Engineering Modeling Using A Design Paradigm: A Graphical Programming-Based Example
Engineering Modeling Using A Design Paradigm: A Graphical Programming-Based Example
Engineering Modeling Using A Design Paradigm: A Graphical Programming-Based Example
1, Fall 2007
Introduction
Engineers combine design paradigms or methods for problem solving
(“OED Online”, 2004) with mathematical modeling techniques to predict the
success of their designs, a method that they have found to be accurate and
repeatable. However, computer models are not just used in traditional
engineering design and practice. Many computer games have complex
mathematical models hidden behind their interfaces. Beyond the obvious
examples, such as the Sims™ and SimCity™, the “first person shooters” contain
extensive physics models, so that thrown objects and jumping characters behave
correctly on the screen (“Best of What's New 2005”, 2005; Tamaki, 2006;
Terzopoulos, 1999).
As engineering has moved into the biological arena, engineering modeling
has been used to describe living processes through the creation of constructs that
reproduce, move, and eat. The reverse is also true. Modeling has adopted into its
array of methods for solving problems, biological approaches such as neural
networks and evolution-based optimization (Kim & Cho, 2006; Terzopoulos,
1999).
Mathematical models are also becoming increasingly important in the
workplace. Businesses use models to optimize their future plans. Brokers use
models to identify when to buy and sell stocks. Actuaries use models to predict
death rates for insurance companies. Biologists use models to predict the impact
of changes to the environment (Gotelli, 1998; Kurzweil, 1999).The teaching of
model development is primed to move into the high school classroom for
several reasons. These reasons include the removal of barriers to modeling, the
inclusion of modeling in national curricular standards, and the adoption of pre-
engineering curricula by many high schools.
First, many of the barriers to teaching modeling have been removed. As the
computer gaming industry has demonstrated, the hardware for modeling is both
_________________________
Paul D. Schreuders (pschreuders@cc.usu.edu) is Assistant Professor in the Department of
Engineering and Technology Education at Utah State University, Logan, Utah.
-53-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
available and affordable. Further, analyses such as Moore’s Law indicate that
computer hardware will become exponentially faster for the reasonable future
(Kurzweil, 1999). The software required to create these models has also matured
and become easier to use.
Second, modeling integrates technology education, science education, and
mathematics education by linking the design standards from the Standards for
Technological Literacy (ITEA & TAAP, 2000) and the National Science
Education Standards (National Research Council [U.S.], 1996) with the
mathematical modeling standards of the Principles and Standards for School
Mathematics(National Council of Teachers of Mathematics, 1989).
Finally, there is a continuing trend towards the adoption of engineering
design into the high school curriculum. Project Lead the Way, for example, has
over 1300 participating schools in 45 states (PLTW, 2006). This trend is evident
with the development of the Standards for Technological Literacy: Content for
the Study of Technology (STL) and its endorsement by William A. Wulf, former
President of the National Academy of Engineering (ITEA & TAAP, 2000).
Engineering design emphasizes analysis and modeling. The development of
student appropriate methods for engineering analysis represents some of the
biggest remaining challenges in bringing engineering design into the high
school. As shown in Table 1, there are a number of ways that analysis has been
approached.
Table 1.
Some current practices for performing engineering analysis in the high school
classroom.
Methodology Limitation
Student computation Restricted by the students’ mathematical
background; often limits the problems to
those soluble by algebra or trigonometry
Use of tabular or graphical Student solutions are limited to those
data considered in advance of the project
Use of software (pre- Student solutions are limited to those
programmed) considered in advance of the project
Student written software Requires extensive class time to teach
programming/write the software; restricted
by the students’ mathematical background
Experimental/trial-and error Inefficient in creating designs; students often
fail to understand the science and
technologies behind their design; time
consuming
Graphical modeling Requires modeling software; Unfamiliar to
most technology teachers
-54-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
Table 2.
A comparison of two design paradigms, showing a general design paradigm
and the same paradigm adapted for use in graphical modeling.
Stage Design Paradigm Modeling Paradigm
Number (Gomez, Oakes, & Leone, 2004;
Oakes, Leone, & Gunn, 2004)
Stage 1: Identify the problem/product Identify the system to be
innovation analyzed or simulated
Stage 2: Define the working Identify the information to be
criteria/goals obtained from the model
Stage 3: Research and gather data Research and gather data
Stage 4: Brainstorm/generate creative Brainstorm/generate model
ideas structures
Stage 5: Analyze potential solutions Develop and refine model
structures
Stage 6: Develop and test models Implement the model
Stage 7: Make the decision Specify and simulate
Stage 8: Communicate and specify Interpret and communicate
Stage 9: Implement and commercialize Protect and commercialize
Stage 10: Perform post-implementation Perform post-implementation
review review
-55-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
-56-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
-57-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
-58-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
different model than “Will my computer become infected by the new virus?” In
the first question, the model examines the average behavior of the computers,
whereas for the second question the model examines the behavior of individual
computers. Like most design processes, modeling is a balancing act. Improving
the quality of a model (e.g., increasing accuracy or adding functionality) must
be balanced against cost (e.g., time or money). Formulating the question
appropriately provides the basis for the balancing decisions. In demonstrating
this approach to model development, we will answer the first question.
