Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

2020

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 2669

Full-Text Articles in Engineering

Human-Robot Interaction For Assistive Robotics, Jiawei Li Dec 2020

Human-Robot Interaction For Assistive Robotics, Jiawei Li

Dissertations

This dissertation presents an in-depth study of human-robot interaction (HRI) withapplication to assistive robotics. In various studies, dexterous in-hand manipulation is included, assistive robots for Sit-To-stand (STS) assistance along with the human intention estimation. In Chapter 1, the background and issues of HRI are explicitly discussed. In Chapter 2, the literature review introduces the recent state-of-the-art research on HRI, such as physical Human-Robot Interaction (HRI), robot STS assistance, dexterous in hand manipulation and human intention estimation. In Chapter 3, various models and control algorithms are described in detail. Chapter 4 introduces the research equipment. Chapter 5 presents innovative theories and …


Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao Dec 2020

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao

Dissertations

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …


Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel Dec 2020

Treated Hfo2 Based Rram Devices With Ru, Tan, Tin As Top Electrode For In-Memory Computing Hardware, Yuvraj Dineshkumar Patel

Theses

The scalability and power efficiency of the conventional CMOS technology is steadily coming to a halt due to increasing problems and challenges in fabrication technology. Many non-volatile memory devices have emerged recently to meet the scaling challenges. Memory devices such as RRAMs or ReRAM (Resistive Random-Access Memory) have proved to be a promising candidate for analog in memory computing applications related to inference and learning in artificial intelligence. A RRAM cell has a MIM (Metal insulator metal) structure that exhibits reversible resistive switching on application of positive or negative voltage. But detailed studies on the power consumption, repeatability and retention …


Human Activity Recognition Using Wearable Sensors: A Deep Learning Approach, Jialun Xue Dec 2020

Human Activity Recognition Using Wearable Sensors: A Deep Learning Approach, Jialun Xue

Theses

In the past decades, Human Activity Recognition (HAR) grabbed considerable research attentions from a wide range of pattern recognition and human–computer interaction researchers due to its prominent applications such as smart home health care. The wealth of information requires efficient classification and analysis methods. Deep learning represents a promising technique for large-scale data analytics. There are various ways of using different sensors for human activity recognition in a smartly controlled environment. Among them, physical human activity recognition through wearable sensors provides valuable information about an individual’s degree of functional ability and lifestyle. There is abundant research that works upon real …


Pendeteksi Bola Pada Robot Penjaga Gawang Menggunakan Metode Hough Circle, Alwi Widi Pradana, Dessy Irmawati Dec 2020

Pendeteksi Bola Pada Robot Penjaga Gawang Menggunakan Metode Hough Circle, Alwi Widi Pradana, Dessy Irmawati

Elinvo (Electronics, Informatics, and Vocational Education)

Robot penjaga gawang bertugas untuk dapat menghadang bola berwarna oranye memasuki gawang. Robot tersebut harus mampu mendeteksi bola dengan akurat untuk menentukan pergerakan robot selanjutnya. Artikel ini mendeskrepsikan pengembangan robot penjaga gawang yang mampu mendeteksi warna dan bentuk boladengan metode hough circle menggunakan emgucv. Metode pengembangan yang dilakukan merujuk pada modifikasi ADDIE pada pengembangan robot speak bola. Hasil dari pengembangan ini adalah lapangan robot dan robot penjaga gawang. Hasil unjuk kerja menunjukkan pendeteksian bola memiliki presentase rerata sebesar 80%, sedangkan kemampuan menghadang bola sebesar 90%. Penerapan metode hough circle terdiri atas beberapa proses yaitu: (1) mencari ciri warna bola, langkah …


Penerapan Iot Untuk Sistem Pemantauan Lampu Penerangan Jalan Umum, Adam Adam, Muharnis Muharnis, Ariadi Ariadi, Jefri Lianda Dec 2020

