Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

2019

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 2076

Full-Text Articles in Engineering

Fiber-Optic Temperature And Flow Sensory System And Methods, Ming Han, Guigen Liu, Weilin Hou, Qiwen Shen Dec 2019

Fiber-Optic Temperature And Flow Sensory System And Methods, Ming Han, Guigen Liu, Weilin Hou, Qiwen Shen

Department of Electrical and Computer Engineering: Faculty Publications

A fiber optic sensor, a process for utilizing a fiber optic sensor, and a process for fabricating a fiber optic sensor are described, where a double-side-polished silicon pillar is attacked to an optical fiber tip and forms, a Fabry-Perot cavity. In an implementation, a fiber optic sensor in accordance with an examplary embodiment includes an optical fiber configured to be coupled to a light source and a spectrometer; and a single silicon layer or multiple silicon layers disposed on an end face of the optical fiber, where each of the silicon layer(s) defines a Fabry-Perot interferometer, and where the sensor …


Quantitative Metrics For Mutation Testing, Amani M. Ayad Dec 2019

Quantitative Metrics For Mutation Testing, Amani M. Ayad

Dissertations

Program mutation is the process of generating versions of a base program by applying elementary syntactic modifications; this technique has been used in program testing in a variety of applications, most notably to assess the quality of a test data set. A good test set will discover the difference between the original program and mutant except if the mutant is semantically equivalent to the original program, despite being syntactically distinct.

Equivalent mutants are a major nuisance in the practice of mutation testing, because they introduce a significant amount of bias and uncertainty in the analysis of test results; indeed, mutants …


Kinerja Dari Prototipe Robot Visual Pengumpul Sampah Perairan Dengan Remote Control Menggunakan Telemetri, Faiz Sulistyawan, Sri Waluyanti Dec 2019

Kinerja Dari Prototipe Robot Visual Pengumpul Sampah Perairan Dengan Remote Control Menggunakan Telemetri, Faiz Sulistyawan, Sri Waluyanti

Elinvo (Electronics, Informatics, and Vocational Education)

The making of prototype robot waste water collection aims to know the performance itself. The prototype of the Aquatic Waste Collection Robot is designed to float and clean trash in remote controlled waters. The main control drives a series of DC brushless motors to drive while the MG995 servo motor drives a rudder or defender. The device is also equipped with a camera as a medium to see the condition of the robot directly or in real time which will be displayed on the monitor screen. The camera and screen are connected to a telemetry circuit consisting of a transmitter …


Perancangan Sistem Pemantauan Suhu Dan Kelembaban Pada Proses Dekomposisi Pupuk Kompos Berbasis Iot, Farida Hardyanti, Pramudi Utomo Dec 2019

Perancangan Sistem Pemantauan Suhu Dan Kelembaban Pada Proses Dekomposisi Pupuk Kompos Berbasis Iot, Farida Hardyanti, Pramudi Utomo

Elinvo (Electronics, Informatics, and Vocational Education)

The problem that often occurs in making compost is the level of fertilizer maturity that is not perfect. This is caused by humidity and temperature in the unstable manufacturing process. This article aims to develop a system capable of controlling temperature and humidity as well as monitor changes in the process of compost decomposition wirelessly and describe the results of testing the system. This research uses a development method with several stages, namely: problem identification and needs analysis, design, implementation, and testing. The results show that: (1) a temperature and humidity monitoring system is realized to monitor and regulate the …


Asro (Amphibious Spy Robot): Prototipe Robot Amfibi Pengintai Dengan First Person View Dan Sistem Navigasi Berbasis Sensor Kompas, R. Amirur Rajif, Fatchul Arifin Dec 2019

Asro (Amphibious Spy Robot): Prototipe Robot Amfibi Pengintai Dengan First Person View Dan Sistem Navigasi Berbasis Sensor Kompas, R. Amirur Rajif, Fatchul Arifin

Elinvo (Electronics, Informatics, and Vocational Education)

Robots have an important role in all aspects of life, including the military field. The purpose of making this final project are building hardware and software of robot and to know the performance of robots. The method used in making the final project consists of identifying and analyzing requirements, designing and manufacturing hardware and software, and testing. The result of the performance of ASRO is that, the buoyancy force of the robot is greater than the weight of the object, namely Fa = 22,808 N and W = 15,696 N or Fa> W which makes the robot float while operate …


