Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Engineering

Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao Jan 2022

Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao

Computational Modeling & Simulation Engineering Faculty Publications

Singular point detection is a primary step in fingerprint recognition, especially for fingerprint alignment and classification. But in present there are still some problems and challenges such as more false-positive singular points or inaccurate reference point localization. This paper proposes an accurate core point localization method based on spatial domain features of fingerprint images from a completely different viewpoint to improve the fingerprint core point displacement problem of singular point detection. The method first defines new fingerprint features, called furcation and confluence, to represent specific ridge/valley distribution in a core point area, and uses them to extract the innermost Curve …


Hybrid Models As Transdisciplinary Research Enablers, Andreas Tolk, Alison Harper, Navonil Mustafee Jan 2021

Hybrid Models As Transdisciplinary Research Enablers, Andreas Tolk, Alison Harper, Navonil Mustafee

Computational Modeling & Simulation Engineering Faculty Publications

Modelling and simulation (M&S) techniques are frequently used in Operations Research (OR) to aid decision-making. With growing complexity of systems to be modelled, an increasing number of studies now apply multiple M&S techniques or hybrid simulation (HS) to represent the underlying system of interest. A parallel but related theme of research is extending the HS approach to include the development of hybrid models (HM). HM extends the M&S discipline by combining theories, methods and tools from across disciplines and applying multidisciplinary, interdisciplinary and transdisciplinary solutions to practice. In the broader OR literature, there are numerous examples of cross-disciplinary approaches in …


Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua Jan 2021

Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua

Computational Modeling & Simulation Engineering Faculty Publications

Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders' ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying decoy nodes along the predicted path. Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement. The …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina Jan 2020

Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina

Computational Modeling & Simulation Engineering Faculty Publications

Asynchronous iterative methods present a mechanism to improve the performance of algorithms for highly parallel computational platforms by removing the overhead associated with synchronization among computing elements. This paper considers a class of asynchronous iterative linear system solvers that employ randomization to determine the component update orders, specifically focusing on the effects of drawing the order from non-uniform distributions. Results from shared-memory experiments with a two-dimensional finite-difference discrete Laplacian problem show that using distributions favoring the selection of components with a larger contribution to the residual may lead to faster convergence than selecting uniformly. Multiple implementations of the randomized asynchronous …


Emerging Roles Of Virtual Patients In The Age Of Ai, C. Donald Combs, P. Ford Combs Jan 2019

Emerging Roles Of Virtual Patients In The Age Of Ai, C. Donald Combs, P. Ford Combs

Computational Modeling & Simulation Engineering Faculty Publications

Today's web-enabled and virtual approach to medical education is different from the 20th century's Flexner-dominated approach. Now, lectures get less emphasis and more emphasis is placed on learning via early clinical exposure, standardized patients, and other simulations. This article reviews literature on virtual patients (VPs) and their underlying virtual reality technology, examines VPs' potential through the example of psychiatric intake teaching, and identifies promises and perils posed by VP use in medical education.


Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang Jan 2018

Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang

Computational Modeling & Simulation Engineering Faculty Publications

Transportation modeling and simulation play an important role in the planning and management of emergency evacuation. It is often indispensable for the preparedness and timely response to extreme events occurring in highly populated areas. Reliable and robust agent-based evacuation models are of great importance to support evacuation decision making. Nevertheless, these models rely on numerous hypothetical causal relationships between the evacuation behavior and a variety of factors including socio-economic characteristics and storm intensity. Understanding the impacts of these factors on evacuation behaviors (e.g., destination and route choices) is crucial in preparing optimal evacuation plans. This paper aims to contribute to …


Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry Jan 2017

Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry

Computational Modeling & Simulation Engineering Faculty Publications

This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power …


Changing Cpu Frequency In Comd Proxy Application Offloaded To Intel Xeon Phi Co-Processors, Gary Lawson, Masha Sosonkina, Yuzhong Shen Jan 2015

Changing Cpu Frequency In Comd Proxy Application Offloaded To Intel Xeon Phi Co-Processors, Gary Lawson, Masha Sosonkina, Yuzhong Shen