-59-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
-60-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
features of the model occurring continuously. Some methods that are useful in
guiding the decisions are:
1. Occam’s Razor - ‘entia non sunt multiplicanda’ (entities are not to be
multiplied without necessity) (“OED Online”, 2004). Using this
technique, the simplest model that exhibits the desired behavior is the
preferred model. This approach has several justifications. It reduces the
amount of data required, the number of assumptions, and opportunities
for human or computer error.
2. Identification of available information – The data used to build a model
or add functionality need to be available and of high quality for the model
to be valid. If the information is not available, the model will need to be
modified, the missing data acquired, or an estimate of the missing values
obtained. All models have limits in their use and these limits are often
defined by the data.
3. Matching the model to the question – A model that does not answer the
question at hand, whether it is accurate or filled with errors, is useless.
Many modeling errors are the result of ill-posed questions or
specifications. In addition, calibrating or adjusting the model parameters
to meet reality and validation, or checking the results against reality, are
critical parts of the modeling process (Haefner, 1996).
4. Matching the model to the available resources – Time and money are two
of the biggest constraints in model building. They often amount to the
same thing. In the classroom, time is at a premium and teachers need to
balance the time constraints of the course with the levels of refinement of
the model. Historically, the resolution and complexity of a model was
severely limited by the speed of the available computers, their memory,
or the software on which they ran. Fortunately, not only has the software
developed and matured, but also the speed of student’s computers is more
than adequate for most models.
5. Comparing the model’s sophistication and accuracy to that required by
the results – Engineering models are often used as the basis for decisions
and designs. The time that is spent acquiring quality data and validating a
model is dependent on the benefits of getting a right answer and the
penalties for failing to get a right answer. Often these benefits/penalties
are measured in hundreds of thousands of dollars, jobs, or human lives.
Using one or more of the methods described above, the model’s structure
and variables are finalized. While all of the structures in Figure 1 can be made
to work, implementing model structures B and C will require that each of their
blocks be broken down into a structure similar to that found in structure A.
Though B and C are more complex, the additional information that they
generate is not required. Therefore A is the most appropriate structure.
In structure A, the overall population of items (the computers) is
categorized as having one of three states (Hoppensteadt & Perkin, 2002), each
represented by a box in Figure 1A. They are:
-61-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
-62-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
May, 1991). More infected computers and more available susceptible computers
result in faster spread of the computer virus. Algebraically, this is:
F S-I = ß • S • I
Where: ß = Infectious contact rate including virus dormancy [1 /
(Computers • Day)]
The contact rate ß is the average number of events of possible transmission per
unit of time (Frauenthal, 1980).
Virus removal with installation of antivirus software. The second flow is
the flow of individuals from the infected population to the protected. It occurs
when a computer has the virus removed and the antivirus software updated. This
flow is proportional to the total infected population and the recovery rate
following infection divided by the total time from infection to recovery. The
recovery rate is the proportion of the infected to be cured and successfully
converted to the protected status. The total time is expressed as a latency, ρ,
which is the inverse of the time from infection to discovery and the time
between discovery and cure, yielding (Anderson & May, 1991):
F I- P = I • γ • ρ
Where: γ = Recovery rate [non-dimensional]
ρ = Response latency [1 / Day]
-63-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
-64-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
Table 3
The set of coupled differential equations describing the computer virus model.
The upper equation for each state variable is written in terms of the pathways
and the lower equation includes the equation for each pathway. By using the
design paradigm and the graphical modeling software, the modeler has been
able to create a complex model without requiring the mathematical or
programming background otherwise required.
State Variable Assembled Differential Equations
Susceptible Computers dS
= – FS−I – FS−P + FI−S
dt
or
dS
= – βSI – α (I+ P)S + Iδ(1 – γρ)
dt
Infected Computers dI
= FS−I – FI−P − FI−S
dt
or
dI
=βSI – I γρ− Iδ(1 – γρ)
dt
Protected Computers dP
= FI−P + FS−P
dt
or
dP
= I γρ+ α(I+P)S
dt
Stage 7. Specify and simulate
The final step before actually running any model is entering the specific
values describing the situation of interest. The example model requires three
initial conditions, shown in Table 4, and five rate coefficients specifying the
flows between the states, shown in Table 5. The initial conditions assume that
the computers are largely unprotected against the virus, as would occur with a
new virus. The rate constants describe a rapidly spreading virus and a very rapid
response by the generator of the antivirus software and the computer technicians
at the school.
