Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (62)
- TÜBİTAK (20)
- Old Dominion University (4)
- Georgia Southern University (2)
- University of Dayton (2)
-
- University of Massachusetts Amherst (2)
- University of South Alabama (2)
- Association of Arab Universities (1)
- Ateneo de Manila University (1)
- Edith Cowan University (1)
- Loyola University Chicago (1)
- Michigan Technological University (1)
- Olivet Nazarene University (1)
- University of Arkansas, Fayetteville (1)
- University of Central Florida (1)
- University of Kentucky (1)
- University of South Florida (1)
- University of Texas at Arlington (1)
- Western University (1)
- Whittier College (1)
- Keyword
-
- Deep learning (4)
- Digital twin (4)
- DRL (3)
- A* algorithm (2)
- Artificial potential field (2)
-
- CNN (2)
- Computer vision (2)
- Cryptanalysis (2)
- Cybersecurity (2)
- Disturbance observer (2)
- Hardware-in-the-loop simulation (2)
- Machine learning (2)
- Multi-objective optimization (2)
- Vehicle routing problem (2)
- 3D visualization (1)
- 5G (1)
- Abnormal perception (1)
- Action recognition (1)
- Adaptive genetic algorithm (1)
- Adaptive neighborhood search (1)
- Adaptive space feature enhancement (1)
- Adaptive spatiotemporal regularization (1)
- Advanced Encryption Standard (1)
- Aeroengine (1)
- Agent based (1)
- Agent-based modeling (1)
- Air-ground heterogeneity (1)
- Aircraft simulation (1)
- All particles driving (1)
- Alternating direction method of multipliers (1)
- Publication
-
- Journal of System Simulation (62)
- Turkish Journal of Electrical Engineering and Computer Sciences (20)
- Electrical and Computer Engineering Faculty Publications (2)
- Electronic Theses and Dissertations (2)
- Arkansas Law Review (1)
-
- Computer Science and Engineering Theses (1)
- Computer Science: Faculty Publications and Other Works (1)
- Cybersecurity Undergraduate Research Showcase (1)
- Department of Information Systems & Computer Science Faculty Publications (1)
- Dissertations, Master's Theses and Master's Reports (1)
- Doctoral Dissertations (1)
- ELAIA (1)
- Electronic Thesis and Dissertation Repository (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Honors Theses (1)
- Human-Machine Communication (1)
- Journal of Engineering Research (1)
- Masters Theses (1)
- Military Cyber Affairs (1)
- Poster Presentations (1)
- Research outputs 2022 to 2026 (1)
- School of Cybersecurity Faculty Publications (1)
- Theses and Dissertations--Electrical and Computer Engineering (1)
- VMASC Publications (1)
- Whittier Scholars Program (1)
- Publication Type
Articles 1 - 30 of 107
Full-Text Articles in Computer Engineering
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Military Cyber Affairs
Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Poster Presentations
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark
Honors Theses
Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre
Whittier Scholars Program
The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Artificial Sociality, Simone Natale, Iliana Depounti
Artificial Sociality, Simone Natale, Iliana Depounti
Human-Machine Communication
This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony
Journal of Engineering Research
Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Extracting Dnn Architectures Via Runtime Profiling On Mobile Gpus, Dong Hyub Kim
Masters Theses
Due to significant investment, research, and development efforts over the past decade, deep neural networks (DNNs) have achieved notable advancements in classification and regression domains. As a result, DNNs are considered valuable intellectual property for artificial intelligence providers. Prior work has demonstrated highly effective model extraction attacks which steal a DNN, dismantling the provider’s business model and paving the way for unethical or malicious activities, such as misuse of personal data, safety risks in critical systems, or spreading misinformation. This thesis explores the feasibility of model extraction attacks on mobile devices using aggregated runtime profiles as a side-channel to leak …
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
An Efficient Privacy-Preserving Framework For Video Analytics, Tian Zhou
Doctoral Dissertations
With the proliferation of video content from surveillance cameras, social media, and live streaming services, the need for efficient video analytics has grown immensely. In recent years, machine learning based computer vision algorithms have shown great success in various video analytic tasks. Specifically, neural network models have dominated in visual tasks such as image and video classification, object recognition, object detection, and object tracking. However, compared with classic computer vision algorithms, machine learning based methods are usually much more compute-intensive. Powerful servers are required by many state-of-the-art machine learning models. With the development of cloud computing infrastructures, people are able …
A Distributed Simulation System For Space Operation Missions, Yunzhao Liu, Mingming Wang, Jintao Li, Chuankai Liu, Jianjun Luo