Computational Modeling & Simulation Engineering Faculty Publications

Obtaining exascale performance is a challenge. Although the technology of today features hardware with very high levels of concurrency, exascale performance is primarily limited by energy consumption. This limitation has lead to the use of GPUs and specialized hardware such as many integrated core (MIC) co-processors and FPGAs for computation acceleration. The Intel Xeon Phi co-processor, built upon the MIC architecture, features many low frequency, energy efficient cores. Applications, even those which do not saturate the large vector processing unit in each core, may benefit from the energy-efficient hardware and software of the Xeon Phi. This work explores the energy …


Potential Of Cognitive Computing And Cognitive Systems, Ahmed K. Noor Jan 2015

Potential Of Cognitive Computing And Cognitive Systems, Ahmed K. Noor

Computational Modeling & Simulation Engineering Faculty Publications

Cognitive computing and cognitive technologies are game changers for future engineering systems, as well as for engineering practice and training. They are major drivers for knowledge automation work, and the creation of cognitive products with higher levels of intelligence than current smart products. This paper gives a brief review of cognitive computing and some of the cognitive engineering systems activities. The potential of cognitive technologies is outlined, along with a brief description of future cognitive environments, incorporating cognitive assistants - specialized proactive intelligent software agents designed to follow and interact with humans and other cognitive assistants across the environments. The …


Engineering Collaborations In Medical Modeling And Simulation, Frederic D. Mckenzie, Salim Chemlal, Tom Hubbard, Robert E. Kelly, Roderick C. Borgie, David A. Besachio, Michel Audette Jan 2014

Engineering Collaborations In Medical Modeling And Simulation, Frederic D. Mckenzie, Salim Chemlal, Tom Hubbard, Robert E. Kelly, Roderick C. Borgie, David A. Besachio, Michel Audette

Computational Modeling & Simulation Engineering Faculty Publications

Fifty years ago computer science was just beginning to see common acceptance as a growing discipline and very few universities had a computer science department although other departments were utilizing computers and software to enhance their methodologies. We believe modeling and simulation (M&S) is on a similar path. Many other disciplines utilize M&S to enhance their methodologies but we also believe that M&S fundamentals can be essential in making better decisions by utilizing the appropriate model for the problem at hand, expanding the solution space through simulation, and understanding it through visualization and proper analyses. After our students learn these …


Orientation Invariant Ecg-Based Stethoscope Tracking For Heart Auscultation Training On Augmented Standardized Patients, Nahom Kidane, Salim Chemlal, Jiang Li, Frederic D. Mckenzie, Tom Hubbard Jan 2013

Orientation Invariant Ecg-Based Stethoscope Tracking For Heart Auscultation Training On Augmented Standardized Patients, Nahom Kidane, Salim Chemlal, Jiang Li, Frederic D. Mckenzie, Tom Hubbard

Computational Modeling & Simulation Engineering Faculty Publications

Auscultation, the act of listening to the heart and lung sounds, can reveal substantial information about patients’ health and other cardiac-related problems; therefore, competent training can be a key for accurate and reliable diagnosis. Standardized patients (SPs), who are healthy individuals trained to portray real patients, have been extensively used for such training and other medical teaching techniques; however, the range of symptoms and conditions they can simulate remains limited since they are only patient actors. In this work, we describe a novel tracking method for placing virtual symptoms in correct auscultation areas based on recorded ECG signals with various …


Special Issue On Medical Simulation, Michel Audette, Hanif M. Ladak Jan 2013

Special Issue On Medical Simulation, Michel Audette, Hanif M. Ladak

Computational Modeling & Simulation Engineering Faculty Publications

We would like to welcome you to this Special Issue on Medical Simulation, the first of its kind not only for SIMULATION: Transactions of The Society for Modeling and Simulation International, but for any technical journal. Our respective backgrounds are an indication of the technical and clinical breadth of medical simulation, as we approach the subject as primarily medical image analysis and biomechanics experts respectively, each with a variety of clinical interests spanning virtual reality (VR)–based neuro-, orthopedic and ear-nose-and-throat surgery. Moreover, we believe that the breadth of the papers that comprise this issue reflects an even broader perspective. After …


How Is M&S Interoperability Different From Other Interoperability Domains?, Andreas Tolk, Saikou Y. Diallo, Jose J. Padilla, Charles D. Turnitsa Jan 2012

How Is M&S Interoperability Different From Other Interoperability Domains?, Andreas Tolk, Saikou Y. Diallo, Jose J. Padilla, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

During every standard workshop or event, the examples of working interoperability solutions are used to motivate for 'plug and play' standards for M&S as well, like standardized batteries for electronics, or the use of XML to exchange data between heterogeneous systems. While these are successful applications of standards, they are off the mark regarding M&S interoperability. The challenge of M&S is that the product that needs to be made interoperable is not the service or the system alone, but the model behind it as well. The paper shows that the alignment of conceptualizations is the real problem that is not …


Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman Jan 2011

Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman

Computational Modeling & Simulation Engineering Faculty Publications

Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the …


M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk Jan 2010

M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

No abstract provided.


Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa Jan 2007

Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.


Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk Jan 2007

Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

The Coalition Battle Management Language is a language for representing and exchanging plans, orders, and reports across live, constructive and robotic forces in multi-service, multi-national and multi-organizational operations. Standardization efforts in the Simulation Interoperability Standards Organization seek to define this language through three parallel activities: (1) specify a sufficient data model to unambiguously define a set of orders using the Joint Command, Control, and Consultation Information Exchange Data Model (JC3IEDM) as a starting point; (2) develop a formal grammar (lexicon and production rules) to formalize the definition of orders, requests, and reports; (3) develop a formal battle management ontology to …


Ontological Implications Of The Levels Of Conceptual Interoperability Model, Andreas Tolk, Charles D. Turnitsa, Saikou Y. Diallo Jan 2006

Ontological Implications Of The Levels Of Conceptual Interoperability Model, Andreas Tolk, Charles D. Turnitsa, Saikou Y. Diallo

Computational Modeling & Simulation Engineering Faculty Publications

The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. This paper will be presented in the invited session "Ontology Driven Interoperability for Agile Applications using Information Systems: Requirements and Applications for Agent Mediated Decision Support" at WMSCI 2006.


Using Web Services To Integrate Heterogeneous Simulations In A Grid Environment, J. Mark Pullen, Ryan Brunton, Don Brutzman, David Drake, Michael Hieb, Katherine L. Morse, Andreas Tolk Jan 2004

Using Web Services To Integrate Heterogeneous Simulations In A Grid Environment, J. Mark Pullen, Ryan Brunton, Don Brutzman, David Drake, Michael Hieb, Katherine L. Morse, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

The distributed information technologies collectively known as Web services recently have demonstrated powerful capabilities for scalable interoperation of heterogeneous software across a wide variety of networked platforms. This approach supports a rapid integration cycle and shows promise for ultimately supporting automatic composability of services using discovery via registries. This paper presents a rationale for extending Web services to distributed simulation environments, including the High Level Architecture (HLA), together with a description and examples of the integration methodology used to develop significant prototype implementations. A logical next step is combining the power of Grid computing with Web services to facilitate rapid …


Common Data Administration, Data Management, And Data Alignment As A Necessary Requirement For Coupling C4isr Systems And M&S Systems, Andreas Tolk Jan 2003

Common Data Administration, Data Management, And Data Alignment As A Necessary Requirement For Coupling C4isr Systems And M&S Systems, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

Within the application domain of military simulation systems, training and exercises as well as support to real operations require the coupling of the simulation system delivering the needed functionality with the Command, Control, Computing, Communications, Intelligence, Surveillance, and Reconnaissance (C4ISR) system providing the necessary data. The solution to this challenge is to build appropriate interfaces. Although in long term a more integrated approach will be necessary, in short and mid term, gateways and interfaces are likely to remain the standard. However, in order to succeed with the respective efforts, at least on the data level of interoperability, a common solution …


Jsb Composability And Web Services Interoperability Via Extensible Modeling & Simulation Framework (Xmsf), Model Driven Architecture (Mda), Component Repositories, And Web-Based Visualization, Don Brutzman, Andreas Tolk Jan 2003

Jsb Composability And Web Services Interoperability Via Extensible Modeling & Simulation Framework (Xmsf), Model Driven Architecture (Mda), Component Repositories, And Web-Based Visualization, Don Brutzman, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

"Study Report prepared for the U. S. Air Force, Joint Synthetic Battlespace Analysis of Technical Approaches (ATA) Studies & Prototyping"

Overview: This paper summarizes research work conducted by organizations concerned with interoperable distributed information technology (IT) applications, in particular the Naval Postgraduate School (NPS) and Old Dominion University (ODU). Although the application focus is distributed modeling & simulation (M&S) the results and findings are in general easily applicable to other distributed concepts as well, in particular the support of operations by M&S applications, such as distributed mission operations. The core idea of this work is to show the necessity of …