management & Systems Engineering Faculty Publications

A recent cyberweapons effectiveness methodology clearly provides a parallel but distinct process from that of kinetic weapons – both for defense and offense purposes. This methodology promotes consistency and improves cyberweapon system evaluation accuracy – for both offensive and defensive postures. However, integrating this cyberweapons effectiveness methodology into the design phase and operations phase of weapons systems development is still a challenge. The paper explores several systems engineering modeling techniques (e.g., SysML) and how they can be leveraged towards an enhanced effectiveness methodology. It highlights how failure mode analyses (e.g., FMEA) can facilitate cyber damage determination and target assessment, how …


A Blockchain-Enabled Model To Enhance Disaster Aids Network Resilience, Farinaz Sabz Ali Pour, Paul Niculescu-Mizil Gheorghe Jan 2021

A Blockchain-Enabled Model To Enhance Disaster Aids Network Resilience, Farinaz Sabz Ali Pour, Paul Niculescu-Mizil Gheorghe

Engineering Management & Systems Engineering Faculty Publications

The disaster area is a true dynamic environment. Lack of accurate information from the affected area create several challenges in distributing the supplies. The success of a disaster response network is based on collaboration, coordination, sovereignty, and equality in relief distribution. Therefore, a trust-based dynamic communication system is required to facilitate the interactions, enhance the knowledge for the relief operation, prioritize, and coordinate the goods distribution. One of the promising innovative technologies is blockchain technology which enables transparent, secure, and real-time information exchange and automation through smart contracts in a distributed technological ecosystem. This study aims to analyze the application …


Human Characteristics Impact On Strategic Decisions In A Human-In-The-Loop Simulation, Andrew J. Collins, Shieda Etemadidavan Jan 2021

Human Characteristics Impact On Strategic Decisions In A Human-In-The-Loop Simulation, Andrew J. Collins, Shieda Etemadidavan

Engineering Management & Systems Engineering Faculty Publications

In this paper, a hybrid simulation model of the agent-based model and cooperative game theory is used in a human-in-the-loop experiment to study the effect of human demographic characteristics in situations where they make strategic coalition decisions. Agent-based modeling (ABM) is a computational method that can reveal emergent phenomenon from interactions between agents in an environment. It has been suggested in organizational psychology that ABM could model human behavior more holistically than other modeling methods. Cooperative game theory is a method that models strategic coalitions formation. Three characteristics (age, education, and gender) were considered in the experiment to see if …


Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin Jan 2021

Blockchain For A Resilient, Efficient, And Effective Supply Chain, Evidence From Cases, Adrian Gheorghe, Farinaz Sabz Ali Pour, Unal Tatar, Omer Faruk Keskin

Engineering Management & Systems Engineering Faculty Publications

In the modern acquisition, it is unrealistic to consider single entities as producing and delivering a product independently. Acquisitions usually take place through supply networks. Resiliency, efficiency, and effectiveness of supply networks directly contribute to the acquisition system's resiliency, efficiency, and effectiveness. All the involved firms form a part of a supply network essential to producing the product or service. The decision-makers have to look for new methodologies for supply chain management. Blockchain technology introduces new methods of decentralization and delegation of services, which can transform supply chains and result in a more resilient, efficient, and effective supply chain. This …


Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li Jan 2021

Ship Deck Segmentation In Engineering Document Using Generative Adversarial Networks, Mohammad Shahab Uddin, Raphael Pamie-George, Daron Wilkins, Andres Sousa Poza, Mustafa Canan, Samuel Kovacic, Jiang Li

Engineering Management & Systems Engineering Faculty Publications

Generative adversarial networks (GANs) have become very popular in recent years. GANs have proved to be successful in different computer vision tasks including image-translation, image super-resolution etc. In this paper, we have used GAN models for ship deck segmentation. We have used 2D scanned raster images of ship decks provided by US Navy Military Sealift Command (MSC) to extract necessary information including ship walls, objects etc. Our segmentation results will be helpful to get vector and 3D image of a ship that can be later used for maintenance of the ship. We applied the trained models to engineering documents provided …


Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe Jan 2020

Disaster Damage Categorization Applying Satellite Images And Machine Learning Algorithm, Farinaz Sabz Ali Pour, Adrian Gheorghe

Engineering Management & Systems Engineering Faculty Publications

Special information has a significant role in disaster management. Land cover mapping can detect short- and long-term changes and monitor the vulnerable habitats. It is an effective evaluation to be included in the disaster management system to protect the conservation areas. The critical visual and statistical information presented to the decision-makers can help in mitigation or adaption before crossing a threshold. This paper aims to contribute in the academic and the practice aspects by offering a potential solution to enhance the disaster data source effectiveness. The key research question that the authors try to answer in this paper is how …