Generating Energy Data For Machine Learning With Recurrent Generative Adversarial Networks, Mohammad Navid Fekri, Ananda M. Ghosh, Katarina Grolinger Dec 2019

Generating Energy Data For Machine Learning With Recurrent Generative Adversarial Networks, Mohammad Navid Fekri, Ananda M. Ghosh, Katarina Grolinger

Electrical and Computer Engineering Publications

The smart grid employs computing and communication technologies to embed intelligence into the power grid and, consequently, make the grid more efficient. Machine learning (ML) has been applied for tasks that are important for smart grid operation including energy consumption and generation forecasting, anomaly detection, and state estimation. These ML solutions commonly require sufficient historical data; however, this data is often not readily available because of reasons such as data collection costs and concerns regarding security and privacy. This paper introduces a recurrent generative adversarial network (R-GAN) for generating realistic energy consumption data by learning from real data. Generativea adversarial …


Interpretable Deep Neural Network For Cancer Survival Analysis By Integrating Genomic And Clinical Data, Jie Hao, Youngsoon Kim, Tejaswini Mallavarapu, Jung Hun Oh, Mingon Kang Dec 2019

Interpretable Deep Neural Network For Cancer Survival Analysis By Integrating Genomic And Clinical Data, Jie Hao, Youngsoon Kim, Tejaswini Mallavarapu, Jung Hun Oh, Mingon Kang

Computer Science Faculty Research

Background: Understanding the complex biological mechanisms of cancer patient survival using genomic and clinical data is vital, not only to develop new treatments for patients, but also to improve survival prediction. However, highly nonlinear and high-dimension, low-sample size (HDLSS) data cause computational challenges to applying conventional survival analysis. Results: We propose a novel biologically interpretable pathway-based sparse deep neural network, named Cox-PASNet, which integrates high-dimensional gene expression data and clinical data on a simple neural network architecture for survival analysis. Cox-PASNet is biologically interpretable where nodes in the neural network correspond to biological genes and pathways, while capturing the nonlinear …


Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom Dec 2019

Technology Safety Audit In Computer Laboratories Using Iso/Iec 17799 : 2005 (Case Study: Ftk Uin Sunan Ampel Surabaya), Muqoffi Khosyatulloh, Nurul Fariidhotun Nisaa, Ilham, M. Kom

Library Philosophy and Practice (e-journal)

Management audit is very important for assessment of their information technology management to gain efficient and effective business running process. Information technology security as an effort of internal controlling for risk and threat security minimization, is mainly considered due to all learning and lecturing administration activities use information technology. Allso, the implementation of a number of computer labs to facilitate learning processes and access to information in order to support the lectures and personal development of students To find out how secure technology information is, it is then requiring an audit to make sure everything run based on procedure. Management …


Design And Implementation Of Anomaly Detections For User Authentication Framework, Iman Abu Sulayman Dec 2019

Design And Implementation Of Anomaly Detections For User Authentication Framework, Iman Abu Sulayman

Electronic Thesis and Dissertation Repository

Anomaly detection is quickly becoming a very significant tool for a variety of applications such as intrusion detection, fraud detection, fault detection, system health monitoring, and event detection in IoT devices. An application that lacks a strong implementation for anomaly detection is user trait modeling for user authentication purposes. User trait models expose up-to-date representation of the user so that changes in their interests, their learning progress or interactions with the system are noticed and interpreted. The reason behind the lack of adoption in user trait modeling arises from the need of a continuous flow of high-volume data, that is …


Identifying Customer Churn In After-Market Operations Using Machine Learning Algorithms, Vitaly Briker, Richard Farrow, William Trevino, Brent Allen Dec 2019

Identifying Customer Churn In After-Market Operations Using Machine Learning Algorithms, Vitaly Briker, Richard Farrow, William Trevino, Brent Allen

SMU Data Science Review

This paper presents a comparative study on machine learning methods as they are applied to product associations, future purchase predictions, and predictions of customer churn in aftermarket operations. Association rules are used help to identify patterns across products and find correlations in customer purchase behaviour. Studying customer behaviour as it pertains to Recency, Frequency, and Monetary Value (RFM) helps inform customer segmentation and identifies customers with propensity to churn. Lastly, Flowserve’s customer purchase history enables the establishment of churn thresholds for each customer group and assists in constructing a model to predict future churners. The aim of this model is …


