Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2024

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 107

Full-Text Articles in Computer Engineering

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Poster Presentations

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre Apr 2024

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre

Whittier Scholars Program

The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.


A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Artificial Sociality, Simone Natale, Iliana Depounti Apr 2024

Artificial Sociality, Simone Natale, Iliana Depounti

Human-Machine Communication

This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …


Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony Mar 2024

Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony

Journal of Engineering Research

Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …


Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim Mar 2024

Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim

Masters Theses

Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …


An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou Mar 2024

An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou

Doctoral Dissertations

With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …


A Distributed Simulation System For Space Operation Missions, Yunzhao Liu, Mingming Wang, Jintao Li, Chuankai Liu, Jianjun Luo Mar 2024

A Distributed Simulation System For Space Operation Missions, Yunzhao Liu, Mingming Wang, Jintao Li, Chuankai Liu, Jianjun Luo

Journal of System Simulation

Abstract: For the ground verification requirements of complex space operation missions such as noncooperative target capture, on-orbit maintenance, and in-space assembly, a distributed simulation system is developed, which mainly consists of a back-end simulation model, a front-end visual demonstration system, and a front-end main controller. In order to realize the multidisciplinary model coupling and interaction among different modeling tools or programming languages, the functional mock-up interface (FMI) standard is introduced for system integration, improving the modularity, generality, and portability of the system. To fully utilize computing resources and improve the simulation efficiency, simulation subsystems and modules are deployed in a …


Uav Swarm Obstacle Avoidance Algorithm Based On Visual Field And Velocity Guidance, Xueqi Gui, Chuntao Li Mar 2024

Uav Swarm Obstacle Avoidance Algorithm Based On Visual Field And Velocity Guidance, Xueqi Gui, Chuntao Li

Journal of System Simulation

Abstract: In the future aerial combat of multiple unmanned aerial vehicles (UAVs), the safe flight of UAV swarm in unknown airspace is an important content of swarm research. In view of avoiding obstacles and maintaining behavior in the UAV swarm system, this paper presents a UAV swarm collision avoidance algorithm based on visual field and velocity guidance (VFVG). The swarm adaptive communication topology mechanism is designed based on the visual field method. Combined with the principle of far attraction and near repulsion and the consensus method, the mechanism can accelerate the transmission of obstacle avoidance information among UAV swarms while …


Human Action Recognition Based On Skeleton Edge Information Under Projection Subspace, Benyue Su, Peng Zhang, Bangguo Zhu, Mengjuan Guo, Min Sheng Mar 2024

Human Action Recognition Based On Skeleton Edge Information Under Projection Subspace, Benyue Su, Peng Zhang, Bangguo Zhu, Mengjuan Guo, Min Sheng

Journal of System Simulation

Abstract: In recent years, human action recognition based on skeleton data has received a lot of attention in the fields of computer vision and human-computer interaction. Most of the existing methods focus on modeling the skeleton points in the original 3D coordinate space. However, skeleton points ignore the physical chain structure of the human body itself, which makes it difficult to portray the local correlation of human motion. In addition, due to the diversity of camera views, it is difficult to explore the comprehensive representation of actions in different views under the original point-based 3D space. In view of this, …


Modeling And Optimization Of Smart Warehouse Order Sorting Considering Splitting Strategy, Yuze Xu, Linxuan Zhang, Hui Li, Ming Ge, Wanyi He Mar 2024

Modeling And Optimization Of Smart Warehouse Order Sorting Considering Splitting Strategy, Yuze Xu, Linxuan Zhang, Hui Li, Ming Ge, Wanyi He

Journal of System Simulation

Abstract: For an automatic vehicle sorting problem involving mixed sorting of two types of orders, an order splitting strategy and a method for batch adjustment of sub-orders after splitting are proposed by considering the phenomena of blockage of automatic guided vehicles (AGVs) and idleness of manual collection stations in the order sorting process. In addition, with the optimization objective of minimizing the total order completion time, an order sorting integer planning model with order splitting is established. An improved discrete grey wolf optimization algorithm is proposed to jointly optimize the three sub-problems of order batching, batch sorting, and product unloading …