Penerapan Iot Untuk Sistem Pemantauan Lampu Penerangan Jalan Umum, Adam Adam, Muharnis Muharnis, Ariadi Ariadi, Jefri Lianda

Elinvo (Electronics, Informatics, and Vocational Education)

Penerangan jalan umum (PJU) digunakan untuk menerangi jalan, sehingga pengguna jalan mendukung kenyamanan dan keselamatan dimalam hari. Terdapat keterbatasan sistem pemeriksaan dan pelaporan kerusakaan lampu PJU. Artikel ini membahas penerapan teknologi Internet of Things (IoT) untuk memantau gangguan kerusakan pada lampu PJU. Metode yang digunakan dalam pengembangan sistem pemantauan tersebut yaitu, kajian literatur, analisis kebutuhan, perancangan, pembuatan dan pengujian. Sistem ini dilengkapi dengan sensor ZMPT101B, ACS 712, dan Modul WiFi ESP 8266-01. Sensor ZMPT101B digunakan untuk mengukur nilai tegangan PLN, sedangkan sensor ACS 712 merupakan sensor yang digunakan untuk mengukur arus pada lampu jalan. ESP8266-01 merupakan modul wifi yang dapat …


Sistem Keamanan Ganda Sepeda Motor Dengan Fingerprint Dan Gprs Berbasis Arduino Untuk Peningkatan Keamanan, Bartholomeus Danar, Masduki Zakarijah Dec 2020

Sistem Keamanan Ganda Sepeda Motor Dengan Fingerprint Dan Gprs Berbasis Arduino Untuk Peningkatan Keamanan, Bartholomeus Danar, Masduki Zakarijah

Elinvo (Electronics, Informatics, and Vocational Education)

Tujuan pembuatan Tugas Akhir ini adalah: (1) merancang fingerprint dan gprs pada sistem pengaman sepeda motor, (2) mengimplementasi fingerprint dan gprs pada sistem pengaman sepeda motor, (3) mengetahui unjuk kerja fingerprint dan gprs pada sistem pengaman sepeda motor. Komponen utama yang digunakan adalah Arduino Mega sebagai pusat olah data , fingerprint sebagai keamanan utama, gprs sebagai kemanan kedua. dan kode numerik sebagai penulisan password serta mensetting sistem. Langkah Pembuatan Sitem Keamanan Ganda Sepeda Motor Berbasis Arduino Untuk Peningkatan Keamanan ini adalah (1) Perancangan Perangkat Keras: pertama Pembuatan Skematik Sistem , kedua Pembuatan Layout PCB, ketiga Pembuatan Desain 3D, terakhir …


Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu Dec 2020

Semantic, Integrated Keyword Search Over Structured And Loosely Structured Databases, Xinge Lu

Dissertations

Keyword search has been seen in recent years as an attractive way for querying data with some form of structure. Indeed, it allows simple users to extract information from databases without mastering a complex structured query language and without having knowledge of the schema of the data. It also allows for integrated search of heterogeneous data sources. However, as keyword queries are ambiguous and not expressive enough, keyword search cannot scale satisfactorily on big datasets and the answers are, in general, of low accuracy. Therefore, flat keyword search alone cannot efficiently return high quality results on large data with structure. …


The Assessments Of Internet-Based Technology Use By University Academic Members, Mohammed Alghamdi Dec 2020

The Assessments Of Internet-Based Technology Use By University Academic Members, Mohammed Alghamdi

BAU Journal - Science and Technology

Social networking applications (SNAs), as technologies that rely on internet infrastructure, are widely used as platforms for user interaction, content creation and social communication. However, in recent years, SNAs have been used in the context of teaching and learning, and this aspect, as well as others, has attracted research attention. Limited research has investigated the motivations and barriers to teaching with SNAs in higher education, and so this study sought to examine the purposes, motivations and barriers associated with SNA use in education among academic members at Albaha University, Saudi Arabia. A quantitative research design involving a sample of academic …


