Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Security (4)
- Simulation (4)
- Blockchain (3)
- Industry 4.0 (3)
- Measurement (3)
-
- Artificial intelligence (2)
- Communication (2)
- Costs (2)
- Ergonomics (2)
- Modeling and simulation (2)
- Protocols (2)
- Safety (2)
- AI framework (1)
- AVISPA (1)
- Accountability (1)
- Agent based model (1)
- Agent-based modeling (1)
- Agent-based models (1)
- Agent-based simulation (1)
- Algorithms (1)
- Analysis (1)
- Anypath routing (1)
- Arbitrary state (1)
- Artificial society (1)
- Artificial universities (1)
- Attitude control (1)
- Attribute weighting (1)
- Authentication (1)
- Autism (1)
- Bibliometric analysis (1)
Articles 1 - 28 of 28
Full-Text Articles in Physical Sciences and Mathematics
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security, Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain
VMASC Publications
Due to the rapid advancement of quantum computers, there has been a furious race for quantum technologies in academia and industry. Quantum cryptography is an important tool for achieving security services during quantum communication. Designated verifier signature, a variant of quantum cryptography, is very useful in applications like the Internet of Things (IoT) and auctions. An identity-based quantum-designated verifier signature (QDVS) scheme is suggested in this work. Our protocol features security attributes like eavesdropping, non-repudiation, designated verification, and hiding sources attacks. Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated …
A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami
A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami
VMASC Publications
Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …
Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty
Artificial Intelligence-Enabled Exploratory Cyber-Physical Safety Analyzer Framework For Civilian Urban Air Mobility, Md. Shirajum Munir, Sumit Howlader Dipro, Kamrul Hasan, Tariqul Islam, Sachin Shetty
VMASC Publications
Urban air mobility (UAM) has become a potential candidate for civilization for serving smart citizens, such as through delivery, surveillance, and air taxis. However, safety concerns have grown since commercial UAM uses a publicly available communication infrastructure that enhances the risk of jamming and spoofing attacks to steal or crash crafts in UAM. To protect commercial UAM from cyberattacks and theft, this work proposes an artificial intelligence (AI)-enabled exploratory cyber-physical safety analyzer framework. The proposed framework devises supervised learning-based AI schemes such as decision tree, random forests, logistic regression, K-nearest neighbors (KNN), and long short-term memory (LSTM) for predicting and …
Computational Decision Support For Socio-Technical Awareness Of Land-Use Planning Under Complexity—A Dam Resilience Planning Case Study, Andreas Tolk, Jennifer A. Richkus, F. Leron Shults, Wesley J. Wildman
Computational Decision Support For Socio-Technical Awareness Of Land-Use Planning Under Complexity—A Dam Resilience Planning Case Study, Andreas Tolk, Jennifer A. Richkus, F. Leron Shults, Wesley J. Wildman
VMASC Publications
Land-use planning for modern societies requires technical competence as well as social competence. We therefore propose an integrative solution enabling better land-use planning and management through better-informed decision-making. We adapt a method developed for cross-disciplinary team building to identify the stakeholders and their various objectives and value systems. We use these results to populate artificial societies embedded into a dynamic data analytics framework as a tool to identify, explore, and visualize the challenges resulting from the different objectives and value systems in land-use planning and management. To prove the feasibility of the proposed solution, we present two use cases from …
Blockchain And Puf-Based Secure Key Establishment Protocol For Cross-Domain Digital Twins In Industrial Internet Of Things Architecture, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Rupak Kharel, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues
Blockchain And Puf-Based Secure Key Establishment Protocol For Cross-Domain Digital Twins In Industrial Internet Of Things Architecture, Khalid Mahmood, Salman Shamshad, Muhammad Asad Saleem, Rupak Kharel, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues
VMASC Publications
Introduction:: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical and digital domains is crucial for unlocking the full potential of the IIoT, and digital twins can facilitate this integration by providing a virtual representation of real-world entities.