Joint Distribution-Inventory Optimization And Simulation For Cold Chain Logistics Considering Order Substitution, Yuanpeng Wan, Chengji Liang, Sihong Wang, Yu Wang Mar 2024

Joint Distribution-Inventory Optimization And Simulation For Cold Chain Logistics Considering Order Substitution, Yuanpeng Wan, Chengji Liang, Sihong Wang, Yu Wang

Journal of System Simulation

Abstract: The most important purpose of cold chain logistics is to ensure product freshness, and how to reduce the cost of order distribution on this basis is an urgent problem for cold chain companies. For consumers, product quality and food safety are their main needs. Therefore, by taking the distribution center as the research object, the products were divided into different grades according to the initial freshness of the products before distribution, and the overall freshness of the products was improved by adopting the grade upward substitution mode for orders that do not meet the delivery requirements so that customers …


Three-Dimensional Path Planning Of Uav Based On All Particles Driving Wild Horse Optimizer Algorithm, Gaoyang Li, Xiangfeng Li, Kang Zhao, Yuchao Jin, Zhidong Yi, Dunwen Zuo Mar 2024

Three-Dimensional Path Planning Of Uav Based On All Particles Driving Wild Horse Optimizer Algorithm, Gaoyang Li, Xiangfeng Li, Kang Zhao, Yuchao Jin, Zhidong Yi, Dunwen Zuo

Journal of System Simulation

Abstract: In view of large calculation amounts and difficult convergence in the unmanned aerial vehicle (UAV) path planning, a path planning method based on all particles driving wild horse optimizier (APDWHO) was proposed. A three-dimensional environment model and path cost model were established, by which the path planning problem was transformed into a multi-dimensional function optimization problem. An adaptive neighborhood search strategy (ANSS) was adopted to improve the exploitation ability of the algorithm. The Gaussian random walk strategy was used to search the historical optimal position of the individual to improve the exploration ability of the algorithm. Since the ANSS …


Construction Of Machine Learning Data Set For Analyzing The Replay Of The Wargaming, Dayong Zhang, Jingyu Yang, Jun Ma, Chenye Song Mar 2024

Construction Of Machine Learning Data Set For Analyzing The Replay Of The Wargaming, Dayong Zhang, Jingyu Yang, Jun Ma, Chenye Song

Journal of System Simulation

Abstract: The first problem to be solved in the application of machine learning to the analysis of the replay of the wargaming is the construction of data sets. Due to the standardization requirements of machine learning for data structure, as well as the limitations of computing power and storage, building a machine learning data set through the wargaming data still faces many problems in terms of how to describe the wargaming situation, how to describe the wargaming process, how to handle high dimensional data, and how to prevent data distortion. To solve these problems, this paper constructs a mapping model …


3d Streamline Visualization Method Based On Clustering Fusion, Xuqiang Shao, Ya Cheng, Yizhong Jin Mar 2024

3d Streamline Visualization Method Based On Clustering Fusion, Xuqiang Shao, Ya Cheng, Yizhong Jin

Journal of System Simulation

Abstract: In order to solve the problems of incomplete feature extraction, continuity destruction of flow field by visual results, and poor representation of streamline caused by unstable clustering division when the clustering method is used to realize 3D streamline visualization. A 3D streamline visualization method based on clustering fusion is proposed. It consists of a distance measurement method between features and a clustering fusion method, which takes the inter-feature distance and spatial distance as the similarity between streamlines for clustering and then performs weighted merging and subdivision of the obtained clustering result. The method has been tested on data sets …


Dynamic Digital Twin Modelling And Semi-Physical Simulation Of Wind Turbine Operation, Yang Hu, Weiran Wang, Fang Fang, Ziqiu Song, Yuhan Xu, Jizhen Liu Mar 2024

