Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Computational Modeling & Simulation Engineering Faculty Publications

Discipline
Keyword
Publication Year

Articles 1 - 30 of 34

Full-Text Articles in Physical Sciences and Mathematics

Development Of Guidelines For Collecting Transit Ridership Data, Hong Yang, Kun Xie, Sherif Ishak, Qingyu Ma, Yang Liu Feb 2022

Development Of Guidelines For Collecting Transit Ridership Data, Hong Yang, Kun Xie, Sherif Ishak, Qingyu Ma, Yang Liu

Computational Modeling & Simulation Engineering Faculty Publications

Transit ridership is a critical determinant for many transit applications such as operation optimizations and project prioritization under performance-based funding mechanisms. As a result, the quality of ridership data is of utmost importance to both transit administrative agencies and transit operators. Many transit operators in Virginia report their ridership data to the Department of Rail and Public Transportation (DRPT) and the National Transit Database (NTD). However, with no specific guidelines available to transit agencies in Virginia for collecting ridership data, the heterogeneous mixture of diverse data collection methods and technologies has often raised concerns about the consistency and quality of …


Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao Jan 2022

Core Point Pixel-Level Localization By Fingerprint Features In Spatial Domain, Xueyi Ye, Yuzhong Shen, Maosheng Zeng, Yirui Liu, Huahua Chen, Zhijing Zhao

Computational Modeling & Simulation Engineering Faculty Publications

Singular point detection is a primary step in fingerprint recognition, especially for fingerprint alignment and classification. But in present there are still some problems and challenges such as more false-positive singular points or inaccurate reference point localization. This paper proposes an accurate core point localization method based on spatial domain features of fingerprint images from a completely different viewpoint to improve the fingerprint core point displacement problem of singular point detection. The method first defines new fingerprint features, called furcation and confluence, to represent specific ridge/valley distribution in a core point area, and uses them to extract the innermost Curve …


Hybrid Models As Transdisciplinary Research Enablers, Andreas Tolk, Alison Harper, Navonil Mustafee Jan 2021

Hybrid Models As Transdisciplinary Research Enablers, Andreas Tolk, Alison Harper, Navonil Mustafee

Computational Modeling & Simulation Engineering Faculty Publications

Modelling and simulation (M&S) techniques are frequently used in Operations Research (OR) to aid decision-making. With growing complexity of systems to be modelled, an increasing number of studies now apply multiple M&S techniques or hybrid simulation (HS) to represent the underlying system of interest. A parallel but related theme of research is extending the HS approach to include the development of hybrid models (HM). HM extends the M&S discipline by combining theories, methods and tools from across disciplines and applying multidisciplinary, interdisciplinary and transdisciplinary solutions to practice. In the broader OR literature, there are numerous examples of cross-disciplinary approaches in …


Electroosmotic Mixing Of Non-Newtonian Fluid In A Microchannel With Obstacles And Zeta Potential Heterogeneity, Lanju Mei, Defu Cui, Jiayue Shen, Diganta Dutta, Willie Brown, Lei Zhang, Ibibia K. Dabipi Jan 2021

Electroosmotic Mixing Of Non-Newtonian Fluid In A Microchannel With Obstacles And Zeta Potential Heterogeneity, Lanju Mei, Defu Cui, Jiayue Shen, Diganta Dutta, Willie Brown, Lei Zhang, Ibibia K. Dabipi

Computational Modeling & Simulation Engineering Faculty Publications

This paper investigates the electroosmotic micromixing of non-Newtonian fluid in a microchannel with wall-mounted obstacles and surface potential heterogeneity on the obstacle surface. In the numerical simulation, the full model consisting of the Navier–Stokes equations and the Poisson–Nernst–Plank equations are solved for the electroosmotic fluid field, ion transport, and electric field, and the power law model is used to characterize the rheological behavior of the aqueous solution. The mixing performance is investigated under different parameters, such as electric double layer thickness, flow behavior index, obstacle surface zeta potential, obstacle dimension. Due to the zeta potential heterogeneity at the obstacle surface, …


Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua Jan 2021

Hidden Markov Model And Cyber Deception For The Prevention Of Adversarial Lateral Movement, Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua

Computational Modeling & Simulation Engineering Faculty Publications

Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders' ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying decoy nodes along the predicted path. Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries' lateral movement. The …


Efficient Algorithms For Identifying Loop Formation And Computing Θ Value For Solving Minimum Cost Flow Network Problems, Timothy Michael Chávez, Duc Thai Nguyen Jan 2021

Efficient Algorithms For Identifying Loop Formation And Computing Θ Value For Solving Minimum Cost Flow Network Problems, Timothy Michael Chávez, Duc Thai Nguyen

Computational Modeling & Simulation Engineering Faculty Publications

While the minimum cost flow (MCF) problems have been well documented in many publications, due to its broad applications, little or no effort have been devoted to explaining the algorithms for identifying loop formation and computing the value needed to solve MCF network problems. This paper proposes efficient algorithms, and MATLAB computer implementation, for solving MCF problems. Several academic and real-life network problems have been solved to validate the proposed algorithms; the numerical results obtained by the developed MCF code have been compared and matched with the built-in MATLAB function Linprog() (Simplex algorithm) for further validation.


Robotically Steered Needles: A Survey Of Neurosurgical Applications And Technical Innovations, Michel A. Audette, Stéphane P.A. Bordas, Jason E. Blatt Jan 2020

Robotically Steered Needles: A Survey Of Neurosurgical Applications And Technical Innovations, Michel A. Audette, Stéphane P.A. Bordas, Jason E. Blatt

Computational Modeling & Simulation Engineering Faculty Publications

This paper surveys both the clinical applications and main technical innovations related to steered needles, with an emphasis on neurosurgery. Technical innovations generally center on curvilinear robots that can adopt a complex path that circumvents critical structures and eloquent brain tissue. These advances include several needle-steering approaches, which consist of tip-based, lengthwise, base motion-driven, and tissue-centered steering strategies. This paper also describes foundational mathematical models for steering, where potential fields, nonholonomic bicycle-like models, spring models, and stochastic approaches are cited. In addition, practical path planning systems are also addressed, where we cite uncertainty modeling in path planning, intraoperative soft tissue …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina Jan 2020

Implementing Asynchronous Linear Solvers Using Non-Uniform Distributions, Erik Jensen, Evan C. Coleman, Masha Sosonkina

Computational Modeling & Simulation Engineering Faculty Publications

Asynchronous iterative methods present a mechanism to improve the performance of algorithms for highly parallel computational platforms by removing the overhead associated with synchronization among computing elements. This paper considers a class of asynchronous iterative linear system solvers that employ randomization to determine the component update orders, specifically focusing on the effects of drawing the order from non-uniform distributions. Results from shared-memory experiments with a two-dimensional finite-difference discrete Laplacian problem show that using distributions favoring the selection of components with a larger contribution to the residual may lead to faster convergence than selecting uniformly. Multiple implementations of the randomized asynchronous …


Reimagining Medical Education In The Age Of Ai, Steven A. Wartman, C. Donald Combs Jan 2019

Reimagining Medical Education In The Age Of Ai, Steven A. Wartman, C. Donald Combs

Computational Modeling & Simulation Engineering Faculty Publications

Available medical knowledge exceeds the organizing capacity of the human mind, yet medical education remains based on information acquisition and application. Complicating this information overload crisis among learners is the fact that physicians' skill sets now must include collaborating with and managing artificial intelligence (AI) applications that aggregate big data, generate diagnostic and treatment recommendations, and assign confidence ratings to those recommendations. Thus, an overhaul of medical school curricula is due and should focus on knowledge management (rather than information acquisition), effective use of AI, improved communication, and empathy cultivation.