Analysis Of The Duration And Energy Consumption Of Aes Algorithms On A Contiki-Based Iot Device, Brandon Tsao Dec 2019

Analysis Of The Duration And Energy Consumption Of Aes Algorithms On A Contiki-Based Iot Device, Brandon Tsao

Computer Science and Engineering Master's Theses

With the growing prevalence of the Internet of Things, securing the sheer abundance of devices is critical. The current IoT and security landscapes lack empirical metrics on encryption algorithm implementations that are optimized for constrained devices, such as encryption/decryption duration and energy consumption. In this paper, we achieve two things. First, we survey for optimized implementations of symmetric encryption algorithms. Seconds, we study the performance of various symmetric encryption algorithms on a Contiki-based IoT device. This paper provides encryption and decryption durations and energy consumption results on three implementations of AES: TinyAES, B-Con’s AES, and Contiki’s own built-in AES. In …


Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander Dec 2019

Non-Trivial Off-Path Network Measurements Without Shared Side-Channel Resource Exhaustion, Geoffrey I. Alexander

Computer Science ETDs

Most traditional network measurement scans and attacks are carried out through the use of direct, on-path network packet transmission. This requires that a machine be on-path (i.e, involved in the packet transmission process) and as a result have direct access to the data packets being transmitted. This limits network scans and attacks to situations where access can be gained to an on-path machine. If, for example, a researcher wanted to measure the round trip time between two machines they did not have access to, traditional scans would be of little help as they require access to an on-path machine to …


Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo Dec 2019

Leveraging Cloud-Based Nfv And Sdn Platform Towards Quality-Driven Next-Generation Mobile Networks, Hassan Hawilo

Electronic Thesis and Dissertation Repository

Network virtualization has become a key approach for Network Service Providers (NSPs) to mitigate the challenge of the continually increasing demands for network services. Tightly coupled with their software components, legacy network devices are difficult to upgrade or modify to meet the dynamically changing end-user needs. To virtualize their infrastructure and mitigate those challenges, NSPs have started to adopt Software Defined Networking (SDN) and Network Function Virtualization (NFV). To this end, this thesis addresses the challenges faced on the road of transforming the legacy networking infrastructure to a more dynamic and agile virtualized environment to meet the rapidly increasing demand …


Rehabilitation Training System Of Vr-Based Speech Apraxia, Huanhuan Jiao, Zhigeng Pan, Shuchang Xu, Qingshu Yuan Dec 2019

Rehabilitation Training System Of Vr-Based Speech Apraxia, Huanhuan Jiao, Zhigeng Pan, Shuchang Xu, Qingshu Yuan

Journal of System Simulation

Abstract: Aiming at the problem that the enthusiasm of active training in patients with traditional speech apraxia rehabilitation is gradually weakened, a virtual reality-based rehabilitation training system for speech apraxia is designed. The system simulates the 26 monosyllabic pronunciation mouths shapes made by virtual human in Chinese and uses it for the learning module. It is proposed to identify 26 monosyllabic words by using the isolated word speech recognition algorithm, which improves the accuracy of speech recognition. The system includes a training module and a scene module for assisting the patient's pronunciation rehabilitation training. The evaluation results show that …


Fault Prediction Of Satellite Attitude Control System Based On Neural Network, Xiaofan Meng, Song Hua Dec 2019

Fault Prediction Of Satellite Attitude Control System Based On Neural Network, Xiaofan Meng, Song Hua

Journal of System Simulation

Abstract: A new method based on BP neural network(BPNN), wavelet neural network(WNN) and wavelet decomposition-LSTM(wLSTM) network is proposed for predicting faults in the satellite attitude control system. Normal satellite attitude data is used to train BPNN which is used as the standard model of satellite attitude control system. The real-time attitude residuals is obtained by subtracting the BPNN output attitude angle from the real-time data of satellite attitude. The time series of the residuals are used to build WNN and wLSTM models to predict the faults of satellite attitude control system. A conclusion is given according to comparing the …


