Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 94

Full-Text Articles in Engineering

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Research On Theoretical Framework Of Simulative Experiment Evalution For Intelligent Unmanned Swarm Cooperation, Jipeng Wang, Xing Zhang, Hao Wu, Yu Gu, Huijie Yang Apr 2024

Research On Theoretical Framework Of Simulative Experiment Evalution For Intelligent Unmanned Swarm Cooperation, Jipeng Wang, Xing Zhang, Hao Wu, Yu Gu, Huijie Yang

Journal of System Simulation

Abstract: As a typical representative of intelligent equipment, the technology, equipment and combat applications of intelligent unmanned swarm are being promoted globally. However, the research on experimental theory of unmanned swarm lags behind the technology and equipment in general. The emergence of swarm ability and complexity of confrontation of unmanned swarm, the nonrepeatability and non-generalization of swam experiment take great challenge to the basic theory and methods of unmanned swarm. The four experimental models including intelligent technology, intelligent equipment, intelligent swarm, and intelligent sos(system of systems) experiment from the perspective of system engineering and the whole life cycle of equipment …


Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang Apr 2024

Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang

Journal of System Simulation

Abstract: For the maritime ASW search, a cross-domain unmanned swarm cooperative search method is proposed in which USVs are used as the communication relay of UAVs. The digital grid map is used to characterize the mission area and the kinematic model of cross-domain platform is constructed. The cooperative method of cross-domain unmanned systems is proposed, and the distributed information fusion mechanism of unmanned systems is designed. The search objective function for heterogeneous platforms is designed to guide the unmanned systems to make real-time decisions in search task. The simulation results show that the proposed method can be effective to the …


Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong Apr 2024

Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong

Journal of System Simulation

Abstract: Unmanned swarm game confrontation is a new combat mode and plays a crucial role in intelligent warfare. Its core is the autonomous generation of a series of game confrontation decision sequences to "empower" the swarm. The progress of system simulation verification for the unmanned swarm game confrontation is analyzed. The key technologies of the autonomous decision-making are discussed from three aspects, technology based on expert systems and game theory, technology based on swarm intelligence and optimization theory, and technology based on neural networks and reinforcement learning. The key technology research conducted by the author's team on the autonomous decisionmaking …


Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo Apr 2024

Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo

Journal of System Simulation

Abstract: Constructing the experiment environment and researching the core technology, key equipment and operation theory is the key step for the development of unmanned swarm. Based on the requirement of hybrid simulation environment for unmanned swarm, the elements of the experiment environment are analyzed, and the architecture is proposed, which is composed of common infrastructure, general experiment services, special experiment tools, security and support tool. The key experiment environment integration technology is studied from the aspects of experiment network, model data and experiment application. The feasibility of the method to construct the virtual-real hybrid simulation environment is verified by an …


Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang Apr 2024

Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang

Journal of System Simulation

Abstract: For the current algorithm, it is difficult to obtain the available solution due to the irregularity of problem decision space caused by the numerous mixed variable optimization problems during real industrial applications. The coevolution strategy is introduced and a mixed variable particle swarm optimization algorithm(CCPSO) based on competitive coevolution is proposed. The search direction adjustment mechanism based on tolerance is designed to judge the evolution state of particles, adaptively adjust the search direction of particles, avoid falling into local optimum, and balance the convergence and diversity of the population. The learning object generation mechanism is adopted for each particle …


Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu Apr 2024

Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu

Journal of System Simulation

Abstract: Under the operation mode of power market, based on two-layer master-slave game, a distributed energy management strategy for the microgrid is proposed to tackle the conflict between the overall optimal operation of renewable microgrid and the maximum profit of each investor. To fully consider the balance between energy supply and demand, the concept of power trading agent is introduced, and an integrated demand response strategy based on consumer satisfaction and adjustable load is proposed on the user side. Considering the initiative and decision-making ability of power supply and load, the decision-making game model is established with power trading agent …


Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang Apr 2024

Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang

Journal of System Simulation

Abstract: To assess the environmental benefits of transportation management or control strategies, a method to effectively integrate the micro-traffic simulation model and the micro-vehicle emission model is proposed. VISSIM platform is used to build a case micro traffic simulation model. K-means clustering method is used to divide the driving behavior into 4 types based on the acceleration and deceleration characteristics of different speed intervals of the trajectory data, and the global parameters of the simulation model are calibrated based on the driving characteristics, which quantitatively describe the total sensitivity of the parameters and the sensitivity of the interactions between the …


Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu Apr 2024

Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu

Journal of System Simulation

Abstract: In view of the low visibility of the current wind farm status monitoring and insufficient realtime operation and maintenance, based on the concept of digital twin five-dimensional model, the framework of wind farm digital twin five-dimensional model is constructed. Aiming at the insufficient fault detection capability of traditional algorithms and unbalanced positive and negative samples in fan fault data set, the improved ASL-CatBoost algorithm is proposed to achieve the accurate detection of fan fault status. Based on the digital twinning platform, combined with MATLAB/Simulink, the simulation mathematical model of doubly-fed wind turbine under the condition of blade mass imbalance …


Handling Constrained Multi-Objective Optimization Problems Based On Relationship Between Pareto Fronts, Yubo Wang, Chengyu Hu, Wenyin Gong Apr 2024

Handling Constrained Multi-Objective Optimization Problems Based On Relationship Between Pareto Fronts, Yubo Wang, Chengyu Hu, Wenyin Gong

Journal of System Simulation

Abstract: To address the challenges of balancing the constraint satisfaction and objective function optimization, and dealing with the complex feasible regions in constrained multi-objective optimization problems(CMOPs), a classification-based search approach is proposed based on different Pareto front relationships. A dual-population dual-phase framework is proposed in which an auxiliary population Pa and a main population Pm are evolved and the evolution process is divided into a learning phase and a search phase. During the learning phase, Pa explores unconstrained Pareto front (UPF) and Pm explores constrained Pareto front(CPF), through which the relationship between UPF and CPF is determined. After completing the …


Path Planning Rapid Algorithm Based On Modified Rrt* For Unmanned Surface Vessel, Zhaozhen Jiang, Wenlong Wang, Wenqi Sun Apr 2024

Path Planning Rapid Algorithm Based On Modified Rrt* For Unmanned Surface Vessel, Zhaozhen Jiang, Wenlong Wang, Wenqi Sun

Journal of System Simulation

Abstract: Aiming at the weak purposiveness of rapidly exploring random tree algorithm in USV path planning, a modified rapid algorithm is proposed. The artificial potential field method is improved and the force analysis in four directions is added to comprehensively calculate the resultant force on USV. The calculation method of steering angle is redefined to avoid entering the local optimal trap and can reach the target point smoothly to obtain an initial path. The initial path is used to set the random point sampling area of rapidly exploring random tree algorithm. By reducing the probability of random points generated in …


Intelligent Optimization Method Of Cloud Manufacturing Swarm Based On Incomplete Information Game, Kunpeng Zhang, Yan Wang, Zhicheng Ji Apr 2024

Intelligent Optimization Method Of Cloud Manufacturing Swarm Based On Incomplete Information Game, Kunpeng Zhang, Yan Wang, Zhicheng Ji

Journal of System Simulation

Abstract: In the process of cloud manufacturing, the incomplete information status and the mutual competition and restriction relationship between cloud platform operator and demander lead to the difficult choice of manufacturing services. A cloud manufacturing swarm intelligent optimization method based on incomplete information game model is proposed. A static game model based on incomplete information is established for the interest competition between demand-side and cloud platform, with the goal of rationally pursuing the maximization of their own revenue function. The competition rules between demand-side and cloud platform are proposed, which are introduced into nature through Harsanyi transformation and converted into …


Modeling And Analysis Of Hybrid Traffic Flow Considering Actual Behavior Of Platoon, Xi Wang, Xiujian Yang, Xiaohan Jia, Shenyi Wang Apr 2024

Modeling And Analysis Of Hybrid Traffic Flow Considering Actual Behavior Of Platoon, Xi Wang, Xiujian Yang, Xiaohan Jia, Shenyi Wang

Journal of System Simulation

Abstract: To explore the effect of actual behavior of autonomous vehicular platoon on traffic flow, aiming at the hybrid traffic flow mixed with predecessor following(PF) platoon which is modeled according to the actual control strategy, a hybrid traffic flow model is established based on cellular automata(CA) modeling method. Simulation analysis shows that the effect of platoon characteristics such as time headway, market penetration, platoon size, and control gains on hybrid traffic flow presents coupling and nonlinear properties. The spatiotemporal behavior of hybrid traffic flow with different platoon characteristics is generally much different. Reducing time headway or increasing platoon market penetration …


Hyper-Heuristic Approach With K-Means Clustering For Inter-Cell Scheduling, Yanlin Zhao, Yunna Tian Apr 2024

Hyper-Heuristic Approach With K-Means Clustering For Inter-Cell Scheduling, Yanlin Zhao, Yunna Tian

Journal of System Simulation

Abstract: According to the actual production situation of China's manufacturing industry, a hyperheuristic algorithm based on K-means clustering is proposed for inter-cell scheduling problem of flexible job-shop. K-means clustering is applied to group entities with similar attributes into the corresponding work cluster decision blocks, and the ant colony algorithm is used to select heuristic rules for each decision block. The optimal scheduling solutions are generated by using corresponding heuristic rules for scheduling of entities in each decision block. Computational results show that, the computational granularity is properly increased by the form of decision blocks, and the computational efficiency of the …