Objectives:: By combining digital twins with the IIoT, industries can simulate, predict, and control physical behaviors, enabling them to achieve broader value and support industry 4.0 and 5.0. Constituents of cooperative IIoT domains tend to interact and collaborate during their complicated …
Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty
Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty
VMASC Publications
Opportunistic or anypath routing protocols are focused on improving the performance of traditional routing in wireless mesh networks. They do so by leveraging the broadcast nature of the wireless medium and the spatial diversity of the network. Using a set of neighboring nodes, instead of a single specific node, as the next hop forwarder is a crucial aspect of opportunistic routing protocols, and the selection of the forwarder set plays a vital role in their performance. However, most opportunistic routing protocols consider a single transmission rate and power for the nodes, which limits their potential. To address this limitation, this …
A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore
A Structured Narrative Prompt For Prompting Narratives From Large Language Models: Sentiment Assessment Of Chatgpt-Generated Narratives And Real Tweets, Christopher J. Lynch, Erik J. Jensen, Virginia Zamponi, Kevin O'Brien, Erika Frydenlund, Ross Gore
VMASC Publications
Large language models (LLMs) excel in providing natural language responses that sound authoritative, reflect knowledge of the context area, and can present from a range of varied perspectives. Agent-based models and simulations consist of simulated agents that interact within a simulated environment to explore societal, social, and ethical, among other, problems. Simulated agents generate large volumes of data and discerning useful and relevant content is an onerous task. LLMs can help in communicating agents' perspectives on key life events by providing natural language narratives. However, these narratives should be factual, transparent, and reproducible. Therefore, we present a structured narrative prompt …
Understanding And Assessing Demographic (In)Equity Resulting From Extreme Heat Exposure Due To Lack Of Tree Canopies In Norfolk, Va Using Agent-Based Modeling, Virginia Zamponi, Kevin O'Brien, Erik Jensen, Brandon Feldhaus, Russell Moore, Christopher J. Lynch, Ross Gore
Understanding And Assessing Demographic (In)Equity Resulting From Extreme Heat Exposure Due To Lack Of Tree Canopies In Norfolk, Va Using Agent-Based Modeling, Virginia Zamponi, Kevin O'Brien, Erik Jensen, Brandon Feldhaus, Russell Moore, Christopher J. Lynch, Ross Gore
VMASC Publications
Prolonged exposure to extreme heat can result in illness and death. In urban areas of dense concentrations of pavement, buildings, and other surfaces that absorb and retain heat, extreme heat conditions can arise regularly and create harmful environmental exposures for residents daily during certain parts of the year. Tree canopies provide shade and help to cool the environment, making mature trees with large canopies a simple and effective way to reduce urban heat. We develop a demographically representative 1 (agent): 1 (person) agent-based model to understand the extent to which different demographics of residents in Norfolk, VA are equitably shaded …
Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen
Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen
VMASC Publications
In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …
Combining Green Metrics And Digital Twins For Sustainability Planning And Governance Of Smart Buildings And Cities, Casey R. Corrado, Suzanne M. Delong, Emily G. Holt, Edward Y. Hua, Andreas Tolk
Combining Green Metrics And Digital Twins For Sustainability Planning And Governance Of Smart Buildings And Cities, Casey R. Corrado, Suzanne M. Delong, Emily G. Holt, Edward Y. Hua, Andreas Tolk
VMASC Publications
Creating a more sustainable world will require a coordinated effort to address the rise of social, economic, and environmental concerns resulting from the continuous growth of cities. Supporting planners with tools to address them is pivotal, and sustainability is one of the main objectives. Modeling and simulation augmenting digital twins can play an important role to implement these tools. Although various green best practices have been utilized over time and there are related attempts at measuring green success, works in the published literature tend to focus on addressing a single problem (e.g., energy efficiency), and a comprehensive approach that takes …
Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz
Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz
VMASC Publications
Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …
Internet-Of-Things Devices In Support Of The Development Of Echoic Skills Among Children With Autism Spectrum Disorder, Krzysztof J. Rechowicz, John B. Stull, Michelle M. Hascall, Saikou Y. Diallo, Kevin J. O'Brien
Internet-Of-Things Devices In Support Of The Development Of Echoic Skills Among Children With Autism Spectrum Disorder, Krzysztof J. Rechowicz, John B. Stull, Michelle M. Hascall, Saikou Y. Diallo, Kevin J. O'Brien
VMASC Publications
A significant therapeutic challenge for people with disabilities is the development of verbal and echoic skills. Digital voice assistants (DVAs), such as Amazon’s Alexa, provide networked intelligence to billions of Internet-of-Things devices and have the potential to offer opportunities to people, such as those diagnosed with autism spectrum disorder (ASD), to advance these necessary skills. Voice interfaces can enable children with ASD to practice such skills at home; however, it remains unclear whether DVAs can be as proficient as therapists in recognizing utterances by a developing speaker. We developed an Alexa-based skill called ASPECT to measure how well the DVA …
Methods For Weighting Decisions To Assist Modelers And Decision Analysts: A Review Of Ratio Assignment And Approximate Techniques, Barry Ezell, Christopher J. Lynch, Patrick T. Hester
Methods For Weighting Decisions To Assist Modelers And Decision Analysts: A Review Of Ratio Assignment And Approximate Techniques, Barry Ezell, Christopher J. Lynch, Patrick T. Hester
VMASC Publications
Computational models and simulations often involve representations of decision-making processes. Numerous methods exist for representing decision-making at varied resolution levels based on the objectives of the simulation and the desired level of fidelity for validation. Decision making relies on the type of decision and the criteria that is appropriate for making the decision; therefore, decision makers can reach unique decisions that meet their own needs given the same information. Accounting for personalized weighting scales can help to reflect a more realistic state for a modeled system. To this end, this article reviews and summarizes eight multi-criteria decision analysis (MCDA) techniques …
Simulation For Cybersecurity: State Of The Art And Future Directions, Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty
Simulation For Cybersecurity: State Of The Art And Future Directions, Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty
VMASC Publications
In this article, we provide an introduction to simulation for cybersecurity and focus on three themes: (1) an overview of the cybersecurity domain; (2) a summary of notable simulation research efforts for cybersecurity; and (3) a proposed way forward on how simulations could broaden cybersecurity efforts. The overview of cybersecurity provides readers with a foundational perspective of cybersecurity in the light of targets, threats, and preventive measures. The simulation research section details the current role that simulation plays in cybersecurity, which mainly falls on representative environment building; test, evaluate, and explore; training and exercises; risk analysis and assessment; and humans …
Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz
Human Factors, Ergonomics And Industry 4.0 In The Oil & Gas Industry: A Bibliometric Analysis, Francesco Longo, Antonio Padovano, Lucia Gazzaneo, Jessica Frangella, Rafael Diaz
VMASC Publications
Over the last few years, the Human Factors and Ergonomics (HF/E) discipline has significantly benefited from new human-centric engineered digital solutions of the 4.0 industrial age. Technologies are creating new socio-technical interactions between human and machine that minimize the risk of design-induced human errors and have largely contributed to remarkable improvements in terms of process safety, productivity, quality, and workers’ well-being. However, despite the Oil&Gas (O&G) sector is one of the most hazardous environments where human error can have severe consequences, Industry 4.0 aspects are still scarcely integrated with HF/E. This paper calls for a holistic understanding of the changing …
Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano
Developing An Artificial Intelligence Framework To Assess Shipbuilding And Repair Sub-Tier Supply Chains Risk, Rafael Diaz, Katherine Smith, Beatriz Acero, Francesco Longo, Antonio Padovano
VMASC Publications
The defense shipbuilding and repair industry is a labor-intensive sector that can be characterized by low-product volumes and high investments in which a large number of shared resources, technology, suppliers, and processes asynchronously converge into large construction projects. It is mainly organized by the execution of a complex combination of sequential and overlapping stages. While entities engaged in this large-scale endeavor are often knowledgeable about their first-tier suppliers, they usually do not have insight into the lower tiers suppliers. A sizable part of any supply chain disruption is attributable to instabilities in sub-tier suppliers. This research note conceptually delineates a …