Parallel Tasks Optimization Scheduling In Cloud Manufacturing System, Chenwei Feng, Wang Yan Dec 2019

Parallel Tasks Optimization Scheduling In Cloud Manufacturing System, Chenwei Feng, Wang Yan

Journal of System Simulation

Abstract: To solve the problem of unbalanced resource requirements and low resource utilization when the same type of tasks are executed in parallel in the cloud manufacturing system, a task resource scheduling model with the goal of minimizing cost, minimizing time, maximizing reliability and optimizing quality is established. A non-dominated sorting genetic algorithm based on reference points (NSGA-III) is adopted to solve the model by combining real number matrix coding and crossover and mutation based on real number coding instead of common evolutionary strategy. And an optimal decision strategy based on combination of analytic hierarchy process and entropy value method …


Research On Mechanical Configuration Of Automatic Container Terminals Based On Simulation Optimization Method, Shaozheng Yu, Dongshi Sun, Chen Jing, Yongchao Li Dec 2019

Research On Mechanical Configuration Of Automatic Container Terminals Based On Simulation Optimization Method, Shaozheng Yu, Dongshi Sun, Chen Jing, Yongchao Li

Journal of System Simulation

Abstract: In the study of mechanical configuration problem of automated container terminal, a system simulation model based on discrete event simulation is constructed. The key parameters and interference factors that affect the performance of the system are fully considered in the model and a mechanical scheduling algorithm interface to ensure the effectiveness of the simulation model is designed. On the premise of ensuring the reliability of the container terminal system, a cycle optimization method of mechanical configuration scheme is proposed to minimize the cost. An example is given to solve the mechanical configuration scheme of an automatic container terminal. …


Multi-Objective Optimization Design Of Aerodynamic Layout For Twin Swept-Wing Aircraft, Yuchang Lei, Dengcheng Zhang, Yanhua Zhang, Guangxu Su, Luo Hao, Zhan Ren Dec 2019

Multi-Objective Optimization Design Of Aerodynamic Layout For Twin Swept-Wing Aircraft, Yuchang Lei, Dengcheng Zhang, Yanhua Zhang, Guangxu Su, Luo Hao, Zhan Ren

Journal of System Simulation

Abstract: Multi-objective optimization of aerodynamic layout is a key technology in the design of vehicles. The overall configuration of the shape parameters is optimized with a double swept-shaped wave shape as the basic configuration. We use NSGA-Ⅱ multi-objective genetic algorithm, take the aircraft double sweep angle as the design variable, consider the maximum takeoff weight, range, volume ratio and other performance indicators, use Elman neural network to establish the relationship between shape parameters and performance parameters, and establish constraints based on mission planning requirements. The Pareto optimal solution set is obtained by using optimized design and the individuals with …


Dynamic Simulation Of Marine Pasture Water Quality Monitoring Network Based On Aug, Wenxia Xue, Bin Lin, Hu Xu, Jingbo Zhang Dec 2019

Dynamic Simulation Of Marine Pasture Water Quality Monitoring Network Based On Aug, Wenxia Xue, Bin Lin, Hu Xu, Jingbo Zhang

Journal of System Simulation

Abstract: The development of marine pastures puts forward higher requirements for water quality monitoring. In order to achieve large-scale and long-term underwater water quality monitoring, AUG-based Underwater Sensor Network (AUSN) is studied. The AUG is introduced as the underwater sink node of the sensor network and the sleep scheduling mechanism is adopted for the sensors, which can effectively reduce the total energy consumption of the network. Based on the analysis of energy consumption characteristics of underwater sensor networks, the energy consumption calculation formula of underwater sensor networks is discussed. Combined with the virtual visualization technology, the underwater sensor network simulation …


Overview Of Cooperative Target Assignment, Ou Qiao, Xiaoyuan He, Jiuyang Tao Dec 2019

Overview Of Cooperative Target Assignment, Ou Qiao, Xiaoyuan He, Jiuyang Tao

Journal of System Simulation

Abstract: The concept and connotation of combat coordination are briefly analyzed. The historical origin of cooperative target allocation and its orientation in command and control process are expounded. The research status of collaborative target allocation in model building and algorithm solving is analyzed comprehensively, the shortcomings of current research is pointed out. It is proposed that for the next step we should pay more attention to large-scale collaborative target allocation under dynamic and confrontational conditions, and focus on the real-time, adaptability and iterative evolution mechanism of the algorithm.