Dynamic Digital Twin Modelling And Semi-Physical Simulation Of Wind Turbine Operation, Yang Hu, Weiran Wang, Fang Fang, Ziqiu Song, Yuhan Xu, Jizhen Liu

Journal of System Simulation

Abstract: For the accurate mapping and real-time simulation requirements proposed by digital twin technology, a multi-input multi-output (MIMO) finite difference domain-hybrid semi-mechanical (FDDHSM) digital twin modeling method is proposed, and a semi-physical simulation system of wind turbine digital twin with physical controller is established for the complex nonlinear operation characteristics of large wind turbines. The integrated dynamic MIMO-FDD-HSM model structure is constructed. Finite difference regression vectors are defined to characterize the operating conditions of the wind turbine, and finite difference space tight convex partitioning, parametric model identification, and non-parametric model training are completed under full operating conditions. The wind turbine …


Gesture Recognition For Dynamic Vision Sensor Based On Multi-Dimensional Projection Spatiotemporal Event Frame, Lai Kang, Yakun Zhang Mar 2024

Gesture Recognition For Dynamic Vision Sensor Based On Multi-Dimensional Projection Spatiotemporal Event Frame, Lai Kang, Yakun Zhang

Journal of System Simulation

Abstract: Vision-based gesture recognition is a commonly used means of human-computer interaction in the fields of virtual reality and game simulation. In practical applications, rapid changes in gesture movements will lead to blurred imaging with traditional RGB cameras or depth cameras, which brings great challenges to gesture recognition. To solve the above problems, a dynamic visual data gesture recognition method based on a multi-dimensional projection spatiotemporal event frame (STEF) is proposed by a using dynamic vision sensor to capture high-speed gesture movement information. The spatiotemporal information is embedded in the data projection surface and fused to form a multidimensional projection …


Planning Modeling And Optimization Algorithm For 5g Indoor Distribution System, Shaoda Zeng, Hailin Liu Mar 2024

Planning Modeling And Optimization Algorithm For 5g Indoor Distribution System, Shaoda Zeng, Hailin Liu

Journal of System Simulation

Abstract: Most of the new services in 5G mobile communication technologies, including smart homes, smart factories, and virtual reality, take place in indoor scenes. Therefore, how to quickly plan and build a 5G indoor distribution system with low construction cost and low power loss is of great significance for telecom operators. This paper establishes a mathematical planning model of a 5G indoor distribution system, which is closer to the actual scenario. The model aims to minimize the deployment cost and the maximum output signal power deviation between antennas, and the constraint is to meet the expected output signal power of …


Multi-Agent Path Planning With Obstacle Penalty Factor, Xingyu Yan, Dayan Li, Niya Wang, Kaixiang Zhang, Jianlin Mao Mar 2024

Multi-Agent Path Planning With Obstacle Penalty Factor, Xingyu Yan, Dayan Li, Niya Wang, Kaixiang Zhang, Jianlin Mao

Journal of System Simulation

Abstract: In light load environments, complex obstacle areas will exacerbate local conflicts between agents, leading to a decrease in path solving efficiency. This paper proposes a multi-agent path planning (MAPF) method with obstacle penalty factors in light load environments. First, in the low-level single machine planning process based on the conflict-based search (CBS) algorithm framework, by judging the distribution type of surrounding obstacles that are about to expand the agent's position, corresponding obstacle penalty factors are assigned to them; then, the penalty factors in the path planning process are accumulated and used as the heuristic value of single machine planning …


Research On Optimization Design Method Of Waverider Forebody/Bump Profile Of Aircraft, Jialin Qiu, Jun Huang, Peng Shu, Qingfeng Wang, Zhiqin Liu, Wenyou Qiao Mar 2024