Significant Contribution Of Mobile Apps To The Development Of Tourism In Uzbekistan, Alimjon Dadamuhamedov Irgashevich Dec 2020

Significant Contribution Of Mobile Apps To The Development Of Tourism In Uzbekistan, Alimjon Dadamuhamedov Irgashevich

The Light of Islam

Recently, Uzbekistan has taken comprehensive measures to develop tourism as one of the strategic sectors that contribute to the rapid development of regions, increase incomes and living standards of the population, as well as increase investment attractiveness. Modern information technologies make a signifcant contribution to the development of pilgrimage tourism. Advertising of online travel services in pilgrimage tourism currently does not allow you to automate the work of a travel Agency without creating an effective website. This article is devoted to the analysis of Internet technologies aimed at improving the tourism industry. The practical signifcance of the article lies in …


Three Emerging Innovative Technologies Required For Cyber Operations To Execute Commander’S Intent At Machine Speed, Andrew Stewart Dec 2020

Three Emerging Innovative Technologies Required For Cyber Operations To Execute Commander’S Intent At Machine Speed, Andrew Stewart

Military Cyber Affairs

Decision advantage for the DoD and Combined Cyber Operations results from the secure, seamless, and rapid maneuver of data and information. In the DoD’s 2018 Artificial Intelligence Strategy, the DoD recognized that it must, “put in place key building blocks and platforms to scale and democratize access to AI. This includes creating a common foundation of shared data, reusable tools, frameworks and standards, and cloud and edge services.”[1] More than ever, integrated, adaptive cyber operations provide the means of maneuver for data to enable DoD’s decision advantage-based goals. To support this vision, the integrated implementation three innovative cyber technologies …


Assessing Impacts Of 5th Generation (5g) Cellular Telecommunications On Internet Of Things (Iot) Deployments, Michael Love, Marwan Jamal Dec 2020

Assessing Impacts Of 5th Generation (5g) Cellular Telecommunications On Internet Of Things (Iot) Deployments, Michael Love, Marwan Jamal

Military Cyber Affairs

The Internet of Things (IoT) is emerging as a primary enabler of the transformation to digital business services in today’s economy. At the same time, 5th Generation (5G) cellular transport technology is emerging as a viable means to support IoT data requirements. Although 5G is still in its infancy, DoD leaders need to understand the impacts that 5G will have on IoT projects as there are several challenges involved with integrating 5G into IoT. In order to achieve the maximum benefits of high bandwidth, low latency and superior performance, an entirely new grid of cell sites and access units …


Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi Dec 2020

Recent Advances And Machine Learning Techniques On Sickle Cell Disease, Noorh H. Alharbi, Rana O. Bameer, Shahad S. Geddan, Hajar M. Alharbi

Future Computing and Informatics Journal

Sickle cell disease is a severe hereditary disease caused by an abnormality of the red blood cells. The current therapeutic decision-making process applied to sickle cell disease includes monitoring a patient’s symptoms and complications and then adjusting the treatment accordingly. This process is time-consuming, which might result in serious consequences for patients’ lives and could lead to irreversible disease complications. Artificial intelligence, specifically machine learning, is a powerful technique that has been used to support medical decisions. This paper aims to review the recently developed machine learning models designed to interpret medical data regarding sickle cell disease. To propose an …


A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany Dec 2020

A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany

Future Computing and Informatics Journal

Requirements engineering is a crucial phase of software engineering, and requirements prioritization is an essential stage of requirements engineering particularly in agile software development. Requirements prioritization goals at eliciting which requirements of software need to be covered in a particular release. The key point is which requirement will be selected in the next iteration and which one will be delayed to other iterations for minimizing risk during development and meeting stakeholders’ needs. There are many existing techniques for requirement prioritization, but most of these techniques do not cover continuous growth, change of requirements, and requirements dependencies. The prioritization techniques need …