Natural Resources Governance Employing Blockchain-Based Decision-Making, Farinaz Sabz Ali Pour, Adrian Gheorghe Jan 2019

Natural Resources Governance Employing Blockchain-Based Decision-Making, Farinaz Sabz Ali Pour, Adrian Gheorghe

Engineering Management & Systems Engineering Faculty Publications

Natural resources are essential structures of socio-economic systems which shape the well-being of humanity, environment, and the economy. Human actions have become the critical responsibility for environmental changes and pressuring many planetary boundaries. Having a systematic approach can provide a governance platform including the inherent characteristics of the resource, the historically established form of use, and transaction costs. A natural resource governance framework is developed by applying Blockchain technology as the primary goal of this study to regulate and manage the extraction and trades. Blockchain technology provides a distributed concurrency monitoring system for sustainable resource management. Persistent and pervasive cooperation …


Healthcare Robotics: Key Factors That Impact Robot Adoption In Healthcare, Sujatha Alla, Pilar Pazos Jan 2019

Healthcare Robotics: Key Factors That Impact Robot Adoption In Healthcare, Sujatha Alla, Pilar Pazos

Engineering Management & Systems Engineering Faculty Publications

In the current dynamic business environment, healthcare organizations are focused on improving patient satisfaction, performance, and efficiency. The healthcare industry is considered a complex system that is highly reliant of new technologies to support clinical as well as business processes. Robotics is one of such technologies that is considered to have the potential to increase efficiency in a wide range of clinical services. Although the use of robotics in healthcare is at the early stages of adoption, some studies have shown the capacity of this technology to improve precision, accessibility through less invasive procedures, and reduction of human error during …


New Dimensions For A Challenging Security Environment: Growing Exposure To Critical Space Infrastructure Disruption Risk, Adrian V. Gheorghe, Alexandru Georgescu, Olga Bucovetchi, Marilena Lazăr, Cezar Scarlat Jan 2018

New Dimensions For A Challenging Security Environment: Growing Exposure To Critical Space Infrastructure Disruption Risk, Adrian V. Gheorghe, Alexandru Georgescu, Olga Bucovetchi, Marilena Lazăr, Cezar Scarlat

Engineering Management & Systems Engineering Faculty Publications

Space systems have become a key enabler for a wide variety of applications that are vital to the functioning of advanced societies. The trend is one of quantitative and qualitative increase of this dependence, so much so that space systems have been described as a new example of critical infrastructure. This article argues that the existence of critical space infrastructures implies the emergence of a new category of disasters related to disruption risks. We inventory those risks and make policy recommendations for what is, ultimately, a resilience governance issue.


A Proposed Taxonomy For The Systems Statistical Engineering Body Of Knowledge, Teddy Steven Cotter Jan 2018

A Proposed Taxonomy For The Systems Statistical Engineering Body Of Knowledge, Teddy Steven Cotter

Engineering Management & Systems Engineering Faculty Publications

In the ASEM-IAC 2012, Cotter (2012) identified the gaps in knowledge that statistical engineering needs to address, explored additional gaps in knowledge not addressed in the prior works, and set forth a working definition of and body of knowledge for statistical engineering. In the ASEM-IAC 2015, Cotter (2015) proposed a systemic causal Bayesian hierarchical model that addressed the knowledge gap needed to integrate deterministic mathematical engineering causal models within a stochastic framework. Missing, however, is the framework for specifying the hierarchical qualitative systems structures necessary and sufficient for specifying systemic causal Bayesian hierarchical models. In the ASEM-IAC 2016, Cotter (2016) …


An Attribute Agreement Method For Hfacs Inter-Rater Reliability Assessment, Teddy Steven Cotter, Veysel Yesilbas Jan 2018

An Attribute Agreement Method For Hfacs Inter-Rater Reliability Assessment, Teddy Steven Cotter, Veysel Yesilbas

Engineering Management & Systems Engineering Faculty Publications

Inter-rater reliability can be regarded as the degree of agreement among raters on a given item or a circumstance. Multiple approaches have been taken to estimate and improve inter-rater reliability of the United States Department of Defense Human Factors Analysis and Classification System used by trained accident investigators. In this study, three trained instructor pilots used the DoD-HFACS to classify 347 U.S. Air Force Accident Investigation Board (AIB) Class-A reports between the years of 2000 and 2013. The overall method consisted of four steps: (1) train on HFACS definitions, (2) verify rating reliability, (3) rate HFACS reports, and (4) random …


Human-Intelligence/Machine-Intelligence Decision Governance: An Analysis From Ontological Point Of View, Faisal Mahmud, Teddy Steven Cotter Jan 2017