Dynamic Path Planning For Mobile Robot Based On Rrt* And Dynamic Window Approach, Rui Zhang, Li Zhou, Zhengyang Liu Apr 2024

Dynamic Path Planning For Mobile Robot Based On Rrt* And Dynamic Window Approach, Rui Zhang, Li Zhou, Zhengyang Liu

Journal of System Simulation

Abstract: A dynamic path planning method combining RRT* and dynamic window approach(DWA) is proposed to realize the obstacle avoidance of mobile robot in complex environment of dynamic obstacles. Improved RRT* algorithm is used to generate the global optimal safe path based on the known environment information. By eliminating the dangerous nodes generated by RRT* algorithm, the security of global path is ensured. Greedy algorithm is used to remove the redundant nodes in the path to reduce the length of global path. DWA is used to track along the global optimal path planned by the improved RRT* algorithm. When static obstacles …


Collaborative Navigation Method For 5g Cluster Uav Based On Configuration Optimization, Chao Gao, Zheng Huang, Xuan Zhao, Hongxing Wang, Tao Long Apr 2024

Collaborative Navigation Method For 5g Cluster Uav Based On Configuration Optimization, Chao Gao, Zheng Huang, Xuan Zhao, Hongxing Wang, Tao Long

Journal of System Simulation

Abstract: The existing range based cooperative navigation methods for clustered UAVs generally ignore the impact of space configuration on positioning and energy determination, which makes it difficult to obtain the accurate navigation and positioning results. In view of this, a collaborative navigation method is proposed for 5G clustered UAVs based on spatial configuration optimization. The relative ranging error model of UAVs based on 5G signals in complex environments is constructed, and the optimization strategy for collaborative navigation nodes is established based on the minimum geometric division of precision(GDOP) criterion to achieve the real-time optimization of collaborative navigation spatial configuration; A …


Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei Apr 2024

Incremental Image Dehazing Algorithm Based On Multiple Transfer Attention, Jinyang Wei, Keping Wang, Yi Yang, Shumin Fei

Journal of System Simulation

Abstract: In order to improve the processing ability of the depth-neural network dehazing algorithm to the supplementary data set, and to make the network differently process the image features of different importance to improve the dehazing ability of the network, an incremental dehazing algorithm based on multiple migration of attention is proposed. The teacher's attention generation network in the form of Encoder-Decoder extracts the multiple attention of labels and haze, which is used it as the label of the characteristic migration media network to constrain the network training to form the migration media attention as close as possible to the …


A Multi-Uav Collaborative Priority Coverage Search Algorithm, Xiang Yu, Qianrui Deng, Sirui Duan, Chen Jiang Apr 2024

A Multi-Uav Collaborative Priority Coverage Search Algorithm, Xiang Yu, Qianrui Deng, Sirui Duan, Chen Jiang

Journal of System Simulation

Abstract: For the challenges such as large disaster area, uneven distribution of key areas and limited rescue time in emergency rescue, a multi-UAV collaborative priority coverage search algorithm is proposed. The search area is rasterized, and each grid is probabilistically labeled according to the disaster prediction information. The search area is divided into sub-regions of similar size and equal number of UAVs by K-means++ algorithm, and the search starting point of each sub-region is determined based on the clustering center, so that the multiple UAVs can carry out the partition cooperative search of the whole area. The score of each …


Research On Dynamic Scene Slam Based On Improved Object Detection, Lanxi Shi, Wenxu Yan, Hongyu Ni, Feng Zhao Apr 2024

Research On Dynamic Scene Slam Based On Improved Object Detection, Lanxi Shi, Wenxu Yan, Hongyu Ni, Feng Zhao

Journal of System Simulation

Abstract: Aiming at the epipolar constraint matching problem of monocular SLAM in dynamic scenes a dynamic feature point selection method based on object detection is proposed, in which the dynamic feature points in the front-end image frame of SLAM system is eliminated during feature extraction to improve the localization accuracy of SLAM. An improved target detection network is proposed to construct a loss function to describe the bounding box by using the overlap area, distance similarity and cosine similarity, which can achieve the accurate localization of target objects and obtain the range of object feature points in the current image …


Study On Forest Fire Visual Analysis Method For Extinguishing Command In Virtual Environment, Benrun Zhang, Weiqun Cao Apr 2024

Study On Forest Fire Visual Analysis Method For Extinguishing Command In Virtual Environment, Benrun Zhang, Weiqun Cao