Twitter Analysis Based On Damage Detection And Geoparsing For Event Mapping Management, Yasmeen Ali, Khaled Bahnasy, Adel El-Mahdy Dec 2020

Twitter Analysis Based On Damage Detection And Geoparsing For Event Mapping Management, Yasmeen Ali, Khaled Bahnasy, Adel El-Mahdy

Future Computing and Informatics Journal

Background: Early event detection, monitor, and response can significantly decrease the impact of disasters. Lately, the usage of social media for detecting events has displayed hopeful results. Objectives: for event detection and mapping; the tweets will locate and monitor them on a map. This new approach uses grouped geoparsing then scoring for each tweet based on three spatial indicators. Method/Approach: Our approach uses a geoparsing technique to match a location in tweets to geographic locations of multiple-events tweets in Egypt country, administrative subdivision. Thus, additional geographic information acquired from the tweet itself to detect the actual locations that …


Models And Methods Of Designing Human-Machine Interaction-Oriented Interfaces, Ozod Radjabov, Shakhrillo Bobokulov, Behruz Boboqulov, Hojiyev Sunatullo Dec 2020

Models And Methods Of Designing Human-Machine Interaction-Oriented Interfaces, Ozod Radjabov, Shakhrillo Bobokulov, Behruz Boboqulov, Hojiyev Sunatullo

Bulletin of TUIT: Management and Communication Technologies

Formalization approaches of user interface design (UID) in conjunction with model driven techniques aim to improve the usability in terms of conformity to standards or style guides and to leverage code generation of interactive software systems, so that various UI platforms for web, desktop or mobile Applications are supported. Because large parts of the UI are described platform independent instead of platform dependent implementations, re-usability of the UI concept is also improved. However, UI formalization requires the usage of a formal UI description language and a higher level of abstractness compared to concrete UI code. These languages need to be …


Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko Dec 2020

Use Of Image Processing Algorithms For Mine Originating Waste Grain Size Determination, Sebastian Iwaszenko

Journal of Sustainable Mining

The utilization of mineral wastes from the mining industry is one of most challenging phases in the raw materials life cycle. In many countries, there are piles of mineral waste materials that date back to the previous century. There is also a constant stream of accompanying mineral matter excavated during everyday mine operation. This stream of waste matter is particularly notable for deep coal mining. Grain size composition of waste mineral matter is one of most important characteristics of coal originating waste material. This paper presents the use of image analysis for the determination of grain size composition of mineral …


A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl Dec 2020

A Bibliographic Survey On Detection Of Covid-19 Patients Using Various Sensors In The Field Of Iot, Rutuja Patil, Akshay Sharma, Divya Bhatia, Mugdha Kulkarni, Yashika Patl

Library Philosophy and Practice (e-journal)

Due to a pandemic situation arising from the past few decades and the covid -19 patients are increasing at the rapid rate. Looking in the near future an IOT model is build which can be useful for people in coming years and allows rapid testing and efficient testing methodologies using various sensors such as Temperature, Respiration, RFID etc which takes various parameters. The study focuses around 412 scientific documents such as Journals, articles, book chapters and Patents in various papers. These documents are extracted from the scopus databases after querying with the keywords related to covid patients and IOT. The …


Evaluating Tlb (Translation Lookaside Buffer) Performance Overhead For Nvm (Non-Volatile Memory) Hybrid System, Xiang Guo Dec 2020

Evaluating Tlb (Translation Lookaside Buffer) Performance Overhead For Nvm (Non-Volatile Memory) Hybrid System, Xiang Guo

Electronic Theses and Dissertations

As the non-volatile memory (NVM) technology offers near-DRAM performance and near-disk capacity, NVM has emerged as a new storage class. Conventional file systems, designed for hard disk drives or solid-state drives, need to be re-examined or even re-designed for NVM storage. For example, new file systems such as NOVA, HMFS, HMVFS and Ext4-DAX, have been developed and implemented to fully leverage NVM’s characteristics, such as fast fine-grained access. This thesis research uses a variety of I/O workloads to evaluate the performance overhead of the TLB (translation lookaside buffer) in various file systems on emulated NVM storage systems, in which NVM …


