Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Computer Sciences

Keyword
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 1214

Full-Text Articles in Physical Sciences and Mathematics

Machine Learning Approach To Activity Categorization In Young Adults Using Biomechanical Metrics, Nathan Q. C. Holland Oct 2023

Machine Learning Approach To Activity Categorization In Young Adults Using Biomechanical Metrics, Nathan Q. C. Holland

Mechanical & Aerospace Engineering Theses & Dissertations

Inactive adults often have decreased musculoskeletal health and increased risk factors for chronic diseases. However, there is limited data linking biomechanical measurements of generally healthy young adults to their physical activity levels assessed through questionnaires. Commonly used data collection methods in biomechanics for assessing musculoskeletal health include but are not limited to muscle quality (measured as echo intensity when using ultrasound), isokinetic (i.e., dynamic) muscle strength, muscle activations, and functional movement assessments using motion capture systems. These assessments can be time consuming for both data collection and processing. Therefore, understanding if all biomechanical assessments are necessary to classify the activity …


Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii Oct 2023

Faster, Cheaper, And Better Cfd: A Case For Machine Learning To Augment Reynolds-Averaged Navier-Stokes, John Peter Romano Ii

Mechanical & Aerospace Engineering Theses & Dissertations

In recent years, the field of machine learning (ML) has made significant advances, particularly through applying deep learning (DL) algorithms and artificial intelligence (AI). The literature shows several ways that ML may enhance the power of computational fluid dynamics (CFD) to improve its solution accuracy, reduce the needed computational resources and reduce overall simulation cost. ML techniques have also expanded the understanding of underlying flow physics and improved data capture from experimental fluid dynamics.

This dissertation presents an in-depth literature review and discusses ways the field of fluid dynamics has leveraged ML modeling to date. The author selects and describes …


Tracing And Segmentation Of Molecular Patterns In 3-Dimensional Cryo-Et/Em Density Maps Through Algorithmic Image Processing And Deep Learning-Based Techniques, Salim Sazzed Oct 2023

Tracing And Segmentation Of Molecular Patterns In 3-Dimensional Cryo-Et/Em Density Maps Through Algorithmic Image Processing And Deep Learning-Based Techniques, Salim Sazzed

Computer Science Theses & Dissertations

Understanding the structures of biological macromolecules is highly important as they are closely associated with cellular functionalities. Comprehending the precise organization of actin filaments is crucial because they form the dynamic cytoskeleton, which offers structural support to cells and connects the cell’s interior with its surroundings. However, determining the precise organization of actin filaments is challenging due to the poor quality of cryo-electron tomography (cryo-ET) images, which suffer from low signal-to-noise (SNR) ratios and the presence of missing wedge, as well as diverse shape characteristics of actin filaments. To address these formidable challenges, the primary component of this dissertation focuses …


Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane Aug 2023

Reinforcing Digital Trust For Cloud Manufacturing Through Data Provenance Using Ethereum Smart Contracts, Trupti Narayan Rane

Engineering Management & Systems Engineering Theses & Dissertations

Cloud Manufacturing(CMfg) is an advanced manufacturing model that caters to fast-paced agile requirements (Putnik, 2012). For manufacturing complex products that require extensive resources, manufacturers explore advanced manufacturing techniques like CMfg as it becomes infeasible to achieve high standards through complete ownership of manufacturing artifacts (Kuan et al., 2011). CMfg, with other names such as Manufacturing as a Service (MaaS) and Cyber Manufacturing (NSF, 2020), addresses the shortcoming of traditional manufacturing by building a virtual cyber enterprise of geographically distributed entities that manufacture custom products through collaboration.

With manufacturing venturing into cyberspace, Digital Trust issues concerning product quality, data, and intellectual …


Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu Aug 2023

Towards A Robust Defense: A Multifaceted Approach To The Detection And Mitigation Of Neural Backdoor Attacks Through Feature Space Exploration And Analysis, Liuwan Zhu

Electrical & Computer Engineering Theses & Dissertations

From voice assistants to self-driving vehicles, machine learning(ML), especially deep learning, revolutionizes the way we work and live, through the wide adoption in a broad range of applications. Unfortunately, this widespread use makes deep learning-based systems a desirable target for cyberattacks, such as generating adversarial examples to fool a deep learning system to make wrong decisions. In particular, many recent studies have revealed that attackers can corrupt the training of a deep learning model, e.g., through data poisoning, or distribute a deep learning model they created with “backdoors” planted, e.g., distributed as part of a software library, so that the …


Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis Aug 2023

Towards Intelligent Runtime Framework For Distributed Heterogeneous Systems, Polykarpos Thomadakis

Computer Science Theses & Dissertations

Scientific applications strive for increased memory and computing performance, requiring massive amounts of data and time to produce results. Applications utilize large-scale, parallel computing platforms with advanced architectures to accommodate their needs. However, developing performance-portable applications for modern, heterogeneous platforms requires lots of effort and expertise in both the application and systems domains. This is more relevant for unstructured applications whose workflow is not statically predictable due to their heavily data-dependent nature. One possible solution for this problem is the introduction of an intelligent Domain-Specific Language (iDSL) that transparently helps to maintain correctness, hides the idiosyncrasies of lowlevel hardware, and …


Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla Aug 2023

Assessing The Prevalence And Archival Rate Of Uris To Git Hosting Platforms In Scholarly Publications, Emily Escamilla

Computer Science Theses & Dissertations

The definition of scholarly content has expanded to include the data and source code that contribute to a publication. While major archiving efforts to preserve conventional scholarly content, typically in PDFs (e.g., LOCKSS, CLOCKSS, Portico), are underway, no analogous effort has yet emerged to preserve the data and code referenced in those PDFs, particularly the scholarly code hosted online on Git Hosting Platforms (GHPs). Similarly, Software Heritage is working to archive public source code, but there is value in archiving the surrounding ephemera that provide important context to the code while maintaining their original URIs. In current implementations, source code …


Inverse Mappers For Qcd Global Analysis, Manal Almaeen Aug 2023

Inverse Mappers For Qcd Global Analysis, Manal Almaeen

Computer Science Theses & Dissertations

Inverse problems – using measured observations to determine unknown parameters – are well motivated but challenging in many scientific problems. Mapping parameters to observables is a well-posed problem with unique solutions, and therefore can be solved with differential equations or linear algebra solvers. However, the inverse problem requires backward mapping from observable to parameter space, which is often nonunique. Consequently, solving inverse problems is ill-posed and a far more challenging computational problem.

Our motivated application in this dissertation is the inverse problems in nuclear physics that characterize the internal structure of the hadrons. We first present a machine learning framework …


Optimal Domain-Partitioning Algorithm For Real-Life Transportation Networks And Finite Element Meshes, Jimesh Bhagatji, Sharanabasaweshwara Asundi, Eric Thompson, Duc T. Nguyen Jun 2023

Optimal Domain-Partitioning Algorithm For Real-Life Transportation Networks And Finite Element Meshes, Jimesh Bhagatji, Sharanabasaweshwara Asundi, Eric Thompson, Duc T. Nguyen

Civil & Environmental Engineering Faculty Publications

For large-scale engineering problems, it has been generally accepted that domain-partitioning algorithms are highly desirable for general-purpose finite element analysis (FEA). This paper presents a heuristic numerical algorithm that can efficiently partition any transportation network (or any finite element mesh) into a specified number of subdomains (usually depending on the number of parallel processors available on a computer), which will result in “minimising the total number of system BOUNDARY nodes” (as a primary criterion) and achieve “balancing work loads” amongst the subdomains (as a secondary criterion). The proposed seven-step heuristic algorithm (with enhancement features) is based on engineering common sense …


What Effects Do Large Language Models Have On Cybersecurity, Josiah Marshall May 2023

What Effects Do Large Language Models Have On Cybersecurity, Josiah Marshall

Cybersecurity Undergraduate Research Showcase

Large Language Models (LLMs) are artificial intelligence (AI) tools that can process, summarize, and translate texts and predict future words in a sentence, letting the LLM generate sentences similar to how humans talk and write. One concern that needs to be flagged is that, often, the content generated by different LLMs is inaccurate. LLMs are trained on code that can be used to detect data breaches, detect ransomware, and even pinpoint organizational vulnerabilities in advance of a cyberattack. LLMs are new but have unbelievable potential with their ability to generate code that brings awareness to cyber analysts and IT professionals. …


Fair Signposting Profile, Herbert Van De Sompel, Martin Klein, Shawn Jones, Michael L. Nelson, Simeon Warner, Anusuriya Devaraju, Robert Huber, Wilko Steinhoff, Vyacheslav Tykhonov, Luc Boruta, Enno Meijers, Stian Soiland-Reyes, Mark Wilkonson May 2023

Fair Signposting Profile, Herbert Van De Sompel, Martin Klein, Shawn Jones, Michael L. Nelson, Simeon Warner, Anusuriya Devaraju, Robert Huber, Wilko Steinhoff, Vyacheslav Tykhonov, Luc Boruta, Enno Meijers, Stian Soiland-Reyes, Mark Wilkonson

Computer Science Faculty Publications

[First paragraph] This page details concrete recipes that platforms that host research outputs (e.g. data repositories, institutional repositories, publisher platforms, etc.) can follow to implement Signposting, a lightweight yet powerful approach to increase the FAIRness of scholarly objects.


Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego May 2023

Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego

Electrical & Computer Engineering Theses & Dissertations

World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …


Supporting Account-Based Queries For Archived Instagram Posts, Himarsha R. Jayanetti May 2023

Supporting Account-Based Queries For Archived Instagram Posts, Himarsha R. Jayanetti

Computer Science Theses & Dissertations

Social media has become one of the primary modes of communication in recent times, with popular platforms such as Facebook, Twitter, and Instagram leading the way. Despite its popularity, Instagram has not received as much attention in academic research compared to Facebook and Twitter, and its significant role in contemporary society is often overlooked. Web archives are making efforts to preserve social media content despite the challenges posed by the dynamic nature of these sites. The goal of our research is to facilitate the easy discovery of archived copies, or mementos, of all posts belonging to a specific Instagram account …


Opportunities And Challenges From Major Disasters Lessons Learned Of Long-Term Recovery Group Members, Eduardo E. Landaeta May 2023

Opportunities And Challenges From Major Disasters Lessons Learned Of Long-Term Recovery Group Members, Eduardo E. Landaeta

Graduate Program in International Studies Theses & Dissertations

Natural hazards caused by the alteration of weather patterns expose populations at risk, with an outcome of economic loss, property damage, personal injury, and loss of life. The unpredictability of disasters is a topic of concern to most governments. Disaster policies need more attention in aligning mitigation opportunities with disaster housing recovery (DHR). The effect of flooding, which primarily impacts housing in coastal areas, is one of the most serious issues associated with natural hazard. Flooding has a variety of causes and implications, especially for vulnerable populations who are exposed to it. DHR is complex, involving the need for effective …


Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer May 2023

Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer

School of Cybersecurity Faculty Publications

The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …


A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell Apr 2023

A Study Of The Collection And Sharing Of Student Data With Virginia Universities, Titus Voell

Cybersecurity Undergraduate Research Showcase

Data collection is a vital component in any organization in regards to keeping track of user activity, gaining statistics and improving the user experience, and user identification. While the underlying basis of data collection is understandable, the use of this data has to be closely regulated and documented. In many cases, the VCDPA (Virginia Consumer Data Protection Act) outlines the guidelines for data use, data controller responsibilities, and limitations however nonprofit organizations are exempt from compliance. Colleges and universities, although still held to some degree of limitation, range in permissiveness with what data they choose to collect and retain but …


Visual Art In The Age Of Ai, Roshnica Gurung Apr 2023

Visual Art In The Age Of Ai, Roshnica Gurung

Cybersecurity Undergraduate Research Showcase

Artists and researchers have been deeply interested in using AI programs that generate art for quite some time now. As a result, there have been many advancements in making AI more accessible and easier to use for the public. This is because AI is not just for business anymore. Nowadays an individual without a college degree with even the slightest interest in art can go on a website like Stable Diffusion and create an artistic image using a text prompt in a quick couple minutes. The only limit is your imagination- and your internet’s stability. This accessibility was a huge …


Assessing The Frequency And Severity Of Malware Attacks: An Exploratory Analysis Of The Advisen Cyber Loss Dataset, Ahmed M. Abdelmagid, Farshid Javadnejad, C. Ariel Pinto, Michael K. Mcshane, Rafael Diaz, Elijah Gartell Apr 2023

Assessing The Frequency And Severity Of Malware Attacks: An Exploratory Analysis Of The Advisen Cyber Loss Dataset, Ahmed M. Abdelmagid, Farshid Javadnejad, C. Ariel Pinto, Michael K. Mcshane, Rafael Diaz, Elijah Gartell