Journal of System Simulation

Abstract: Aiming at the demand of forest fire fighting command, the information required for the command, such as geographical environment, meteorological conditions, forest resources and forest fire behavior are comprehensively analyzed, and the data visualization visual analysis method in the virtual forest fire environment is designed and realized. Wang Zhengfei-3D mixed cellular automata model is used to simulate the process of forest fire spread and the difference time method is adopted to predict the forest fire spreading behavior. The change of environmental data in different interest domains is captured in real time, and the multi-view panel and overlay layers are …


Element Grouping Faceted Fully Connected Network Based On Ris, Shunhu Hou, Shengliang Fang, Qingyao Zeng, Mengtao Wang Apr 2024

Element Grouping Faceted Fully Connected Network Based On Ris, Shunhu Hou, Shengliang Fang, Qingyao Zeng, Mengtao Wang

Journal of System Simulation

Abstract: In view of the over-fitting problem that caused by multiple parameters and high memory usage of the full connection layer of neural network in training, a RIS-based element grouping areal fully connected neural network (RGFCNN) is proposed for the first time based on the structural characteristics of reconfigurable intelligence surface (RIS). Based on the structural characteristics of RIS, the network is optimized on traditional FCNN. A novel transmission surface attention mechanism is designed for the effective feature extraction of data. Compared with the traditional FCNNs, the proposed network does not arrange the data in one-dimensional manner. Instead, a element …


Technical Data Package For Sysmlv2 Vignettes, Allen W. Dukes Mar 2024

Technical Data Package For Sysmlv2 Vignettes, Allen W. Dukes

Faculty Publications

This Technical Data Package (TDP) thoroughly compiles instructions, concepts, and solutions for eight SysMLv2 vignettes. Each vignette illustrates methods to solve complex system modeling challenges. The initial concept for each vignette can drive the use and evaluation of a custom SysMLv2 modeling tool as shown in [1]. They can support a baseline set of tasks to compare usability with other SysMLv2 modeling software tools.

The document starts with three pairs of vignettes for modeling a hypothetical Unmanned Aerial Vehicle (UAV) operated with a Virtual Reality (VR) headset derived from AFIT WKSP 696. The final pair of vignettes focus on two …


A Distributed Simulation System For Space Operation Missions, Yunzhao Liu, Mingming Wang, Jintao Li, Chuankai Liu, Jianjun Luo Mar 2024

A Distributed Simulation System For Space Operation Missions, Yunzhao Liu, Mingming Wang, Jintao Li, Chuankai Liu, Jianjun Luo

Journal of System Simulation

Abstract: For the ground verification requirements of complex space operation missions such as noncooperative target capture, on-orbit maintenance, and in-space assembly, a distributed simulation system is developed, which mainly consists of a back-end simulation model, a front-end visual demonstration system, and a front-end main controller. In order to realize the multidisciplinary model coupling and interaction among different modeling tools or programming languages, the functional mock-up interface (FMI) standard is introduced for system integration, improving the modularity, generality, and portability of the system. To fully utilize computing resources and improve the simulation efficiency, simulation subsystems and modules are deployed in a …


Uav Swarm Obstacle Avoidance Algorithm Based On Visual Field And Velocity Guidance, Xueqi Gui, Chuntao Li Mar 2024

Uav Swarm Obstacle Avoidance Algorithm Based On Visual Field And Velocity Guidance, Xueqi Gui, Chuntao Li

Journal of System Simulation

Abstract: In the future aerial combat of multiple unmanned aerial vehicles (UAVs), the safe flight of UAV swarm in unknown airspace is an important content of swarm research. In view of avoiding obstacles and maintaining behavior in the UAV swarm system, this paper presents a UAV swarm collision avoidance algorithm based on visual field and velocity guidance (VFVG). The swarm adaptive communication topology mechanism is designed based on the visual field method. Combined with the principle of far attraction and near repulsion and the consensus method, the mechanism can accelerate the transmission of obstacle avoidance information among UAV swarms while …


Human Action Recognition Based On Skeleton Edge Information Under Projection Subspace, Benyue Su, Peng Zhang, Bangguo Zhu, Mengjuan Guo, Min Sheng Mar 2024

Human Action Recognition Based On Skeleton Edge Information Under Projection Subspace, Benyue Su, Peng Zhang, Bangguo Zhu, Mengjuan Guo, Min Sheng

Journal of System Simulation

Abstract: In recent years, human action recognition based on skeleton data has received a lot of attention in the fields of computer vision and human-computer interaction. Most of the existing methods focus on modeling the skeleton points in the original 3D coordinate space. However, skeleton points ignore the physical chain structure of the human body itself, which makes it difficult to portray the local correlation of human motion. In addition, due to the diversity of camera views, it is difficult to explore the comprehensive representation of actions in different views under the original point-based 3D space. In view of this, …