Change Detection Using Landsat And Worldview Images, Chiman Kwan, Bryan Chou, Leif Hagen, Daniel Perez, Yuzhong Shen, Jiang Li, Krzysztof Koperski Jan 2019

Change Detection Using Landsat And Worldview Images, Chiman Kwan, Bryan Chou, Leif Hagen, Daniel Perez, Yuzhong Shen, Jiang Li, Krzysztof Koperski

Computational Modeling & Simulation Engineering Faculty Publications

This paper presents some preliminary results using Landsat and Worldview images for change detection. The studied area had some significant changes such as construction of buildings between May 2014 and October 2015. We investigated several simple, practical, and effective approaches to change detection. For Landsat images, we first performed pansharpening to enhance the resolution to 15 meters. We then performed a chronochrome covariance equalization between two images. The residual between the two equalized images was then analyzed using several simple algorithms such as direct subtraction and global Reed-Xiaoli (GRX) detector. Experimental results using actual Landsat images clearly demonstrated that the …


Fusion Of Landsat And Worldview Images, Chiman Kwan, Bryan Chou, Jerry Yang, Daniel Perez, Yuzhong Shen, Jiang Li, Krzysztof Koperski Jan 2019

Fusion Of Landsat And Worldview Images, Chiman Kwan, Bryan Chou, Jerry Yang, Daniel Perez, Yuzhong Shen, Jiang Li, Krzysztof Koperski

Computational Modeling & Simulation Engineering Faculty Publications

Pansharpened Landsat images have 15 m spatial resolution with 16-day revisit periods. On the other hand, Worldview images have 0.5 m resolution after pansharpening but the revisit times are uncertain. We present some preliminary results for a challenging image fusion problem that fuses Landsat and Worldview (WV) images to yield a high temporal resolution image sequence at the same spatial resolution of WV images. Since the spatial resolution between Landsat and Worldview is 30 to 1, our preliminary results are mixed in that the objective performance metrics such as peak signal-to-noise ratio (PSNR), correlation coefficient (CC), etc. sometimes showed good …


Attacker Capability Based Dynamic Deception Model For Large-Scale Networks, Md Ali Reza Al Amin, Sachhin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua Jan 2019

Attacker Capability Based Dynamic Deception Model For Large-Scale Networks, Md Ali Reza Al Amin, Sachhin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamhoua

Computational Modeling & Simulation Engineering Faculty Publications

In modern days, cyber networks need continuous monitoring to keep the network secure and available to legitimate users. Cyber attackers use reconnaissance mission to collect critical network information and using that information, they make an advanced level cyber-attack plan. To thwart the reconnaissance mission and counterattack plan, the cyber defender needs to come up with a state-of-the-art cyber defense strategy. In this paper, we model a dynamic deception system (DDS) which will not only thwart reconnaissance mission but also steer the attacker towards fake network to achieve a fake goal state. In our model, we also capture the attacker’s capability …


Emerging Roles Of Virtual Patients In The Age Of Ai, C. Donald Combs, P. Ford Combs Jan 2019

Emerging Roles Of Virtual Patients In The Age Of Ai, C. Donald Combs, P. Ford Combs

Computational Modeling & Simulation Engineering Faculty Publications

Today's web-enabled and virtual approach to medical education is different from the 20th century's Flexner-dominated approach. Now, lectures get less emphasis and more emphasis is placed on learning via early clinical exposure, standardized patients, and other simulations. This article reviews literature on virtual patients (VPs) and their underlying virtual reality technology, examines VPs' potential through the example of psychiatric intake teaching, and identifies promises and perils posed by VP use in medical education.


Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang Jan 2018

Hurricane Evacuation Modeling Using Behavior Models And Scenario-Driven Agent-Based Simulations, Yuan Zhu, Kun Xie, Kaan Ozbay, Hong Yang

Computational Modeling & Simulation Engineering Faculty Publications

Transportation modeling and simulation play an important role in the planning and management of emergency evacuation. It is often indispensable for the preparedness and timely response to extreme events occurring in highly populated areas. Reliable and robust agent-based evacuation models are of great importance to support evacuation decision making. Nevertheless, these models rely on numerous hypothetical causal relationships between the evacuation behavior and a variety of factors including socio-economic characteristics and storm intensity. Understanding the impacts of these factors on evacuation behaviors (e.g., destination and route choices) is crucial in preparing optimal evacuation plans. This paper aims to contribute to …


Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry Jan 2017

Secrecy Rates And Optimal Power Allocation For Full-Duplex Decode-And-Forward Relay Wire-Tap Channels, Lubna Elsaid, Leonardo Jimenez-Rodriguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry

Computational Modeling & Simulation Engineering Faculty Publications

This paper investigates the secrecy rates and optimal power allocation schemes for a decode-and-forward wiretap relay channel where the transmission from a source to a destination is aided by a relay operating in a full-duplex (FD) mode under practical residual self-interference. By first considering static channels, we address the non-convex optimal power allocation problems between the source and relay nodes under individual and joint power constraints to establish closed-form solutions. An asymptotic analysis is then given to provide important insights on the derived power allocation solutions. Specifically, by using the method of dominant balance, it is demonstrated that full power …


N3lo Nn Interaction Adjusted To Light Nuclei In Ab Exitu Approach, A. M. Shirokov, I. J. Shin, Y. Kim, M. Sosonkina, P. Maris, J. P. Vary Jan 2016

N3lo Nn Interaction Adjusted To Light Nuclei In Ab Exitu Approach, A. M. Shirokov, I. J. Shin, Y. Kim, M. Sosonkina, P. Maris, J. P. Vary

Computational Modeling & Simulation Engineering Faculty Publications

We use phase-equivalent transformations to adjust off-shell properties of similarity renormalization group evolved chiral effective field theory NN interaction (Idaho N3LO) to fit selected binding energies and spectra of light nuclei in an ab exitu approach. We then test the transformed interaction on a set of additional observables in light nuclei to verify that it provides reasonable descriptions of these observables with an apparent reduced need for three- and many-nucleon interactions.


Watertight And 2-Manifold Surface Meshes Using Dual Contouring With Tetrahedral Decomposition Of Grid Cubes, Tanweer Rashid, Sharmin Sultana, Michel A. Audette Jan 2016

Watertight And 2-Manifold Surface Meshes Using Dual Contouring With Tetrahedral Decomposition Of Grid Cubes, Tanweer Rashid, Sharmin Sultana, Michel A. Audette

Computational Modeling & Simulation Engineering Faculty Publications

The Dual Contouring algorithm (DC) is a grid-based process used to generate surface meshes from volumetric data. The advantage of DC is that it can reproduce sharp features by inserting vertices anywhere inside the grid cube, as opposed to the Marching Cubes (MC) algorithm that can insert vertices only on the grid edges. However, DC is unable to guarantee 2-manifold and watertight meshes due to the fact that it produces only one vertex for each grid cube. We present a modified Dual Contouring algorithm that is capable of overcoming this limitation. Our method decomposes an ambiguous grid cube into a …


Energy-Efficient Computational Chemistry: Comparison Of X86 And Arm Systems, Kristopher Keipert, Gaurav Mitra, Vaibhav Sunriyal, Sarom S. Leang, Masha Sosonkina, Alistair P. Rendell, Mark S. Gordon Nov 2015

Energy-Efficient Computational Chemistry: Comparison Of X86 And Arm Systems, Kristopher Keipert, Gaurav Mitra, Vaibhav Sunriyal, Sarom S. Leang, Masha Sosonkina, Alistair P. Rendell, Mark S. Gordon

Computational Modeling & Simulation Engineering Faculty Publications

The computational efficiency and energy-to-solution of several applications using the GAMESS quantum chemistry suite of codes is evaluated for 32-bit and 64-bit ARM-based computers, and compared to an x86 machine. The x86 system completes all benchmark computations more quickly than either ARM system and is the best choice to minimize time to solution. The ARM64 and ARM32 computational performances are similar to each other for Hartree-Fock and density functional theory energy calculations. However, for memory-intensive second-order perturbation theory energy and gradient computations the lower ARM32 read/write memory bandwidth results in computation times as much as 86% longer than on the …