A Distributed Simulation System For Space Operation Missions, Yunzhao Liu, Mingming Wang, Jintao Li, Chuankai Liu, Jianjun Luo
Journal of System Simulation
Abstract: For the ground verification requirements of complex space operation missions such as noncooperative target capture, on-orbit maintenance, and in-space assembly, a distributed simulation system is developed, which mainly consists of a back-end simulation model, a front-end visual demonstration system, and a front-end main controller. In order to realize the multidisciplinary model coupling and interaction among different modeling tools or programming languages, the functional mock-up interface (FMI) standard is introduced for system integration, improving the modularity, generality, and portability of the system. To fully utilize computing resources and improve the simulation efficiency, simulation subsystems and modules are deployed in a …
Uav Swarm Obstacle Avoidance Algorithm Based On Visual Field And Velocity Guidance, Xueqi Gui, Chuntao Li
Uav Swarm Obstacle Avoidance Algorithm Based On Visual Field And Velocity Guidance, Xueqi Gui, Chuntao Li
Journal of System Simulation
Abstract: In the future aerial combat of multiple unmanned aerial vehicles (UAVs), the safe flight of UAV swarm in unknown airspace is an important content of swarm research. In view of avoiding obstacles and maintaining behavior in the UAV swarm system, this paper presents a UAV swarm collision avoidance algorithm based on visual field and velocity guidance (VFVG). The swarm adaptive communication topology mechanism is designed based on the visual field method. Combined with the principle of far attraction and near repulsion and the consensus method, the mechanism can accelerate the transmission of obstacle avoidance information among UAV swarms while …
Human Action Recognition Based On Skeleton Edge Information Under Projection Subspace, Benyue Su, Peng Zhang, Bangguo Zhu, Mengjuan Guo, Min Sheng
Human Action Recognition Based On Skeleton Edge Information Under Projection Subspace, Benyue Su, Peng Zhang, Bangguo Zhu, Mengjuan Guo, Min Sheng
Journal of System Simulation
Abstract: In recent years, human action recognition based on skeleton data has received a lot of attention in the fields of computer vision and human-computer interaction. Most of the existing methods focus on modeling the skeleton points in the original 3D coordinate space. However, skeleton points ignore the physical chain structure of the human body itself, which makes it difficult to portray the local correlation of human motion. In addition, due to the diversity of camera views, it is difficult to explore the comprehensive representation of actions in different views under the original point-based 3D space. In view of this, …
Modeling And Optimization Of Smart Warehouse Order Sorting Considering Splitting Strategy, Yuze Xu, Linxuan Zhang, Hui Li, Ming Ge, Wanyi He
Modeling And Optimization Of Smart Warehouse Order Sorting Considering Splitting Strategy, Yuze Xu, Linxuan Zhang, Hui Li, Ming Ge, Wanyi He
Journal of System Simulation
Abstract: For an automatic vehicle sorting problem involving mixed sorting of two types of orders, an order splitting strategy and a method for batch adjustment of sub-orders after splitting are proposed by considering the phenomena of blockage of automatic guided vehicles (AGVs) and idleness of manual collection stations in the order sorting process. In addition, with the optimization objective of minimizing the total order completion time, an order sorting integer planning model with order splitting is established. An improved discrete grey wolf optimization algorithm is proposed to jointly optimize the three sub-problems of order batching, batch sorting, and product unloading …
Joint Distribution-Inventory Optimization And Simulation For Cold Chain Logistics Considering Order Substitution, Yuanpeng Wan, Chengji Liang, Sihong Wang, Yu Wang
Joint Distribution-Inventory Optimization And Simulation For Cold Chain Logistics Considering Order Substitution, Yuanpeng Wan, Chengji Liang, Sihong Wang, Yu Wang
Journal of System Simulation
Abstract: The most important purpose of cold chain logistics is to ensure product freshness, and how to reduce the cost of order distribution on this basis is an urgent problem for cold chain companies. For consumers, product quality and food safety are their main needs. Therefore, by taking the distribution center as the research object, the products were divided into different grades according to the initial freshness of the products before distribution, and the overall freshness of the products was improved by adopting the grade upward substitution mode for orders that do not meet the delivery requirements so that customers …
Three-Dimensional Path Planning Of Uav Based On All Particles Driving Wild Horse Optimizer Algorithm, Gaoyang Li, Xiangfeng Li, Kang Zhao, Yuchao Jin, Zhidong Yi, Dunwen Zuo
Three-Dimensional Path Planning Of Uav Based On All Particles Driving Wild Horse Optimizer Algorithm, Gaoyang Li, Xiangfeng Li, Kang Zhao, Yuchao Jin, Zhidong Yi, Dunwen Zuo