Agent-Based Modelling Of Values: The Case Of Value Sensitive Design For Refugee Logistics, Christine Boshuijzen-Van Burken, Ross J. Gore, Frank Dignum, Lamber Royakkers, Phillip Wozny, F. Leron Shults
Agent-Based Modelling Of Values: The Case Of Value Sensitive Design For Refugee Logistics, Christine Boshuijzen-Van Burken, Ross J. Gore, Frank Dignum, Lamber Royakkers, Phillip Wozny, F. Leron Shults
VMASC Publications
We have used value sensitive design as a method to develop an agent-based model of values in humanitarian logistics for refugees. Schwartz’s theory of universal values is implemented in the model in such a way that agents can make value trade-offs, which are operationalized into a measure of refugee wellbeing and a measure of public opinion about how the refugee logistics is being handled. By trying out different ‘value scenarios’, stakeholders who are responsible for, or involved in refugee logistics can have insights into the effects of various value choices. The model is visualized and made usable as a platform …
Virginia Digital Shipbuilding Program (Vdsp): Building An Agile Modern Workforce To Improve Performance In The Shipbuilding And Ship Repair Industry, Joseph Peter Kosteczko, Katherine Smith, Jessica Johnson, Rafael Diaz
Virginia Digital Shipbuilding Program (Vdsp): Building An Agile Modern Workforce To Improve Performance In The Shipbuilding And Ship Repair Industry, Joseph Peter Kosteczko, Katherine Smith, Jessica Johnson, Rafael Diaz
VMASC Publications
Industry 4.0 is the latest stage in the Industrial Revolution and is reflected in the digital transformation and use of emergent technologies including the Internet of Things, Big Data, Robotic automation of processes, 3D printing and additive manufacturing, drones and Artificial Intelligence (AI) in the manufacturing industry. The implementation of these technologies in the Shipbuilding and Ship Repair Industry is currently in a nascent stage. Considering this, there is huge potential to increase cost savings, decrease production timelines, and drive down inefficiencies in Lifecyle management of ships. However, the implementation of these Industry 4.0 technologies is hindered by a noticeable …
A Blockchain Simulator For Evaluating Consensus Algorithms In Diverse Networking Environments, Peter Foytik, Sachin Shetty, Sarada Prasad Gochhayat, Eranga Herath, Deepak Tosh, Laurent Njilla
A Blockchain Simulator For Evaluating Consensus Algorithms In Diverse Networking Environments, Peter Foytik, Sachin Shetty, Sarada Prasad Gochhayat, Eranga Herath, Deepak Tosh, Laurent Njilla
VMASC Publications
The massive scale, heterogeneity and distributed nature of Internet-of-Things (IoT) presents challenges in realizing a practical and effective security solution. Blockchain empowered platforms and technologies have been proposed to address aspects of this challenge. In order to realize a practical Blockchain deployment for IoT, there is a need for a testing and evaluation platform to evaluate performance and security of Blockchain applications and systems. In this paper, we present a Blockchain simulator that evaluates the consensus algorithms in a realistic and configurable network environment. Though, there are several Blockchain evaluation platforms, they are either wedded to a specific consensus protocol …
Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla
Measuring Decentrality In Blockchain Based Systems, Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla
VMASC Publications
Blockchain promises to provide a distributed and decentralized means of trust among untrusted users. However, in recent years, a shift from decentrality to centrality has been observed in the most accepted Blockchain system, i.e., Bitcoin. This shift has motivated researchers to identify the cause of decentrality, quantify decentrality and analyze the impact of decentrality. In this work, we take a holistic approach to identify and quantify decentrality in Blockchain based systems. First, we identify the emergence of centrality in three layers of Blockchain based systems, namely governance layer, network layer and storage layer. Then, we quantify decentrality in these layers …
The Artificial University: Decision Support For Universities In The Covid-19 Era, Wesley J. Wildman, Saikou Y. Diallo, George Hodulik, Andrew Page, Andreas Tolk, Neha Gondal
The Artificial University: Decision Support For Universities In The Covid-19 Era, Wesley J. Wildman, Saikou Y. Diallo, George Hodulik, Andrew Page, Andreas Tolk, Neha Gondal
VMASC Publications
