Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Journal

2024

Institution
Keyword
Publication

Articles 1 - 30 of 144

Full-Text Articles in Engineering

Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad Jun 2024

Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad

An-Najah University Journal for Research - B (Humanities)

Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account for digital assets properly, the beneficiaries would not be able to access them. Therefore, this paper addresses this issue by implementing a software development approach in designing a suitable model for sustaining digital assets through smartphones to allow the inheritance of digital …


Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar May 2024

Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar

SMU Data Science Review

Blockchain technology has extended beyond its initial role as the infrastructure for cryptocurrencies to transform various industries with its decentralized and transparent ledger system. This paper examines the broad spectrum of blockchain applications beyond cryptocurrency. It explores its potential to innovate and drive change across finance, supply chain management, healthcare, real estate, and voting systems. We review recent literature, detail specific use cases, and discuss blockchain's challenges and opportunities, aiming to provide a comprehensive overview of its transformative impact. Integrating emerging technologies, scalability, regulatory considerations, and energy consumption are critical challenges to its adoption. Our findings underscore the need for …


Signer-Independent Sign Language Recognition With Feature Disentanglement, İnci̇ Meli̇ha Baytaş, İpek Erdoğan May 2024

Signer-Independent Sign Language Recognition With Feature Disentanglement, İnci̇ Meli̇ha Baytaş, İpek Erdoğan

Turkish Journal of Electrical Engineering and Computer Sciences

Learning a robust and invariant representation of various unwanted factors in sign language recognition (SLR) applications is essential. One of the factors that might degrade the sign recognition performance is the lack of signer diversity in the training datasets, causing a dependence on the singer’s identity during representation learning. Consequently, capturing signer-specific features hinders the generalizability of SLR systems. This study proposes a feature disentanglement framework comprising a convolutional neural network (CNN) and a long short-term memory (LSTM) network based on adversarial training to learn a signer-independent sign language representation that might enhance the recognition of signs. We aim to …


Joint Control Of A Flying Robot And A Ground Vehicle Using Leader-Follower Paradigm, Ayşen Süheyla Bağbaşi, Ali Emre Turgut, Kutluk Bilge Arikan May 2024

Joint Control Of A Flying Robot And A Ground Vehicle Using Leader-Follower Paradigm, Ayşen Süheyla Bağbaşi, Ali Emre Turgut, Kutluk Bilge Arikan

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a novel control framework for the collaboration of an aerial robot and a ground vehicle that is connected via a taut tether is proposed. The framework is based on a leader-follower paradigm. The leader follows a desired trajectory while the motion of the follower is controlled by an admittance controller using an extended state observer to estimate the tether force. Additionally, a velocity estimator is also incorporated to accurately assess the leader’s velocity. An essential feature of our system is its adaptability, enabling role switching between the robots when needed. Furthermore, the synchronization performance of the robots …


Stereo-Image-Based Ground-Line Prediction And Obstacle Detection, Emre Güngör, Ahmet Özmen May 2024

Stereo-Image-Based Ground-Line Prediction And Obstacle Detection, Emre Güngör, Ahmet Özmen

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, vision systems have become essential in the development of advanced driver assistance systems or autonomous vehicles. Although deep learning methods have been the center of focus in recent years to develop fast and reliable obstacle detection solutions, they face difficulties in complex and unknown environments where objects of varying types and shapes are present. In this study, a novel non-AI approach is presented for finding the ground-line and detecting the obstacles in roads using v-disparity data. The main motivation behind the study is that the ground-line estimation errors cause greater deviations at the output. Hence, a novel …


Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin Eren, Feyza Yildirim Okay, Suat Özdemi̇r May 2024

Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin Eren, Feyza Yildirim Okay, Suat Özdemi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, the rapid growth of the Internet of Things (IoT) has raised concerns about the security and reliability of IoT systems. Anomaly detection is vital for recognizing potential risks and ensuring the optimal functionality of IoT networks. However, traditional anomaly detection methods often lack transparency and interpretability, hindering the understanding of their decisions. As a solution, Explainable Artificial Intelligence (XAI) techniques have emerged to provide human-understandable explanations for the decisions made by anomaly detection models. In this study, we present a comprehensive survey of XAI-based anomaly detection methods for IoT. We review and analyze various XAI techniques, including …


Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın Karagöz, Özkan Ufuk Nalbantoğlu, Derviş Karaboğa, Bahriye Akay, Alper Baştürk, Halil Ulutabanca, Serap Doğan, Damla Coşkun, Osman Demi̇r May 2024

Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın Karagöz, Özkan Ufuk Nalbantoğlu, Derviş Karaboğa, Bahriye Akay, Alper Baştürk, Halil Ulutabanca, Serap Doğan, Damla Coşkun, Osman Demi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

Breast cancer is the most prevalent and crucial cancer type that should be diagnosed early to reduce mortality. Therefore, mammography is essential for early diagnosis owing to high-resolution imaging and appropriate visualization. However, the major problem of mammography screening is the high false positive recall rate for breast cancer diagnosis. High false positive recall rates psychologically affect patients, leading to anxiety, depression, and stress. Moreover, false positive recalls increase costs and create an unnecessary expert workload. Thus, this study proposes a deep learning based breast cancer diagnosis model to reduce false positive and false negative rates. The proposed model has …


Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra Kanburoğlu, Faik Boray Tek May 2024

Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra Kanburoğlu, Faik Boray Tek

Turkish Journal of Electrical Engineering and Computer Sciences

This survey focuses on Text-to-SQL, automated translation of natural language queries into SQL queries. Initially, we describe the problem and its main challenges. Then, by following the PRISMA systematic review methodology, we survey the existing Text-to-SQL review papers in the literature. We apply the same method to extract proposed Text-to-SQL models and classify them with respect to used evaluation metrics and benchmarks. We highlight the accuracies achieved by various models on Text-to-SQL datasets and discuss execution-guided evaluation strategies. We present insights into model training times and implementations of different models. We also explore the availability of Text-to-SQL datasets in non-English …


Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou May 2024

Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou

Turkish Journal of Electrical Engineering and Computer Sciences

Physical fitness training, an important way to improve physical fitness, is the basic guarantee for forming combat effectiveness. At present, the evaluation types of physical fitness training are mostly conducted manually. It has problems such as low efficiency, high consumption of human and material resources, and subjective factors affecting the evaluation results. ”Internet+” has greatly expanded the traditional network from the perspective of technological convergence and network coverage objects. It has expedited and promoted the rapid development of Internet of Things (IoT) technology and its applications. The IoT with many sensor nodes shows the characteristics of acquisition information redundancy, node …


Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei Pokuaa, Adeboya Felix Adekoya, Benjamin Asubam Weyori, Owusu Nyarko-Boateng May 2024

Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei Pokuaa, Adeboya Felix Adekoya, Benjamin Asubam Weyori, Owusu Nyarko-Boateng

Turkish Journal of Electrical Engineering and Computer Sciences

Deep learning (DL) models have performed tremendously well in image classification. This good performance can be attributed to the availability of massive data in most domains. However, some domains are known to have few datasets, especially the health sector. This makes it difficult to develop domain-specific high-performing DL algorithms for these fields. The field of health is critical and requires accurate detection of diseases. In the United States Gastrointestinal diseases are prevalent and affect 60 to 70 million people. Ulcerative colitis, polyps, and esophagitis are some gastrointestinal diseases. Colorectal polyps is the third most diagnosed malignancy in the world. This …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Design And Development Of A Radiation Survey And Rescue Robot With Shielding Of Electronic Equipment From Radiation Damage With Image Radiation Mapping Facility, Md. Sifatul Muktadir, Md. Nazmul Hassan, Md. Saimon Siddique, Dewan Nazmun Nur, Altab Hossain, Ahnaf Tahmid Chowdhury May 2024

Design And Development Of A Radiation Survey And Rescue Robot With Shielding Of Electronic Equipment From Radiation Damage With Image Radiation Mapping Facility, Md. Sifatul Muktadir, Md. Nazmul Hassan, Md. Saimon Siddique, Dewan Nazmun Nur, Altab Hossain, Ahnaf Tahmid Chowdhury

International Journal of Nuclear Security

The use of remote-controlled robots in emergency fields is a necessary requirement at present, which includes the nuclear engineering field because the radioactive environment creates adverse effects on human health. This work describes the development of a remotely controlled rover capable of detecting ionizing radiation, isolating radiation sources using a robotic arm, and sufficient shielding for its internal components. A custom-made Geiger–Muller counter has been used to detect ionizing radiation. The radioactive environment is not only harmful for humans but also can cause severe damage to the electronic circuit mounted on the robot. Therefore, a custom concrete material sandwiched between …