Research On Intelligent Clustering Algorithm For Complex Water Wireless Network Surveillance, Hua Xiang, Hongtao Liang, Zhaoxin Dong, Wang Zhao, Hongjuan Yao, Baohua Li, Bingqing Jiang Dec 2019

Research On Intelligent Clustering Algorithm For Complex Water Wireless Network Surveillance, Hua Xiang, Hongtao Liang, Zhaoxin Dong, Wang Zhao, Hongjuan Yao, Baohua Li, Bingqing Jiang

Journal of System Simulation

Abstract: The clustering of irregular networks will cause load imbalance, which results in the phenomenon of “energy hot zone”. Aiming at the unreasonable topology of irregular network clustering, an intelligent clustering algorithm based on genetic strategy is proposed for the wireless network surveillance of complex water system. An irregular complex water topology model and an energy consumption model are built, and a genetic clustering strategy is designed via the principle of minimum energy consumption. The P matrix coding method is given, which avoids the squared increment of data calculation. Simultaneously, an adaptive genetic operator and a fuzzy modified operator are …


Design Of A Flexible System Simulation Evaluation Framework, Rusheng Ju, Zimin Cai, Wang Song, Wang Peng Dec 2019

Design Of A Flexible System Simulation Evaluation Framework, Rusheng Ju, Zimin Cai, Wang Song, Wang Peng

Journal of System Simulation

Abstract: To meet variable evaluation requirement of complex system simulation, this paper puts forward a design strategy of flexible effectiveness evaluation framework. The composition structure of system simulation evaluation framework is analyzed. To help users design reference dynamically, the method of evaluation reference edit and display is introduced based on Web. To enhance the extensibility of evaluation model, the method of interface design and code generation is investigated. To ensure the flexibility and extensibility of evaluation framework, the relation and mapping mechanism of evaluation references, evaluation model and evaluation result is studied. The framework is realized and verified in …


A Temporal Action Detection Algorithm Based On Spatio-Temporal Feature Pyramid Network, Liu Wang, Jinyu Sun, Shiwei Ma Dec 2019

A Temporal Action Detection Algorithm Based On Spatio-Temporal Feature Pyramid Network, Liu Wang, Jinyu Sun, Shiwei Ma

Journal of System Simulation

Abstract: In view of the discontinuity of motion timing detection in the frame-level prediction network structure, a novel algorithm based on spatio-temporal feature pyramid network (ST-FPN) is proposed. In the frame-level action prediction, several 3D convolution-de-convolution (CDC) networks are used to sample spatial feature down to 1 dimension and sample temporal feature up to corresponding proposal level. Then the prediction scores of different CDC networks are fused by non-maximum suppression (NMS). The softmax classifier is used to classify frame-level actions, and then temporal action detection is obtained. The experimental results on dataset THUMOS14 show that the proposed algorithm improves the …


Research On Control Technology Of Aeroengine Heat Exchanger, Qingyang Jiang, Song Hua Dec 2019

Research On Control Technology Of Aeroengine Heat Exchanger, Qingyang Jiang, Song Hua

Journal of System Simulation

Abstract: In order to solve the high temperature problem caused by the high speed of the synergistic aspirating engine, this paper designs a control algorithm for the heat exchanger. In the process of designing the control algorithm, considering the strong nonlinearity, uncertainty and strong coupling of the engine, The decoupling study of the multi-input and multi-output linear model of the heat exchanger is carried out. The decoupling effect of two different decoupling methods on the strongly coupled heat exchanger is obtained. The fuzzy decoupling PID controller has short adjustment time and overshoot. Small, conclusions with better decoupling effects.