Operating universities under pandemic conditions is a complex undertaking. The Artificial University (TAU) responds to this need. TAU is a configurable, open-source computer simulation of a university using a contact network based on publicly available information about university classes, residences, and activities. This study evaluates health outcomes for an array of interventions and testing protocols in an artificial university of 6,500 students, faculty, and staff. Findings suggest that physical distancing and centralized contact tracing are most effective at reducing infections, but there is a tipping point for compliance below which physical distancing is less effective. If student compliance is anything …
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
VMASC Publications
The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, …
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
VMASC Publications
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication …
A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu
A Reliable Data Provenance And Privacy Preservation Architecture For Business-Driven Cyber-Physical Systems Using Blockchain, Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu
VMASC Publications
Cyber-physical systems (CPS) including power systems, transportation, industrial control systems, etc. support both advanced control and communications among system components. Frequent data operations could introduce random failures and malicious attacks or even bring down the whole system. The dependency on a central authority increases the risk of single point of failure. To establish an immutable data provenance scheme for CPS, the authors adopt blockchain and propose a decentralized architecture to assure data integrity. In business-driven CPS, end users are required to share their personal information with multiple third parties. To prevent data leakage and preserve user privacy, the authors isolate …
Augmenting Bottom-Up Metamodels With Predicates, Ross J. Gore, Saikou Diallo, Christopher Lynch, Jose Padilla
Augmenting Bottom-Up Metamodels With Predicates, Ross J. Gore, Saikou Diallo, Christopher Lynch, Jose Padilla
VMASC Publications
Metamodeling refers to modeling a model. There are two metamodeling approaches for ABMs: (1) top-down and (2) bottom-up. The top down approach enables users to decompose high-level mental models into behaviors and interactions of agents. In contrast, the bottom-up approach constructs a relatively small, simple model that approximates the structure and outcomes of a dataset gathered fromthe runs of an ABM. The bottom-up metamodel makes behavior of the ABM comprehensible and exploratory analyses feasible. Formost users the construction of a bottom-up metamodel entails: (1) creating an experimental design, (2) running the simulation for all cases specified by the design, (3) …
Toward A Formalism Of Modeling And Simulation Using Model Theory, Saikou Y. Diallo, Jose Padilla, Ross Gore, Heber Herencia-Zapana, Andreas Tolk
Toward A Formalism Of Modeling And Simulation Using Model Theory, Saikou Y. Diallo, Jose Padilla, Ross Gore, Heber Herencia-Zapana, Andreas Tolk
VMASC Publications
This article proposes a Modeling and Simulation (M&S) formalism using Model Theory. The article departs from the premise that M&S is the science that studies the nature of truth using models and simulations. Truth in models and simulations is relative as they seek to answer specific modeling questions. Consequently, truth in M&S is relative because every model is a purposeful abstraction of reality. We use Model Theory to express the proposed formalism because it is built from the premise that truth is relative. The proposed formalism allows us to: (1) deduce formal definitions and explanations of areas of study in …
Colonel Blotto Games And Lancaster's Equations: A Novel Military Modeling Combination, Andrew Collins, Patrick T. Hester
Colonel Blotto Games And Lancaster's Equations: A Novel Military Modeling Combination, Andrew Collins, Patrick T. Hester
VMASC Publications
Military strategists face a difficult task when engaged in a battle against an adversarial force. They have to predict both what tactics their opponent will employ and the outcomes of any resultant conflicts in order to make the best decision about their actions. Game theory has been the dominant technique used by analysts to investigate the possible actions that an enemy will employ. Traditional game theory can be augmented by use of Lanchester equations, a set of differential equations used to determine the outcome of a conflict. This paper demonstrates a novel combination of game theory and Lanchester equations using …
Do We Need M&S Science?, Jose J. Padilla, Saikou Y. Diallo, Andreas Tolk
Do We Need M&S Science?, Jose J. Padilla, Saikou Y. Diallo, Andreas Tolk
VMASC Publications
No abstract provided.