Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 7723

Full-Text Articles in Computer Engineering

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization Apr 2024

Human-Machine Communication: Complete Volume. Volume 7 Special Issue: Mediatization

Human-Machine Communication

This is the complete volume of HMC Volume 7. Special Issue on Mediatization


Artificial Sociality, Simone Natale, Iliana Depounti Apr 2024

Artificial Sociality, Simone Natale, Iliana Depounti

Human-Machine Communication

This article proposes the notion of Artificial Sociality to describe communicative AI technologies that create the impression of social behavior. Existing tools that activate Artificial Sociality include, among others, Large Language Models (LLMs) such as ChatGPT, voice assistants, virtual influencers, socialbots and companion chatbots such as Replika. The article highlights three key issues that are likely to shape present and future debates about these technologies, as well as design practices and regulation efforts: the modelling of human sociality that foregrounds it, the problem of deception and the issue of control from the part of the users. Ethical, social and cultural …


Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen Apr 2024

Mediatization And Human-Machine Communication: Trajectories, Discussions, Perspectives, Andreas Hepp, Göran Bolin, Andrea L. Guzman, Wiebke Loosen

Human-Machine Communication

As research fields, mediatization and Human-Machine Communication (HMC) have distinct historical trajectories. While mediatization research is concerned with the fundamental interrelation between the transformation of media and communications and cultural and societal changes, the much younger field of HMC delves into human meaning-making in interactions with machines. However, the recent wave of “deep mediatization,” characterized by an increasing emphasis on general communicative automation and the rise of communicative AI, highlights a shared interest in technology’s role within human interaction. This introductory article examines the trajectories of both fields, demonstrating how mediatization research “zooms out” from overarching questions of societal and …


In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi Mar 2024

In-Depth Examination Of Gas Consumption In E-Will Smart Contract: A Case Study, Manal Mansour, May Salama, Hala Helmi, Mona F.M Mursi

Journal of Engineering Research

In recent years, blockchain technology, coupled with smart contracts, has played a pivotal role in the development of distributed applications. Numerous case studies have emerged, showcasing the remarkable potential of this technology across various applications. Despite its widespread adoption in the industry, there exists a significant gap between the practical implementation of blockchain and the analytical and academic studies dedicated to understanding its nuances.

This paper aims to bridge this divide by presenting an empirical case study focused on the e-will contract, with a specific emphasis on gas-related challenges. By closely examining the e-will contract case study, we seek to …


A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe Mar 2024

A Soft Two-Layers Voting Model For Fake News Detection, Hnin Ei Wynne, Khaing Thanda Swe

Journal of Engineering Research

The proliferation of fake news has become a complex and challenge problem in recent year, and presenting various unsolved issues within the research domain. Among these challenges, a critical concern is the development of effective models capable of accurately distinguish between fake and real news. While numerous techniques have been proposed for fake news detection, achieving optimal accuracy remains elusive. This paper introduces a novel fake news detection approach employing a two-layered weighted voting classifier. In contrast to conventional methods that assign equal weights to all classifiers, our proposed approach utilizes a selective weighting approach to solve the current issue. …


Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony Mar 2024

Exploring Human Aging Proteins Based On Deep Autoencoders And K-Means Clustering, Sondos M. Hammad, Mohamed Talaat Saidahmed, Elsayed A. Sallam, Reda Elbasiony

Journal of Engineering Research

Aging significantly affects human health and the overall economy, yet understanding of the underlying molecular mechanisms remains limited. Among all human genes, almost three hundred and five have been linked to human aging. While certain subsets of these genes or specific aging-related genes have been extensively studied. There has been a lack of comprehensive examination encompassing the entire set of aging-related genes. Here, the main objective is to overcome understanding based on an innovative approach that combines the capabilities of deep learning. Particularly using One-Dimensional Deep AutoEncoder (1D-DAE). Followed by the K-means clustering technique as a means of unsupervised learning. …


Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan Mar 2024

Intelligent Protection Scheme Using Combined Stockwell-Transform And Deep Learning-Based Fault Diagnosis For The Active Distribution System, Latha Maheswari Kandasamy, Kanakaraj Jaganathan