-65-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
Table 4
The initial distribution of the computers between the various state variables.
State Variable Symbol Number of Computers
Susceptible S 195
Infected I 2
Protected P 3
Total Number of Computers 200
Table 5
The values of the rate coefficients used in the simulation. The values have been
arbitrarily chosen.
Coefficient Symbol Value
Infectious contact rate β 0.15
Recovery rate γ 0.10
Response latency ρ 0.33
Virus protection availability δ 0.25
Immunization rate α 0.05
The assembled model after the implementation of the equations and the
inclusion of the initial conditions and rate constants is shown in Figure 2B. In
addition, the results of this simulation are shown in Figure 3.
-66-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
-67-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
modeling software. By defining state variables and the flows into and out of the
variables using algebraic equations, complex engineering models can be
developed and solved in high school classrooms.
The introduction of design-based methodology for graphical model
development has a number of implications for technology education. First, it
builds on the historical strengths of technology education such as hands-on
experiences, visualization, and design and uses those approaches to bring
relevance to students’ mathematics and science skills. Further, this is achieved
by meeting the goals of the Standards for Technological Literacy (ITEA &
TAAP, 2000) through application of the content of the National Science
Education Standards (National Research Council [U.S.], 1996) and the
Principles and Standards for School Mathematics(National Council of Teachers
of Mathematics, 1989). Second, it teaches the transferability of the design
process to other disciplines by following paradigms that are familiar to both
students and the teachers of technology education. This familiarity reinforces
the design paradigms in the students’ minds, while extending their abilities.
Finally, by using software to create and solve the mathematical models that are
constructed, the approach is less dependent on the abilities of the students to
perform mathematical manipulations. In fact, it is relatively easy to create and
solve mathematical models that are analytically insoluble even for many
practicing engineers.
References
Anderson, R. M., & May, R. M. (1991). Infectious Diseases of Humans
Dynamics and Control. New York, NY: Oxford University Press.
Best of What's New 2005. (2005). Popular Science, 267(6), 29.
Chang, D. B., & Young, C. S. (2005). Infection dynamics on the Internet.
Computers & Security, 24(4), 280-286.
Coughanowr, D. R., & Koppel, L. B. (1965). Process Systems Analysis and
Control. New York: Mc-Graw Hill Book Company.
Eggert, R. J. (2004). Engineering design. Upper Saddle River, NJ: Pearson
Prentice Hall.
Feynman, R. P. (1998). The meaning of it all: Thoughts of a citizen-scientist.
New York, NY: Basic Books.
Fisher, D. M. (2005a). Lessons in mathematics: A dynamic approach. Lebanon,
NH: ISEE Systems.
Fisher, D. M. (2005b). Modeling dynamic systems: Lessons for a first course.
Lebanon, NH: ISEE Systems.
Frauenthal, J. C. (1980). Mathematical modeling in epidemiology. New York,
NY: Springer-Verlag.
Gomez, A. G., Oakes, W. C., & Leone, L. L. (2004). Engineering your future: a
project-based introduction to engineering. Wildwood, MO: Great Lakes
Press.
Gotelli, N. J. (1998). A Primer of Ecology (Second ed.). Sunderland, MA:
Sinauer Associates, Inc.
-68-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
-69-
Journal of Technology Education Vol. 19 No. 1, Fall 2007
Project Lead the Way. (2006). General FAQ's. Retrieved January 1, 2007
Richmond, B. (2004). An introduction to systems thinking. Lebanon, NH: ISEE
Systems.
ROBO Pro. (2005). (2005). Erbes-Büdesheim, Germany: Fischertechnik GmbH.
Robolab. (2004). (2004). Medford, MA: Tufts University.
Schneeberger, A., Mercer, C. H., Gregson, S. A., Ferguson, N. M., Nyamukapa,
C. A., Anderson, R. M., et al. (2004). Scale-free networks and sexually
transmitted diseases: a description of observed patterns of sexual contacts in
Britain and Zimbabwe. Sexually Transmitted Diseases, 31(6), 380-387.
Simulink. (2005). [Graphical Modeling]. Natick, MA: Mathworks, Inc.
Stella. (2005). [Systems Modeling]. Hanover, NH: ISEE Systems, Inc.
Tamaki, J. (2006, February 3). EA profit slides 31% as gamers opt to wait. Los
Angeles Times.
Terzopoulos, D. (1999). Artificial life for computer graphics. Communications
of the ACM, 42(8), 33-42.
Thimbleby, H., Anderson, S., & Cairns, P. (1999). A framework for modeling
trojans and computer virus infection. Computer Journal, 41(7), 444-459.
Zahnley, T. (2006). Berkeley Madonna (Version 8.3). Berkeley, CA: Berkeley
Madonna.
-70-