Human-Intelligence/Machine-Intelligence Decision Governance: An Analysis From Ontological Point Of View, Faisal Mahmud, Teddy Steven Cotter

Engineering Management & Systems Engineering Faculty Publications

The increasing CPU power and memory capacity of computers, and now computing appliances, in the 21st century has allowed accelerated integration of artificial intelligence (AI) into organizational processes and everyday life. Artificial intelligence can now be found in a wide range of organizational processes including medical diagnosis, automated stock trading, integrated robotic production systems, telecommunications routing systems, and automobile fuzzy logic controllers. Self-driving automobiles are just the latest extension of AI. This thrust of AI into organizations and everyday life rests on the AI community’s unstated assumption that “…every aspect of human learning and intelligence could be so precisely described …


Simulation And Optimization Of Ant Colony Optimization Algorithm For The Stochiastic Uncapacitated Location-Allocation Problem, Jean-Paul Arnaout, Georges Arnaout, John El Khoury Oct 2016

Simulation And Optimization Of Ant Colony Optimization Algorithm For The Stochiastic Uncapacitated Location-Allocation Problem, Jean-Paul Arnaout, Georges Arnaout, John El Khoury

Engineering Management & Systems Engineering Faculty Publications

This study proposes a novel methodology towards using ant colony optimization (ACO) with stochastic demand. In particular, an optimizationsimulation-optimization approach is used to solve the Stochastic uncapacitated location-allocation problem with an unknown number of facilities, and an objective of minimizing the fixed and transportation costs. ACO is modeled using discrete event simulation to capture the randomness of customers’ demand, and its objective is to optimize the costs. On the other hand, the simulated ACO’s parameters are also optimized to guarantee superior solutions. This approach’s performance is evaluated by comparing its solutions to the ones obtained using deterministic data. The results …


Energy Sustainability Of Turkey In The Case Of Lng, Omer Ilker Poyraz, Omer Keskin, Resit Unal Jan 2016

Energy Sustainability Of Turkey In The Case Of Lng, Omer Ilker Poyraz, Omer Keskin, Resit Unal

Engineering Management & Systems Engineering Faculty Publications

Energy is both vital and strategic element for a nation to sustain its fundamental activities like security, logistics, heating, etc. Countries sustain their energy demands through internal or external sources. In the case of not being able to maintain energy demands from their internal sources, they would need to import their requirements. Whenever they need to buy raw materials, they have to build terminals to process the raw material into the required form. The dependency on the imports may cause the importing country to weaken its advantage in international conflicts, unemployment, and welfare. Therefore, countries aim to mitigate dependence to …


Risk And Safety Of Complex Network Systems, Xiao-Bing Hu, Adrian V. Gheorghe, Mark S. Leeson, Supeng Leng, Julien Bourgeois, Xiaobo Qu Jan 2016

Risk And Safety Of Complex Network Systems, Xiao-Bing Hu, Adrian V. Gheorghe, Mark S. Leeson, Supeng Leng, Julien Bourgeois, Xiaobo Qu

Engineering Management & Systems Engineering Faculty Publications

No abstract provided.


Heuristic And Exact Algorithms For The Two-Machine Just In Time Job Shop Scheduling Problem, Mohammed Al Salem, Leonardo Bedoya-Valencia, Ghaith Rabadi Jan 2016

Heuristic And Exact Algorithms For The Two-Machine Just In Time Job Shop Scheduling Problem, Mohammed Al Salem, Leonardo Bedoya-Valencia, Ghaith Rabadi

Engineering Management & Systems Engineering Faculty Publications

The problem addressed in this paper is the two-machine job shop scheduling problem when the objective is to minimize the total earliness and tardiness from a common due date (CDD) for a set of jobs when their weights equal 1 (unweighted problem). This objective became very significant after the introduction of the Just in Time manufacturing approach. A procedure to determine whether the CDD is restricted or unrestricted is developed and a semirestricted CDD is defined. Algorithms are introduced to find the optimal solution when the CDD is unrestricted and semirestricted. When the CDD is restricted, which is a much …


A Hierarchical Statistical Engineering Modeling Methodology, Teddy Steven Cotter Jan 2016

A Hierarchical Statistical Engineering Modeling Methodology, Teddy Steven Cotter

Engineering Management & Systems Engineering Faculty Publications

In the ASEM-IAC 2015, Cotter (2015) proposed a systemic joint deterministic-stochastic dynamic causal Bayesian statistical engineering model that addressed the knowledge gap needed to integrate deterministic mathematical engineering models within a stochastic framework. However, Cotter did not specify the modeling methodology through which statistical engineering models could be developed, diagnosed, and applied to predict systemic mission performance. This paper updates research into the development a hierarchical statistical engineering modeling methodology and sets forth the initial theoretical foundation for the methodology.