Attitude Control Of Hypersonic Vehicle Considering Input Saturation, Xiaocen Liu, Yunjie Wu, Xu Peng Dec 2019

Attitude Control Of Hypersonic Vehicle Considering Input Saturation, Xiaocen Liu, Yunjie Wu, Xu Peng

Journal of System Simulation

Abstract: Aiming at the design of attitude control of hypersonic vehicles, the sliding mode disturbance observer is used to compensate the composite disturbance, meanwhile the dynamic surface control method is used to deal with the design of the nonlinear control system. Considering the input saturation problem, the control input is expanded into a new variable to design the controller, which is different from the direct limit of the rudder deviation. The simulation results show that the dynamic surface control method based on sliding mode observer has stronger robustness than the simple dynamic inversion control method, but the control inputs of …


Fault Identification Of High-Speed Train Bogie Based On Siamese Convolutional Neural Network, Yunpu Wu, Weidong Jin, Junxiao Ren Dec 2019

Fault Identification Of High-Speed Train Bogie Based On Siamese Convolutional Neural Network, Yunpu Wu, Weidong Jin, Junxiao Ren

Journal of System Simulation

Abstract: The performance degradation and failure of high-speed train bogie components will threaten the operation security of train. This paper proposes a fault type identification method based on siamese convolutional neural network to address the scarcity of data and the high-dimension of monitoring signals. Deep residual network with one-dimension convolution layers is employed for features extraction and fusion of vibration signals from multiple sensors. The siamese structure is employed to obtain the similarities between samples. Fault types are identified by ranking similarities in the support set. The experimental results show that the proposed method can identify the fault types with …


Pedestrian Navigation Method Based On Uwb And Sins, Yang Yang, Li Qing Dec 2019

Pedestrian Navigation Method Based On Uwb And Sins, Yang Yang, Li Qing

Journal of System Simulation

Abstract: In view of the problem that the inertial navigation error is accumulating with time and UWB indoor is hard to continue tracking problems in complex environment, an extended Kalman filter (EKF) fusing UWB and sins pedestrian navigation is proposed.The zero speed correction algorithm is used to trigger EKF at zero speed. The sins is corrected by the velocity error measurement provided by sins and the position error measurement provided by UWB restraining error accumulation.When UWB signal is interrupted, the position of UWB output without interruption is taken as the starting position. The experiment results of SINS autonomous navigation …


Comparative Study On Resistance Modeling Method In Yacht Simulator, Xiaochen Li, Yin Yong Dec 2019

Comparative Study On Resistance Modeling Method In Yacht Simulator, Xiaochen Li, Yin Yong

Journal of System Simulation

Abstract: In order to solve the problem that the existing resistance modeling method of yacht has poor universality and the calculation accuracy is not high, approximate resistance modeling methods of high speed craft are analyzed and summarized. The actual yacht model is simplified into a prismatic hull. “ЦАГИ” method and SIT method are reproduced and the simulation results are compared with model test. The application of resistance approximate modeling in the yacht simulator is discussed. The results reveal that the resistance is in good agreement with the experimental value, and the SIT method with simplified hull form is more …


Research On The Value Accessing Method For Calibrating Micro Traffic Simulation Model Parameters, Chenjing Zhou, Rong Jian, Kwok Lam Dec 2019

Research On The Value Accessing Method For Calibrating Micro Traffic Simulation Model Parameters, Chenjing Zhou, Rong Jian, Kwok Lam

Journal of System Simulation

Abstract: Parameter calibration is the precondition of the application of micro traffic simulation technology. This study focuses on the value accessing method for parameter calibration in order to further improve the parameter calibration process. The analysis of the distribution characteristics of each parameter calibration results shows that the parameters have different trends in the process of gradual iteration, and there are multiple optimal solutions for the model parameter calibration results. In this paper, the dispersion is used as the quantitative analysis index of the concentration degree of each parameter calibration result, and the parameter value of the model is determined …


Dynamic Collision Optimization Algorithm Based On Ray Detection, Li Xing, Yanfang Fu, Wang Liang, Chengtao Lu Dec 2019

Dynamic Collision Optimization Algorithm Based On Ray Detection, Li Xing, Yanfang Fu, Wang Liang, Chengtao Lu

Journal of System Simulation

Abstract: Aiming at the inaccurate collision detection problem in Unity 3D-based visual simulation systems, a dynamic collision optimization algorithm based on ray detection is designed and implemented. The 3D virtual scene is segmented by octree, which simplifies the detection range of obstacles during the operation of simulation systems. At the same time, based on ray detection, according to the quantization coefficient and distance of the threat degree of obstacles, an appropriate collision collider is dynamically added to the obstacles to complete collision detection. The results show that the algorithm not only improves the fluency of visual simulation systems but also …