Journal of System Simulation
Abstract: In view of large calculation amounts and difficult convergence in the unmanned aerial vehicle (UAV) path planning, a path planning method based on all particles driving wild horse optimizier (APDWHO) was proposed. A three-dimensional environment model and path cost model were established, by which the path planning problem was transformed into a multi-dimensional function optimization problem. An adaptive neighborhood search strategy (ANSS) was adopted to improve the exploitation ability of the algorithm. The Gaussian random walk strategy was used to search the historical optimal position of the individual to improve the exploration ability of the algorithm. Since the ANSS …
Construction Of Machine Learning Data Set For Analyzing The Replay Of The Wargaming, Dayong Zhang, Jingyu Yang, Jun Ma, Chenye Song
Construction Of Machine Learning Data Set For Analyzing The Replay Of The Wargaming, Dayong Zhang, Jingyu Yang, Jun Ma, Chenye Song
Journal of System Simulation
Abstract: The first problem to be solved in the application of machine learning to the analysis of the replay of the wargaming is the construction of data sets. Due to the standardization requirements of machine learning for data structure, as well as the limitations of computing power and storage, building a machine learning data set through the wargaming data still faces many problems in terms of how to describe the wargaming situation, how to describe the wargaming process, how to handle high dimensional data, and how to prevent data distortion. To solve these problems, this paper constructs a mapping model …
3d Streamline Visualization Method Based On Clustering Fusion, Xuqiang Shao, Ya Cheng, Yizhong Jin
3d Streamline Visualization Method Based On Clustering Fusion, Xuqiang Shao, Ya Cheng, Yizhong Jin
Journal of System Simulation
Abstract: In order to solve the problems of incomplete feature extraction, continuity destruction of flow field by visual results, and poor representation of streamline caused by unstable clustering division when the clustering method is used to realize 3D streamline visualization. A 3D streamline visualization method based on clustering fusion is proposed. It consists of a distance measurement method between features and a clustering fusion method, which takes the inter-feature distance and spatial distance as the similarity between streamlines for clustering and then performs weighted merging and subdivision of the obtained clustering result. The method has been tested on data sets …
Dynamic Digital Twin Modelling And Semi-Physical Simulation Of Wind Turbine Operation, Yang Hu, Weiran Wang, Fang Fang, Ziqiu Song, Yuhan Xu, Jizhen Liu
Dynamic Digital Twin Modelling And Semi-Physical Simulation Of Wind Turbine Operation, Yang Hu, Weiran Wang, Fang Fang, Ziqiu Song, Yuhan Xu, Jizhen Liu
Journal of System Simulation
Abstract: For the accurate mapping and real-time simulation requirements proposed by digital twin technology, a multi-input multi-output (MIMO) finite difference domain-hybrid semi-mechanical (FDDHSM) digital twin modeling method is proposed, and a semi-physical simulation system of wind turbine digital twin with physical controller is established for the complex nonlinear operation characteristics of large wind turbines. The integrated dynamic MIMO-FDD-HSM model structure is constructed. Finite difference regression vectors are defined to characterize the operating conditions of the wind turbine, and finite difference space tight convex partitioning, parametric model identification, and non-parametric model training are completed under full operating conditions. The wind turbine …
Gesture Recognition For Dynamic Vision Sensor Based On Multi-Dimensional Projection Spatiotemporal Event Frame, Lai Kang, Yakun Zhang
Gesture Recognition For Dynamic Vision Sensor Based On Multi-Dimensional Projection Spatiotemporal Event Frame, Lai Kang, Yakun Zhang
Journal of System Simulation
Abstract: Vision-based gesture recognition is a commonly used means of human-computer interaction in the fields of virtual reality and game simulation. In practical applications, rapid changes in gesture movements will lead to blurred imaging with traditional RGB cameras or depth cameras, which brings great challenges to gesture recognition. To solve the above problems, a dynamic visual data gesture recognition method based on a multi-dimensional projection spatiotemporal event frame (STEF) is proposed by a using dynamic vision sensor to capture high-speed gesture movement information. The spatiotemporal information is embedded in the data projection surface and fused to form a multidimensional projection …
Planning Modeling And Optimization Algorithm For 5g Indoor Distribution System, Shaoda Zeng, Hailin Liu
Planning Modeling And Optimization Algorithm For 5g Indoor Distribution System, Shaoda Zeng, Hailin Liu
Journal of System Simulation
