Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Power-Over-Tether Unmanned Aerial System Leveraged For Trajectory Influenced Atmospheric Sensing, Daniel Rico Aug 2021

Power-Over-Tether Unmanned Aerial System Leveraged For Trajectory Influenced Atmospheric Sensing, Daniel Rico

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

The use of unmanned aerial systems (UASs) in agriculture has risen in the past decade and is helping to modernize agriculture. UASs collect and elucidate data previously difficult to obtain and are used to help increase agricultural efficiency and production. Typical commercial off-the-shelf (COTS) UASs are limited by small payloads and short flight times. Such limits inhibit their ability to provide abundant data at multiple spatiotemporal scales. In this thesis, we describe the design and construction of the tethered aircraft unmanned system (TAUS), which is a novel power-over-tether UAS configured for long-term, high throughput atmospheric monitoring with an array of …


High Adaptability Vehicle Network Communication Protocol Based On Aodv, Wang Tong, Gao Shan, Tianshu Dai Jul 2021

High Adaptability Vehicle Network Communication Protocol Based On Aodv, Wang Tong, Gao Shan, Tianshu Dai

Journal of System Simulation

Abstract: Routing protocol is an essential part of vehicular ad-hoc network (VANET). According to the characteristics of frequent changes of vehicle node location in urban environment, an AODV routing protocol based on Network Topology Changes (NTCAODV) is proposed. According to the speed and relative position information, by calculating the stability coefficient of nodes, the link connection is established on the basis of principle of "optimal stability", and the idea of extended loop is improved according to recorded the link establishment time. Simulation results show that NTCAODV routing protocol has good performance in various urban environments, improves …


Trajectory Capture And Sway Frequency Analysis Of Trees Based On Kinect, He Peng, Shaojun Hu, Dongjian He Jun 2020

Trajectory Capture And Sway Frequency Analysis Of Trees Based On Kinect, He Peng, Shaojun Hu, Dongjian He

Journal of System Simulation

Abstract: The morphology and structure of plants were complex. It is of great significance to investigate the inherent motion law of plants under the action of external force, such as realistic animation formation, plant pruning, vibration picking and forest protection. A low cost outdoor tree complex motion capture method was explored, and the relationship between the stem motion and the external force was analyzed. The Kinect was used to capture the branches motion; MeanShift algorithm was used for tracking branches markers and the three-dimensional trajectory of the trunk was extracted according to the principle of Kinect coordinate transformation. A method …


No-Collision Curling Trajectory Simulation System, Tian Yu, Xu Ming Nov 2019

No-Collision Curling Trajectory Simulation System, Tian Yu, Xu Ming

Journal of System Simulation

Abstract: In just a few decades, China’s curling accomplished splendid work. But it’s scientific research falling behind a lot. Applying computer simulation technology in sports training can effectively help the athletes to understand the problems that exist in the training. When curling stone slides on the ice, it can be regarded as two-dimensional motion of rigid body, which can be decomposed into two parts: translation of the center of mass and rotation of a fixed axis around the center of mass. Using computer simulation technology to simulate the curling trajectory, and with the help of this system, the athletes can …


Modeling And Simulation Of Missile Trajectory Based On Practical Sampling, Wu Shuai, Xiaohua Zhou, Lili Wang, Xingzhong Yao Nov 2019

Modeling And Simulation Of Missile Trajectory Based On Practical Sampling, Wu Shuai, Xiaohua Zhou, Lili Wang, Xingzhong Yao

Journal of System Simulation

Abstract: Aiming at the problem of lacking the proper simulation method for missile trajectory in combat simulation training, this paper analyzes the limitations of the 6D and 3D simulation models, proposes a method of trajectory simulation with missile kinematics model and history measured data, and taking an air-to-surface ballistic missile with midcourse-terminal guidance as an example, describes the model construction process in detail. Through the verification, validation and simulation experiments, it shows that this method can simulate various types of missile trajectory with high confidence on both sides of “red and blue”, which has an important reference meaning for missile …


Trajectory Planning Method Of Overhead Crane, Xuejuan Shao, Li Yao, Jinggang Zhang, Xueliang Zhang Nov 2019

Trajectory Planning Method Of Overhead Crane, Xuejuan Shao, Li Yao, Jinggang Zhang, Xueliang Zhang

Journal of System Simulation

Abstract: To make the trolley of bridge crane move stably with smooth acceleration, a polynomial acceleration trajectory is proposed based on the constraint conditions of the crane and the friction between the trolley and the rail. An anti-swing plan is designed employing the dynamic coupling relationship between the motion of the trolley and the load swing. Results indicate that when the length of the rope is changed, the swing angle of the trolley is still within the limits. The stability of the system is proved by constructing Lyapunov energy equations, and the Barbalat lemma confirms that the planned reference trajectory …


Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim Nov 2019

Reputation-Aware Trajectory-Based Data Mining In The Internet Of Things (Iot), Samia Tasnim

FIU Electronic Theses and Dissertations

Internet of Things (IoT) is a critically important technology for the acquisition of spatiotemporally dense data in diverse applications, ranging from environmental monitoring to surveillance systems. Such data helps us improve our transportation systems, monitor our air quality and the spread of diseases, respond to natural disasters, and a bevy of other applications. However, IoT sensor data is error-prone due to a number of reasons: sensors may be deployed in hazardous environments, may deplete their energy resources, have mechanical faults, or maybe become the targets of malicious attacks by adversaries. While previous research has attempted to improve the quality of …


Estimating The Flight Path Of Moving Objects Based On Acceleration Data, Peter Revesz Nov 2014

Estimating The Flight Path Of Moving Objects Based On Acceleration Data, Peter Revesz

CSE Conference and Workshop Papers

Inertial navigation is the problem of estimating the flight path of a moving object based on only acceleration measurements. This paper describes and compares two approaches for inertial navigation. Both approaches estimate the flight path of the moving object using cubic spline interpolation, but they find the coefficients of the cubic spline pieces by different methods. The first approach uses a tridiagonal matrix, while the second approach uses recurrence equations. They also require different boundary conditions. While both approaches work in O(n) time where n is the number of given acceleration measurements, the recurrence equation-based method can be easier updated …


Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin Oct 2013

Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin

FIU Electronic Theses and Dissertations

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". …