The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro Dec 2020

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Efficient End-To-End Autonomous Driving, Hesham Eraqi Dec 2020

Efficient End-To-End Autonomous Driving, Hesham Eraqi

Theses and Dissertations

Steering a car through traffic is a complex task that is difficult to cast into algorithms. Therefore, researchers turn to train artificial neural networks from front-facing camera data stream along with the associated steering angles. Nevertheless, most existing solutions consider only the visual camera frames as input, thus ignoring the temporal relationship between frames. In this work, we propose a Convolution Long Short-Term Memory Recurrent Neural Network (C-LSTM), which is end-to-end trainable, to learn both visual and dynamic temporal dependencies of driving. Additionally, We introduce posing the steering angle regression problem as classification while imposing a spatial relationship between the …


Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu Dec 2020

Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu

Masters Theses

With the advent of virtualization and artificial intelligence, research on networked systems has progressed substantially. As the technology progresses, we expect a boom in not only the systems research but also in the network of systems domain. It is paramount that we understand and develop methodologies to connect and communicate among the plethora of devices and systems that exist today. One such area is mobile ad-hoc and space communication, which further complicates the task of networking due to myriad of environmental and physical conditions. Developing and testing such systems is an important step considering the large investment required to build …


Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong Dec 2020

Metric Learning Via Linear Embeddings For Human Motion Recognition, Byoungdoo Kong

Masters Theses

We consider the application of Few-Shot Learning (FSL) and dimensionality reduction to the problem of human motion recognition (HMR). The structure of human motion has unique characteristics such as its dynamic and high-dimensional nature. Recent research on human motion recognition uses deep neural networks with multiple layers. Most importantly, large datasets will need to be collected to use such networks to analyze human motion. This process is both time-consuming and expensive since a large motion capture database must be collected and labeled. Despite significant progress having been made in human motion recognition, state-of-the-art algorithms still misclassify actions because of characteristics …


Performance Evaluation Of Classical And Quantum Communication Systems, Gayane Vardoyan Dec 2020

Performance Evaluation Of Classical And Quantum Communication Systems, Gayane Vardoyan

Doctoral Dissertations

The Transmission Control Protocol (TCP) is a robust and reliable method used to transport data across a network. Many variants of TCP exist, e.g., Scalable TCP, CUBIC, and H-TCP. While some of them have been studied from empirical and theoretical perspectives, others have been less amenable to a thorough mathematical analysis. Moreover, some of the more popular variants had not been analyzed in the context of the high-speed environments for which they were designed. To address this issue, we develop a generalized modeling technique for TCP congestion control under the assumption of high bandwidth-delay product. In a separate contribution, we …


Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman Dec 2020

Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman

Mountain Plains Journal of Business and Technology

This study examines the monetary impact of tariffs on consumer internet access via a digital subscriber line (DSL). Historically, the Communications Act of 1934 mandated that telephony services be provided to everyone, without exclusion. With the rapid emergence of the internet, the Connect America Fund was recently implemented to ensure equal access to both voice and broadband services. Since many telephony companies have emerged as internet service providers, DSL internet service is often bundled together with a landline telephone, especially in rural areas. This study examines the total cost of such bundled DSL internet service across the classes of cities …


Research On Recovering Of Complex Networks Based On Boundary Nodes Of Giant Connected Component, Zhe Wang, Jianhua Li, Kang Dong Dec 2020

Research On Recovering Of Complex Networks Based On Boundary Nodes Of Giant Connected Component, Zhe Wang, Jianhua Li, Kang Dong