Secured Blockchain And Fractional Discrete Cosine Transform-Based Framework For Medical Images, Abhay Kumar Yadav, Virendra P. Vishwakarma Apr 2024

Secured Blockchain And Fractional Discrete Cosine Transform-Based Framework For Medical Images, Abhay Kumar Yadav, Virendra P. Vishwakarma

Makara Journal of Technology

Images can store large amounts of data and are useful for transmitting large amounts of information across different geographical locations using different cloud services. This data sharing increases the chances of cyber-attacks on digital images. Blockchain has properties that enable it to work as a solution to this problem, providing enhanced security and unchangeable storage. However, image size poses a challenge in image storage, as it increases the related storage cost. Compressing images using fractional discrete cosine transform (fctDCT) reduces the amount of data required to express an image securely. This paper presents a novel framework for securely storing and …


Research On Theoretical Framework Of Simulative Experiment Evalution For Intelligent Unmanned Swarm Cooperation, Jipeng Wang, Xing Zhang, Hao Wu, Yu Gu, Huijie Yang Apr 2024

Research On Theoretical Framework Of Simulative Experiment Evalution For Intelligent Unmanned Swarm Cooperation, Jipeng Wang, Xing Zhang, Hao Wu, Yu Gu, Huijie Yang

Journal of System Simulation

Abstract: As a typical representative of intelligent equipment, the technology, equipment and combat applications of intelligent unmanned swarm are being promoted globally. However, the research on experimental theory of unmanned swarm lags behind the technology and equipment in general. The emergence of swarm ability and complexity of confrontation of unmanned swarm, the nonrepeatability and non-generalization of swam experiment take great challenge to the basic theory and methods of unmanned swarm. The four experimental models including intelligent technology, intelligent equipment, intelligent swarm, and intelligent sos(system of systems) experiment from the perspective of system engineering and the whole life cycle of equipment …


Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang Apr 2024

Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang

Journal of System Simulation

Abstract: For the maritime ASW search, a cross-domain unmanned swarm cooperative search method is proposed in which USVs are used as the communication relay of UAVs. The digital grid map is used to characterize the mission area and the kinematic model of cross-domain platform is constructed. The cooperative method of cross-domain unmanned systems is proposed, and the distributed information fusion mechanism of unmanned systems is designed. The search objective function for heterogeneous platforms is designed to guide the unmanned systems to make real-time decisions in search task. The simulation results show that the proposed method can be effective to the …


Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong Apr 2024

Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong

Journal of System Simulation

Abstract: Unmanned swarm game confrontation is a new combat mode and plays a crucial role in intelligent warfare. Its core is the autonomous generation of a series of game confrontation decision sequences to "empower" the swarm. The progress of system simulation verification for the unmanned swarm game confrontation is analyzed. The key technologies of the autonomous decision-making are discussed from three aspects, technology based on expert systems and game theory, technology based on swarm intelligence and optimization theory, and technology based on neural networks and reinforcement learning. The key technology research conducted by the author's team on the autonomous decisionmaking …


Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo Apr 2024

Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo

Journal of System Simulation

Abstract: Constructing the experiment environment and researching the core technology, key equipment and operation theory is the key step for the development of unmanned swarm. Based on the requirement of hybrid simulation environment for unmanned swarm, the elements of the experiment environment are analyzed, and the architecture is proposed, which is composed of common infrastructure, general experiment services, special experiment tools, security and support tool. The key experiment environment integration technology is studied from the aspects of experiment network, model data and experiment application. The feasibility of the method to construct the virtual-real hybrid simulation environment is verified by an …


Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang Apr 2024

Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang

Journal of System Simulation

Abstract: For the current algorithm, it is difficult to obtain the available solution due to the irregularity of problem decision space caused by the numerous mixed variable optimization problems during real industrial applications. The coevolution strategy is introduced and a mixed variable particle swarm optimization algorithm(CCPSO) based on competitive coevolution is proposed. The search direction adjustment mechanism based on tolerance is designed to judge the evolution state of particles, adaptively adjust the search direction of particles, avoid falling into local optimum, and balance the convergence and diversity of the population. The learning object generation mechanism is adopted for each particle …


Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu Apr 2024

Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu

Journal of System Simulation

Abstract: Under the operation mode of power market, based on two-layer master-slave game, a distributed energy management strategy for the microgrid is proposed to tackle the conflict between the overall optimal operation of renewable microgrid and the maximum profit of each investor. To fully consider the balance between energy supply and demand, the concept of power trading agent is introduced, and an integrated demand response strategy based on consumer satisfaction and adjustable load is proposed on the user side. Considering the initiative and decision-making ability of power supply and load, the decision-making game model is established with power trading agent …


Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang Apr 2024

Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang

Journal of System Simulation

Abstract: To assess the environmental benefits of transportation management or control strategies, a method to effectively integrate the micro-traffic simulation model and the micro-vehicle emission model is proposed. VISSIM platform is used to build a case micro traffic simulation model. K-means clustering method is used to divide the driving behavior into 4 types based on the acceleration and deceleration characteristics of different speed intervals of the trajectory data, and the global parameters of the simulation model are calibrated based on the driving characteristics, which quantitatively describe the total sensitivity of the parameters and the sensitivity of the interactions between the …


Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu Apr 2024

Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu

Journal of System Simulation

Abstract: In view of the low visibility of the current wind farm status monitoring and insufficient realtime operation and maintenance, based on the concept of digital twin five-dimensional model, the framework of wind farm digital twin five-dimensional model is constructed. Aiming at the insufficient fault detection capability of traditional algorithms and unbalanced positive and negative samples in fan fault data set, the improved ASL-CatBoost algorithm is proposed to achieve the accurate detection of fan fault status. Based on the digital twinning platform, combined with MATLAB/Simulink, the simulation mathematical model of doubly-fed wind turbine under the condition of blade mass imbalance …


Handling Constrained Multi-Objective Optimization Problems Based On Relationship Between Pareto Fronts, Yubo Wang, Chengyu Hu, Wenyin Gong Apr 2024

Handling Constrained Multi-Objective Optimization Problems Based On Relationship Between Pareto Fronts, Yubo Wang, Chengyu Hu, Wenyin Gong

Journal of System Simulation

Abstract: To address the challenges of balancing the constraint satisfaction and objective function optimization, and dealing with the complex feasible regions in constrained multi-objective optimization problems(CMOPs), a classification-based search approach is proposed based on different Pareto front relationships. A dual-population dual-phase framework is proposed in which an auxiliary population Pa and a main population Pm are evolved and the evolution process is divided into a learning phase and a search phase. During the learning phase, Pa explores unconstrained Pareto front (UPF) and Pm explores constrained Pareto front(CPF), through which the relationship between UPF and CPF is determined. After completing the …


Path Planning Rapid Algorithm Based On Modified Rrt* For Unmanned Surface Vessel, Zhaozhen Jiang, Wenlong Wang, Wenqi Sun Apr 2024

Path Planning Rapid Algorithm Based On Modified Rrt* For Unmanned Surface Vessel, Zhaozhen Jiang, Wenlong Wang, Wenqi Sun

Journal of System Simulation

Abstract: Aiming at the weak purposiveness of rapidly exploring random tree algorithm in USV path planning, a modified rapid algorithm is proposed. The artificial potential field method is improved and the force analysis in four directions is added to comprehensively calculate the resultant force on USV. The calculation method of steering angle is redefined to avoid entering the local optimal trap and can reach the target point smoothly to obtain an initial path. The initial path is used to set the random point sampling area of rapidly exploring random tree algorithm. By reducing the probability of random points generated in …


Intelligent Optimization Method Of Cloud Manufacturing Swarm Based On Incomplete Information Game, Kunpeng Zhang, Yan Wang, Zhicheng Ji Apr 2024

Intelligent Optimization Method Of Cloud Manufacturing Swarm Based On Incomplete Information Game, Kunpeng Zhang, Yan Wang, Zhicheng Ji

Journal of System Simulation

Abstract: In the process of cloud manufacturing, the incomplete information status and the mutual competition and restriction relationship between cloud platform operator and demander lead to the difficult choice of manufacturing services. A cloud manufacturing swarm intelligent optimization method based on incomplete information game model is proposed. A static game model based on incomplete information is established for the interest competition between demand-side and cloud platform, with the goal of rationally pursuing the maximization of their own revenue function. The competition rules between demand-side and cloud platform are proposed, which are introduced into nature through Harsanyi transformation and converted into …