Research On Optimization Design Method Of Waverider Forebody/Bump Profile Of Aircraft, Jialin Qiu, Jun Huang, Peng Shu, Qingfeng Wang, Zhiqin Liu, Wenyou Qiao

Journal of System Simulation

Abstract: The waverider forebody and Bump profile of aircraft are two classic cases reflecting the waverider idea in aircraft component design. They can effectively improve the overall aerodynamic performance of aircraft and have become the core technology of aircraft overall design. In order to seek the optimal design of the waverider forebody and Bump profile to improve the efficiency of aircraft design, an optimization design method for the waverider forebody and Bump profile is proposed in this paper. The initial waverider forebody and Bump profile are generated by the osculating cone theory and conical flow field, and the aerodynamic performance …


Effectiveness Evaluation Of Heterogeneous Uav Swarms Based On A Hybrid Model, Yuanjie Lu, Shanshan Long, Hang Zhao, Guoxu Feng, Xiaojia Zhao Mar 2024

Effectiveness Evaluation Of Heterogeneous Uav Swarms Based On A Hybrid Model, Yuanjie Lu, Shanshan Long, Hang Zhao, Guoxu Feng, Xiaojia Zhao

Journal of System Simulation

Abstract: This paper presents a hybrid model based on availability dependability capability (ADC) system performance evaluation and back propagation (BP) neural network prediction to realize a rapid performance evaluation of UAV swarms and cope with the diversity of UAV swarm configuration and state and the complexity of performance calculation. By analyzing the components of swarm performance, a capability index system including the general platform capability, system-level capability, and task execution capability of UAVs is established. By using the ADC method, a swarm combat performance sample set is generated, and the BP neural network is used to construct a comprehensive combat …


Simulation And Optimization Of Permanent Magnet Linear Machine Based On Deep Neural Network, Yan Shiliang, Yinling Wang, Dandan Lu, Xiaoqin Pan Mar 2024

Simulation And Optimization Of Permanent Magnet Linear Machine Based On Deep Neural Network, Yan Shiliang, Yinling Wang, Dandan Lu, Xiaoqin Pan

Journal of System Simulation

Abstract: The finite element model (FEM) of permanent magnet linear synchronous machines (PMLSMs) takes a long computing time and cannot directly display the relationship between structural parameters and output thrust, thus failing to guide the structural parameter optimization of the machine. An improved simulation model of PMLSMs based on the subdomain analytical method and deep neural network (DNN) algorithm is proposed. The magnetic flux density, no-load counter electromotive force (EMF), and other data are obtained according to Maxwell's equations. The nonlinear relationship between the structural parameters of the machine and output thrust is fitted by the DNN algorithm. Based on …


Formation Strategy Of Hybrid Obstacle Avoidance Algorithm For Multiple Mobile Robots, Fulin Liu, Qingxin Li Mar 2024

Formation Strategy Of Hybrid Obstacle Avoidance Algorithm For Multiple Mobile Robots, Fulin Liu, Qingxin Li

Journal of System Simulation

Abstract: For the obstacle avoidance problem of multiple mobile robots in the unknown static obstacle environment, this paper proposed a formation strategy of a hybrid obstacle avoidance algorithm for multiple mobile robots, ensuring that multiple mobile robots do not collide during operation, can maintain the formation to the maximum extent in the unknown static obstacle environment for effective obstacle avoidance, and can reach the designated target point in a short time. Based on the leaderfollower method and artificial potential field (APF) method, the formation strategy divided the robots in the system into the leader robot and the follower robot. According …


Research On Hybrid Experimental Scheme Design For Combat Simulation, Fei Liu, Peng Lai, Yingbo Lu, Min Wang, Zhifeng Lu Mar 2024

Research On Hybrid Experimental Scheme Design For Combat Simulation, Fei Liu, Peng Lai, Yingbo Lu, Min Wang, Zhifeng Lu