Journal of System Simulation

Abstract: Network recovery is an important way to solve the inevitable failure,and the reasonable recovery strategy can reduce the cost of resource and improve the network robustness.In order to study the dynamic behavior of recovery process and the relationship between recovery and network robustness,a Recovery Model of Boundary Nodes (RMBN) based on boundary of giant connected component is proposed,and two network Recovery strategies,Average Recovery of Boundary Nodes (ARBN) strategy and Priority Recovery of Boundary Nodes (PRBN) strategy are designed.The simulation results of different recovery strategies on three network models show that with the increase of recovery ratio,the …


Non-Cooperative Target Feature Point Cloud Registration Optimization Based On Icp Algorithm, Wei Liang, Muyao Xue, Huo Ju, Jinjie Zhang Dec 2020

Non-Cooperative Target Feature Point Cloud Registration Optimization Based On Icp Algorithm, Wei Liang, Muyao Xue, Huo Ju, Jinjie Zhang

Journal of System Simulation

Abstract: Aiming at the pose measurement caused by non-cooperative targets in visual measurement that cannot provide cooperation information,the ICP(Iterative Closest Point) algorithm is used to register the point cloud down-sampling data acquired at different times to complete the relative pose measurement of the target.The point cloud data of the target at the current moment is obtained using the structure from motion algorithm and the feature point matching algorithms are compared based on threshold matching and optical flow matching method.The extracted feature points are reconstructed by triangulation.The relative pose changes of the object at different times are calculated by using …


Frequency Regulation Signal Reduction Methods For Aluminum Smelters, Zejian Feng, Shengfei Li, Shouzhen Zhu, Zhiyun Li, Xiaomin Bai Dec 2020

Frequency Regulation Signal Reduction Methods For Aluminum Smelters, Zejian Feng, Shengfei Li, Shouzhen Zhu, Zhiyun Li, Xiaomin Bai

Journal of System Simulation

Abstract: The motion delay of tap changer of aluminum smelter rectifier downgrades frequency response precision in following high frequency regulation signals.Aiming to improve the regulation performance of aluminum smelter loads based on adjusting dynamics,a fast regulation signal reduction technique is proposed,which is motion control threshold-based.A simulation-based decision technique of threshold values of the signal reduction algorithm's is devised to improve the performances of frequency response.Simulation results verify the efficacy of the techniques in promoting the frequency response precision to a certain production level,and contribute a practical way to support aluminum smelter‘s provision of frequency regulation services …


Research On Fuzzy Control And Optimization For Traffic Lights At Single Intersection, Jiajia Liu, Xingquan Zuo Dec 2020

Research On Fuzzy Control And Optimization For Traffic Lights At Single Intersection, Jiajia Liu, Xingquan Zuo

Journal of System Simulation

Abstract: Aiming at the traffic signal control at urban single intersection,a fuzzy control method for traffic lights is presented.The method is based on a four-phase phasing sequence to control the traffic lights at a single intersection.Inputs of the fuzzy controller are the number of vehicles in line and the arrival rate of vehicles,and the output is the green light extension time of the current green light phase.A genetic algorithm (GA) is used to optimize fuzzy rules and membership functions of the fuzzy control system to improve the performance of the fuzzy controller.The fuzzy control method is realized by using …


Research On Dissemination And Control Of Public Opinion Based On Multilayer Coupled Network, Chen Shuai Dec 2020

Research On Dissemination And Control Of Public Opinion Based On Multilayer Coupled Network, Chen Shuai

Journal of System Simulation

Abstract: In order to study the influence of information interaction between multi-platforms on the dissemination and control of public opinion,taking Wechat and Weibo for example,a public opinion communication and control model based on multi-layer coupled network including Wechat layer,Weibo layer and control layer is constructed using multi-agent modeling method and improved SEIR model.On Anylogic platform,a simulation experiment was conducted on the event that “the use of materials by the Hubei Red Cross Society raises doubts”,and the effects factors such as single/dual platform,control range,control dynamics,control time and interaction between platforms were analyzed.The media guidance and government intervention strategies under multi-platform …