Abstract: Most of the new services in 5G mobile communication technologies, including smart homes, smart factories, and virtual reality, take place in indoor scenes. Therefore, how to quickly plan and build a 5G indoor distribution system with low construction cost and low power loss is of great significance for telecom operators. This paper establishes a mathematical planning model of a 5G indoor distribution system, which is closer to the actual scenario. The model aims to minimize the deployment cost and the maximum output signal power deviation between antennas, and the constraint is to meet the expected output signal power of …
Multi-Agent Path Planning With Obstacle Penalty Factor, Xingyu Yan, Dayan Li, Niya Wang, Kaixiang Zhang, Jianlin Mao
Multi-Agent Path Planning With Obstacle Penalty Factor, Xingyu Yan, Dayan Li, Niya Wang, Kaixiang Zhang, Jianlin Mao
Journal of System Simulation
Abstract: In light load environments, complex obstacle areas will exacerbate local conflicts between agents, leading to a decrease in path solving efficiency. This paper proposes a multi-agent path planning (MAPF) method with obstacle penalty factors in light load environments. First, in the low-level single machine planning process based on the conflict-based search (CBS) algorithm framework, by judging the distribution type of surrounding obstacles that are about to expand the agent's position, corresponding obstacle penalty factors are assigned to them; then, the penalty factors in the path planning process are accumulated and used as the heuristic value of single machine planning …
Research On Optimization Design Method Of Waverider Forebody/Bump Profile Of Aircraft, Jialin Qiu, Jun Huang, Peng Shu, Qingfeng Wang, Zhiqin Liu, Wenyou Qiao
Research On Optimization Design Method Of Waverider Forebody/Bump Profile Of Aircraft, Jialin Qiu, Jun Huang, Peng Shu, Qingfeng Wang, Zhiqin Liu, Wenyou Qiao
Journal of System Simulation
Abstract: The waverider forebody and Bump profile of aircraft are two classic cases reflecting the waverider idea in aircraft component design. They can effectively improve the overall aerodynamic performance of aircraft and have become the core technology of aircraft overall design. In order to seek the optimal design of the waverider forebody and Bump profile to improve the efficiency of aircraft design, an optimization design method for the waverider forebody and Bump profile is proposed in this paper. The initial waverider forebody and Bump profile are generated by the osculating cone theory and conical flow field, and the aerodynamic performance …
Effectiveness Evaluation Of Heterogeneous Uav Swarms Based On A Hybrid Model, Yuanjie Lu, Shanshan Long, Hang Zhao, Guoxu Feng, Xiaojia Zhao
Effectiveness Evaluation Of Heterogeneous Uav Swarms Based On A Hybrid Model, Yuanjie Lu, Shanshan Long, Hang Zhao, Guoxu Feng, Xiaojia Zhao
Journal of System Simulation
Abstract: This paper presents a hybrid model based on availability dependability capability (ADC) system performance evaluation and back propagation (BP) neural network prediction to realize a rapid performance evaluation of UAV swarms and cope with the diversity of UAV swarm configuration and state and the complexity of performance calculation. By analyzing the components of swarm performance, a capability index system including the general platform capability, system-level capability, and task execution capability of UAVs is established. By using the ADC method, a swarm combat performance sample set is generated, and the BP neural network is used to construct a comprehensive combat …
Simulation And Optimization Of Permanent Magnet Linear Machine Based On Deep Neural Network, Yan Shiliang, Yinling Wang, Dandan Lu, Xiaoqin Pan
Simulation And Optimization Of Permanent Magnet Linear Machine Based On Deep Neural Network, Yan Shiliang, Yinling Wang, Dandan Lu, Xiaoqin Pan
Journal of System Simulation
Abstract: The finite element model (FEM) of permanent magnet linear synchronous machines (PMLSMs) takes a long computing time and cannot directly display the relationship between structural parameters and output thrust, thus failing to guide the structural parameter optimization of the machine. An improved simulation model of PMLSMs based on the subdomain analytical method and deep neural network (DNN) algorithm is proposed. The magnetic flux density, no-load counter electromotive force (EMF), and other data are obtained according to Maxwell's equations. The nonlinear relationship between the structural parameters of the machine and output thrust is fitted by the DNN algorithm. Based on …
Formation Strategy Of Hybrid Obstacle Avoidance Algorithm For Multiple Mobile Robots, Fulin Liu, Qingxin Li
Formation Strategy Of Hybrid Obstacle Avoidance Algorithm For Multiple Mobile Robots, Fulin Liu, Qingxin Li
Journal of System Simulation
Abstract: For the obstacle avoidance problem of multiple mobile robots in the unknown static obstacle environment, this paper proposed a formation strategy of a hybrid obstacle avoidance algorithm for multiple mobile robots, ensuring that multiple mobile robots do not collide during operation, can maintain the formation to the maximum extent in the unknown static obstacle environment for effective obstacle avoidance, and can reach the designated target point in a short time. Based on the leaderfollower method and artificial potential field (APF) method, the formation strategy divided the robots in the system into the leader robot and the follower robot. According …