Changing Cpu Frequency In Comd Proxy Application Offloaded To Intel Xeon Phi Co-Processors, Gary Lawson, Masha Sosonkina, Yuzhong Shen Jan 2015

Changing Cpu Frequency In Comd Proxy Application Offloaded To Intel Xeon Phi Co-Processors, Gary Lawson, Masha Sosonkina, Yuzhong Shen

Computational Modeling & Simulation Engineering Faculty Publications

Obtaining exascale performance is a challenge. Although the technology of today features hardware with very high levels of concurrency, exascale performance is primarily limited by energy consumption. This limitation has lead to the use of GPUs and specialized hardware such as many integrated core (MIC) co-processors and FPGAs for computation acceleration. The Intel Xeon Phi co-processor, built upon the MIC architecture, features many low frequency, energy efficient cores. Applications, even those which do not saturate the large vector processing unit in each core, may benefit from the energy-efficient hardware and software of the Xeon Phi. This work explores the energy …


Potential Of Cognitive Computing And Cognitive Systems, Ahmed K. Noor Jan 2015

Potential Of Cognitive Computing And Cognitive Systems, Ahmed K. Noor

Computational Modeling & Simulation Engineering Faculty Publications

Cognitive computing and cognitive technologies are game changers for future engineering systems, as well as for engineering practice and training. They are major drivers for knowledge automation work, and the creation of cognitive products with higher levels of intelligence than current smart products. This paper gives a brief review of cognitive computing and some of the cognitive engineering systems activities. The potential of cognitive technologies is outlined, along with a brief description of future cognitive environments, incorporating cognitive assistants - specialized proactive intelligent software agents designed to follow and interact with humans and other cognitive assistants across the environments. The …


Engineering Collaborations In Medical Modeling And Simulation, Frederic D. Mckenzie, Salim Chemlal, Tom Hubbard, Robert E. Kelly, Roderick C. Borgie, David A. Besachio, Michel Audette Jan 2014

Engineering Collaborations In Medical Modeling And Simulation, Frederic D. Mckenzie, Salim Chemlal, Tom Hubbard, Robert E. Kelly, Roderick C. Borgie, David A. Besachio, Michel Audette

Computational Modeling & Simulation Engineering Faculty Publications

Fifty years ago computer science was just beginning to see common acceptance as a growing discipline and very few universities had a computer science department although other departments were utilizing computers and software to enhance their methodologies. We believe modeling and simulation (M&S) is on a similar path. Many other disciplines utilize M&S to enhance their methodologies but we also believe that M&S fundamentals can be essential in making better decisions by utilizing the appropriate model for the problem at hand, expanding the solution space through simulation, and understanding it through visualization and proper analyses. After our students learn these …


Graph Partitioning Using Matrix Values For Preconditioning Symmetric Positive Definite Systems, Eugenr Vecharynski, Yousef Saad, Masha Sosonkina Jan 2014

Graph Partitioning Using Matrix Values For Preconditioning Symmetric Positive Definite Systems, Eugenr Vecharynski, Yousef Saad, Masha Sosonkina

Computational Modeling & Simulation Engineering Faculty Publications

Prior to the parallel solution of a large linear system, it is required to perform a partitioning of its equations/unknowns. Standard partitioning algorithms are designed using the considerations of the efficiency of the parallel matrix-vector multiplication, and typically disregard the information on the coefficients of the matrix. This information, however, may have a significant impact on the quality of the preconditioning procedure used within the chosen iterative scheme. In the present paper, we suggest a spectral partitioning algorithm, which takes into account the information on the matrix coefficients and constructs partitions with respect to the objective of enhancing the quality …