Journal of System Simulation

Abstract: Combat simulation experimental design refers to sampling the values of experimental factors based on baseline combat scenarios using various experimental design methods and then generating a set of experimental schemes for the sequential simulation. The complexity of combat simulation, such as numerous experimental factors and distinct factor types, including continuous and discrete numeric types, poses several challenges and requires efficient hybrid experimental design methods. To address these issues, this paper conducts a study on the hybrid experimental scheme design for combat simulation. This paper gives a brief classification and review of experimental design methods and presents three hybrid experimental …


Research On Hybrid Solution Algorithm For Layout Problem Of Rectangular Parts With Multiple Constraints, Ye Liu, Weixi Ji, Xuan Su, Hongxuan Zhao Mar 2024

Research On Hybrid Solution Algorithm For Layout Problem Of Rectangular Parts With Multiple Constraints, Ye Liu, Weixi Ji, Xuan Su, Hongxuan Zhao

Journal of System Simulation

Abstract: A hybrid algorithm based on a cutting and matching algorithm and an improved ant colony algorithm was proposed to solve the layout problem of rectangular parts in the process of wood and glass blanking. A layout optimization model was established to maximize the mean square utilization and the remaining processing time; the ant colony algorithm was used as the layout sequence algorithm to determine the layout sequence of some parts and meet the processing time constraint. In order to improve the search efficiency of the ant colony algorithm, an adaptive pheromone updating strategy was proposed, and a hybrid mutation …


Construction Of Surrogate Model Driven By Model And Data, Jing An, Guangya Si, Miaoting Zeng Mar 2024

Construction Of Surrogate Model Driven By Model And Data, Jing An, Guangya Si, Miaoting Zeng

Journal of System Simulation

Abstract: By taking the three-dimensional projection action in a certain combat style as the research object, a surrogate model construction method driven by model and data is proposed to support the operational action research, so as to solve the problem that the calculation factors are too much during simulated deduction; the calculation resource cost is too large, and the calculation accuracy of the general analytical model is insufficient. Firstly, an analytical model group of three-dimensional projections with coefficients to be optimized is constructed based on military theory, including weapons and equipment, forces, etc. In addition, the composition and parameter setting …


Intelligent Optimization Of Coal Terminal Unloading Scheduling Based On Improved D3qn Algorithm, Baoxin Qin, Yuxiao Zhang, Sirui Wu, Weichong Cao, Zhan Li Mar 2024

Intelligent Optimization Of Coal Terminal Unloading Scheduling Based On Improved D3qn Algorithm, Baoxin Qin, Yuxiao Zhang, Sirui Wu, Weichong Cao, Zhan Li

Journal of System Simulation

Abstract: Intelligent decision scheduling can improve the operation efficiency of large ports, which is one of the important research directions for the implementation of artificial intelligence technology in the smart port scenario. This article studies the intelligent unloading scheduling tasks of coal terminals and abstracts them as a Markov sequence decision problem. A deep reinforcement learning model for this problem is established, and an improved D3QN algorithm is proposed to realize intelligent optimization of unloading scheduling decisions by considering the characteristics of high action space dimension and sparse feasible action in the model. The simulation results show that for the …


Path Planning For Improvement Of A* Algorithm And Artificial Potential Field Method, Xiang Yu, Chen Jiang, Sirui Duan, Qianrui Deng Mar 2024

Path Planning For Improvement Of A* Algorithm And Artificial Potential Field Method, Xiang Yu, Chen Jiang, Sirui Duan, Qianrui Deng

Journal of System Simulation

Abstract: A* algorithm has the problem of too many polyline paths and search nodes, while the artificial potential field (APF) method has the problems of local optimality and unattainability. These problems are investigated in this paper. A new hybrid heuristic function is proposed based on the Euclidean distance and projection distance, based on which the A* algorithm process is improved accordingly. The search nodes of the A* algorithm are reduced, and the search efficiency is improved. The optimal node generated by the new A* algorithm is used as the local target point of the APF algorithm to assist in getting …