Research On Hybrid Experimental Scheme Design For Combat Simulation, Fei Liu, Peng Lai, Yingbo Lu, Min Wang, Zhifeng Lu
Research On Hybrid Experimental Scheme Design For Combat Simulation, Fei Liu, Peng Lai, Yingbo Lu, Min Wang, Zhifeng Lu
Journal of System Simulation
Abstract: Combat simulation experimental design refers to sampling the values of experimental factors based on baseline combat scenarios using various experimental design methods and then generating a set of experimental schemes for the sequential simulation. The complexity of combat simulation, such as numerous experimental factors and distinct factor types, including continuous and discrete numeric types, poses several challenges and requires efficient hybrid experimental design methods. To address these issues, this paper conducts a study on the hybrid experimental scheme design for combat simulation. This paper gives a brief classification and review of experimental design methods and presents three hybrid experimental …
Research On Hybrid Solution Algorithm For Layout Problem Of Rectangular Parts With Multiple Constraints, Ye Liu, Weixi Ji, Xuan Su, Hongxuan Zhao
Research On Hybrid Solution Algorithm For Layout Problem Of Rectangular Parts With Multiple Constraints, Ye Liu, Weixi Ji, Xuan Su, Hongxuan Zhao
Journal of System Simulation
Abstract: A hybrid algorithm based on a cutting and matching algorithm and an improved ant colony algorithm was proposed to solve the layout problem of rectangular parts in the process of wood and glass blanking. A layout optimization model was established to maximize the mean square utilization and the remaining processing time; the ant colony algorithm was used as the layout sequence algorithm to determine the layout sequence of some parts and meet the processing time constraint. In order to improve the search efficiency of the ant colony algorithm, an adaptive pheromone updating strategy was proposed, and a hybrid mutation …
Construction Of Surrogate Model Driven By Model And Data, Jing An, Guangya Si, Miaoting Zeng
Construction Of Surrogate Model Driven By Model And Data, Jing An, Guangya Si, Miaoting Zeng
Journal of System Simulation
Abstract: By taking the three-dimensional projection action in a certain combat style as the research object, a surrogate model construction method driven by model and data is proposed to support the operational action research, so as to solve the problem that the calculation factors are too much during simulated deduction; the calculation resource cost is too large, and the calculation accuracy of the general analytical model is insufficient. Firstly, an analytical model group of three-dimensional projections with coefficients to be optimized is constructed based on military theory, including weapons and equipment, forces, etc. In addition, the composition and parameter setting …
Intelligent Optimization Of Coal Terminal Unloading Scheduling Based On Improved D3qn Algorithm, Baoxin Qin, Yuxiao Zhang, Sirui Wu, Weichong Cao, Zhan Li
Intelligent Optimization Of Coal Terminal Unloading Scheduling Based On Improved D3qn Algorithm, Baoxin Qin, Yuxiao Zhang, Sirui Wu, Weichong Cao, Zhan Li
Journal of System Simulation
Abstract: Intelligent decision scheduling can improve the operation efficiency of large ports, which is one of the important research directions for the implementation of artificial intelligence technology in the smart port scenario. This article studies the intelligent unloading scheduling tasks of coal terminals and abstracts them as a Markov sequence decision problem. A deep reinforcement learning model for this problem is established, and an improved D3QN algorithm is proposed to realize intelligent optimization of unloading scheduling decisions by considering the characteristics of high action space dimension and sparse feasible action in the model. The simulation results show that for the …
Path Planning For Improvement Of A* Algorithm And Artificial Potential Field Method, Xiang Yu, Chen Jiang, Sirui Duan, Qianrui Deng
Path Planning For Improvement Of A* Algorithm And Artificial Potential Field Method, Xiang Yu, Chen Jiang, Sirui Duan, Qianrui Deng
Journal of System Simulation
Abstract: A* algorithm has the problem of too many polyline paths and search nodes, while the artificial potential field (APF) method has the problems of local optimality and unattainability. These problems are investigated in this paper. A new hybrid heuristic function is proposed based on the Euclidean distance and projection distance, based on which the A* algorithm process is improved accordingly. The search nodes of the A* algorithm are reduced, and the search efficiency is improved. The optimal node generated by the new A* algorithm is used as the local target point of the APF algorithm to assist in getting …