Orientation Invariant Ecg-Based Stethoscope Tracking For Heart Auscultation Training On Augmented Standardized Patients, Nahom Kidane, Salim Chemlal, Jiang Li, Frederic D. Mckenzie, Tom Hubbard Jan 2013

Orientation Invariant Ecg-Based Stethoscope Tracking For Heart Auscultation Training On Augmented Standardized Patients, Nahom Kidane, Salim Chemlal, Jiang Li, Frederic D. Mckenzie, Tom Hubbard

Computational Modeling & Simulation Engineering Faculty Publications

Auscultation, the act of listening to the heart and lung sounds, can reveal substantial information about patients’ health and other cardiac-related problems; therefore, competent training can be a key for accurate and reliable diagnosis. Standardized patients (SPs), who are healthy individuals trained to portray real patients, have been extensively used for such training and other medical teaching techniques; however, the range of symptoms and conditions they can simulate remains limited since they are only patient actors. In this work, we describe a novel tracking method for placing virtual symptoms in correct auscultation areas based on recorded ECG signals with various …


Special Issue On Medical Simulation, Michel Audette, Hanif M. Ladak Jan 2013

Special Issue On Medical Simulation, Michel Audette, Hanif M. Ladak

Computational Modeling & Simulation Engineering Faculty Publications

We would like to welcome you to this Special Issue on Medical Simulation, the first of its kind not only for SIMULATION: Transactions of The Society for Modeling and Simulation International, but for any technical journal. Our respective backgrounds are an indication of the technical and clinical breadth of medical simulation, as we approach the subject as primarily medical image analysis and biomechanics experts respectively, each with a variety of clinical interests spanning virtual reality (VR)–based neuro-, orthopedic and ear-nose-and-throat surgery. Moreover, we believe that the breadth of the papers that comprise this issue reflects an even broader perspective. After …


How Is M&S Interoperability Different From Other Interoperability Domains?, Andreas Tolk, Saikou Y. Diallo, Jose J. Padilla, Charles D. Turnitsa Jan 2012

How Is M&S Interoperability Different From Other Interoperability Domains?, Andreas Tolk, Saikou Y. Diallo, Jose J. Padilla, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

During every standard workshop or event, the examples of working interoperability solutions are used to motivate for 'plug and play' standards for M&S as well, like standardized batteries for electronics, or the use of XML to exchange data between heterogeneous systems. While these are successful applications of standards, they are off the mark regarding M&S interoperability. The challenge of M&S is that the product that needs to be made interoperable is not the service or the system alone, but the model behind it as well. The paper shows that the alignment of conceptualizations is the real problem that is not …


Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman Jan 2011

Executable Architecture Research At Old Dominion University, Andreas Tolk, Johnny J. Garcia, Edwin A. Shuman

Computational Modeling & Simulation Engineering Faculty Publications

Executable Architectures allow the evaluation of system architectures not only regarding their static, but also their dynamic behavior. However, the systems engineering community do not agree on a common formal specification of executable architectures. To close this gap and identify necessary elements of an executable architecture, a modeling language, and a modeling formalism is topic of ongoing PhD research. In addition, systems are generally defined and applied in an operational context to provide capabilities and enable missions. To maximize the benefits of executable architectures, a second PhD effort introduces the idea of creating an executable context in addition to the …


M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk Jan 2010

M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

No abstract provided.


Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa Jan 2007

Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.


Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk Jan 2007

Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

The Coalition Battle Management Language is a language for representing and exchanging plans, orders, and reports across live, constructive and robotic forces in multi-service, multi-national and multi-organizational operations. Standardization efforts in the Simulation Interoperability Standards Organization seek to define this language through three parallel activities: (1) specify a sufficient data model to unambiguously define a set of orders using the Joint Command, Control, and Consultation Information Exchange Data Model (JC3IEDM) as a starting point; (2) develop a formal grammar (lexicon and production rules) to formalize the definition of orders, requests, and reports; (3) develop a formal battle management ontology to …