Modeling, Simulation and Visualization Student Capstone Conference

In today's business landscape, cyberattacks present a significant threat that can lead to severe financial losses and damage to a company's reputation. To mitigate this risk, it is essential for stakeholders to have an understanding of the latest types and patterns of cyberattacks. The primary objective of this research is to provide this knowledge by utilizing the Advisen cyber loss dataset, which comprises over 137,000 cyber incidents that occurred across various industry sectors from 2013 to 2020. By using text mining techniques, this paper will conduct an exploratory data analysis to identify the most common types of malware, including ransomware. …


Extracting Information From Twitter Screenshots, Tarannum Zaki, Michael L. Nelson, Michele C. Weigle Apr 2023

Extracting Information From Twitter Screenshots, Tarannum Zaki, Michael L. Nelson, Michele C. Weigle

Modeling, Simulation and Visualization Student Capstone Conference

Screenshots are prevalent on social media as a common approach for information sharing. Users rarely verify before sharing screenshots whether they are fake or real. Information sharing through fake screenshots can be highly responsible for misinformation and disinformation spread on social media. There are services of the live web and web archives that could be used to validate the content of a screenshot. We are going to develop a tool that would automatically provide a probability whether a screenshot is fake by using the services of the live web and web archives.


Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen Apr 2023

Automatic Generation Of Virtual Work Guide For Complex Procedures: A Case, Shan Liu, Yuzhong Shen

Modeling, Simulation and Visualization Student Capstone Conference

Practical work guides for complex procedures are significant and highly affect the efficiency and accuracy of on-site users. This paper presents a technique to generate virtual work guides automatically for complex procedures. Firstly, the procedure information is extracted from the electronic manual in PDF format. And then, the extracted procedure steps are mapped to the virtual model parts in preparation for animation between adjacent steps. Next, smooth animations of the procedure are generated based on a 3D natural cubic spline curve to improve the spatial ability of the work guide. In addition, each step's annotation is automatically adjusted to improve …


Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith Apr 2023

Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith

Modeling, Simulation and Visualization Student Capstone Conference

Mathematics is an important subject that is pervasive across many disciplines. It is also a subject that has proven to be challenging to both teach and learn. Students face many challenges with learning math such as a lack of motivation and anxiety. To address these challenges, game-based learning has become a popular approach to stimulate students and create a more positive classroom environment. It can serve as an alternative or supplement to traditional teaching and can better engage students while developing a positive attitude toward learning. The use of games in a classroom can create a more exciting and engaging …


Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry Apr 2023

Gpu Utilization: Predictive Sarimax Time Series Analysis, Dorothy Dorie Parry

Modeling, Simulation and Visualization Student Capstone Conference

This work explores collecting performance metrics and leveraging the output for prediction on a memory-intensive parallel image classification algorithm - Inception v3 (or "Inception3"). Experimental results were collected by nvidia-smi on a computational node DGX-1, equipped with eight Tesla V100 Graphic Processing Units (GPUs). Time series analysis was performed on the GPU utilization data taken, for multiple runs, of Inception3’s image classification algorithm (see Figure 1). The time series model applied was Seasonal Autoregressive Integrated Moving Average Exogenous (SARIMAX).


Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis Apr 2023

Lidar Buoy Detection For Autonomous Marine Vessel Using Pointnet Classification, Christopher Adolphi, Dorothy Dorie Parry, Yaohang Li, Masha Sosonkina, Ahmet Saglam, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

Maritime autonomy, specifically the use of autonomous and semi-autonomous maritime vessels, is a key enabling technology supporting a set of diverse and critical research areas, including coastal and environmental resilience, assessment of waterway health, ecosystem/asset monitoring and maritime port security. Critical to the safe, efficient and reliable operation of an autonomous maritime vessel is its ability to perceive on-the-fly the external environment through onboard sensors. In this paper, buoy detection for LiDAR images is explored by using several tools and techniques: machine learning methods, Unity Game Engine (herein referred to as Unity) simulation, and traditional image processing. The Unity Game …


Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla Apr 2023

Assessing Frustration Towards Venezuelan Migrants In Columbia: Path Analysis On Newspaper Coded Data, Brian Llinás, Guljannat Huseynli, Erika Frydenlund, Katherine Palacia, Jose Padilla

Modeling, Simulation and Visualization Student Capstone Conference

This study analyzes the impact of Venezuelan migrants on local frustration levels in Colombia. The study found a relationship between the influx of Venezuelan migrants and the level of frustration among locals towards migrants, infrastructure, government, and geopolitics. Additionally, we identified that frustration types have an impact on other frustrations. The study used articles from a national newspaper in Colombia from 2015 to 2020. News articles were coded during a previous study qualitatively and categorized into frustration types. The code frequencies were then used as variables in this study. We used path modeling to statistically study the relationship between dependent …


Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen Apr 2023

Enhancement Of Deep Learning Protein Structure Prediction, Ruoming Shen

Modeling, Simulation and Visualization Student Capstone Conference

Protein modeling is a rapidly expanding field with valuable applications in the pharmaceutical industry. Accurate protein structure prediction facilitates drug design, as extensive knowledge about the atomic structure of a given protein enables scientists to target that protein in the human body. However, protein structure identification in certain types of protein images remains challenging, with medium resolution cryogenic electron microscopy (cryo-EM) protein density maps particularly difficult to analyze. Recent advancements in computational methods, namely deep learning, have improved protein modeling. To maximize its accuracy, a deep learning model requires copious amounts of up-to-date training data.

This project explores DeepSSETracer, a …


Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund Apr 2023

Behind Derogatory Migrants' Terms For Venezuelan Migrants: Xenophobia And Sexism Identification With Twitter Data And Nlp, Joseph Martínez, Melissa Miller-Felton, Jose Padilla, Erika Frydenlund

Modeling, Simulation and Visualization Student Capstone Conference

The sudden arrival of many migrants can present new challenges for host communities and create negative attitudes that reflect that tension. In the case of Colombia, with the influx of over 2.5 million Venezuelan migrants, such tensions arose. Our research objective is to investigate how those sentiments arise in social media. We focused on monitoring derogatory terms for Venezuelans, specifically veneco and veneca. Using a dataset of 5.7 million tweets from Colombian users between 2015 and 2021, we determined the proportion of tweets containing those terms. We observed a high prevalence of xenophobic and defamatory language correlated with the …


An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen Apr 2023

An Algorithm For Finding Data Dependencies In An Event Graph, Erik J. Jensen

Modeling, Simulation and Visualization Student Capstone Conference

This work presents an algorithm for finding data dependencies in a discrete-event simulation system, from the event graph of the system. The algorithm can be used within a parallel discrete-event simulation. Also presented is an experimental system and event graph, which is used for testing the algorithm. Results indicate that the algorithm can provide information about which vertices in the experimental event graph can affect other vertices, and the minimum amount of time in which this interference can occur.


U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa Apr 2023

U-Net Based Multiclass Semantic Segmentation For Natural Disaster Based Satellite Imagery, Nishat Ara Nipa

Modeling, Simulation and Visualization Student Capstone Conference

Satellite image analysis of natural disasters is critical for effective emergency response, relief planning, and disaster prevention. Semantic segmentation is believed to be on of the best techniques to capture pixelwise information in computer vision. In this work we will be using a U-Net architecture to do a three class semantic segmentation for the Xview2 dataset to capture the level of damage caused by different natural disaster which is beyond the visual scope of human eyes.


Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis Apr 2023

Statistical Approach To Quantifying Interceptability Of Interaction Scenarios For Testing Autonomous Surface Vessels, Benjamin E. Hargis, Yiannis E. Papelis

Modeling, Simulation and Visualization Student Capstone Conference

This paper presents a probabilistic approach to quantifying interceptability of an interaction scenario designed to test collision avoidance of autonomous navigation algorithms. Interceptability is one of many measures to determine the complexity or difficulty of an interaction scenario. This approach uses a combined probability model of capability and intent to create a predicted position probability map for the system under test. Then, intercept-ability is quantified by determining the overlap between the system under test probability map and the intruder’s capability model. The approach is general; however, a demonstration is provided using kinematic capability models and an odometry-based intent model.


Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla Apr 2023

Towards Nlp-Based Conceptual Modeling Frameworks, David Shuttleworth, Jose Padilla

Modeling, Simulation and Visualization Student Capstone Conference

This paper presents preliminary research using Natural Language Processing (NLP) to support the development of conceptual modeling frameworks. NLP-based frameworks are intended to lower the barrier of entry for non-modelers to develop models and to facilitate communication across disciplines considering simulations in research efforts. NLP drives conceptual modeling in two ways. Firstly, it attempts to automate the generation of conceptual models and simulation specifications, derived from non-modelers’ narratives, while standardizing the conceptual modeling process and outcome. Secondly, as the process is automated, it is simpler to replicate and be followed by modelers and non-modelers. This allows for using a common …