Turkish Journal of Electrical Engineering and Computer Sciences

This study aims to perform fast fault diagnosis and intelligent protection in an active distribution network (ADN) with high renewable energy penetration. Several time-domain simulations are carried out in EMTP-RV to extract time-synchronized current and voltage data. The Stockwell transform (ST) was used in MATLAB/SIMULINK to preprocess these input datasets to train the adaptive fault diagnosis deep convolutional neural network (AFDDCNN) for fault location identification, fault type identification, and fault phase-detection for different penetration levels. Based on the AFDDCNN output, the intelligent protection scheme (IDOCPS) generates the signal for isolating a faulty section of the ADN. An intelligent fault diagnosis …


Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi Mar 2024

Consensus-Based Virtual Leader Tracking Algorithm For Flight Formation Control Of Swarm Uavs, Berat Yıldız, Akif Durdu, Ahmet Kayabaşi

Turkish Journal of Electrical Engineering and Computer Sciences

Technological developments in industrial areas also impact unmanned aerial vehicles (UAVs). Recent improvements in both software and hardware have significantly increased the use of many UAVs in social and military fields. In particular, the widespread use of these vehicles in social areas such as entertainment, shipping, transportation, and delivery and military areas such as surveillance, tracking, and offensive measures has accelerated the research on swarm systems. This study examined the previous investigations on swarm UAVs and aimed to create a more efficient algorithm. The effectiveness of the proposed algorithm was compared with other leader-based applications. A swarm consisting of 5 …


Lower Data Attacks On Advanced Encryption Standard, Orhun Kara Mar 2024

Lower Data Attacks On Advanced Encryption Standard, Orhun Kara

Turkish Journal of Electrical Engineering and Computer Sciences

The Advanced Encryption Standard (AES) is one of the most commonly used and analyzed encryption algorithms. In this work, we present new combinations of some prominent attacks on AES, achieving new records in data requirements among attacks, utilizing only 2 4 and 2 16 chosen plaintexts (CP) for 6-round and 7-round AES 192/256, respectively. One of our attacks is a combination of a meet-in-the-middle (MiTM) attack with a square attack mounted on 6-round AES-192/256 while another attack combines an MiTM attack and an integral attack, utilizing key space partitioning technique, on 7-round AES-192/256. Moreover, we illustrate that impossible differential (ID) …


Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya Mar 2024

Cascade Controller Design Via Controller Synthesis For Load Frequency Control Of Electrical Power Systems, Yavuz Güler, Mustafa Nalbantoğlu, Ibrahim Kaya

Turkish Journal of Electrical Engineering and Computer Sciences

The regulation of tie-line electricity flow and frequency of electrical power systems (EPS) is crucial for ensuring their robustness to parameter changes and efficient management of disturbances. To this end, a novel cascade control design approach utilizing a serial Proportional-Integral-Derivative controller with a filter (PIDF) is proposed in this paper. The parameters of the controllers are derived analytically, and it is employed in both loops of the cascade control system to regulate the Load Frequency Control (LFC) of EPS. The implementation of PIDF controllers in both loops is utilized in the cascade control scheme for various power systems featuring different …


Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar Mar 2024

Advanced Hyperthermia Treatment: Optimizing Microwave Energy Focus For Breast Cancer Therapy, Burak Acar, Tuba Yilmaz Abdolsaheb, Ali Yapar

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a fast antenna phase optimization scheme to enable microwave power focusing for breast cancer hyperthermia. The power focusing is achieved through the maximization of the deposited electric field on the target malignant tumor tissue. To do so, a malignant breast tumor, the surrounding breast medium, and the skin of the breast are modeled as a cylindrical structure composed of eccentric cylinders, and electric field distribution is computed analytically in terms of cylindrical harmonics. This approach minimized the computational cost and simplified the breast medium model. To ensure applicability across various breast types, the dielectric properties (DPs) of …


Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu Mar 2024

Atomic Comagnetometer Gyroscopes For Inertial Navigation Systems: A Review, Murat Salim Karabinaoglu, Bekir Çakir, Mustafa Engin Başoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, developments in quantum sensing, laser, and atomic sensor technologies have also enabled advancement in the field of quantum navigation. Atomic-based gyroscopes have emerged as one of the most critical atomic sensors in this respect. In this review, a brief technology statement of spin exchange relaxation free (SERF) and nuclear magnetic resonance (NMR) type atomic comagnetometer gyroscope (CG) is presented. Related studies in the literature have been gathered, and the fundamental compositions of CGs with technical basics are presented. A comparison of SERF and NMR CGs is provided. A basic simulation of SERF CG was carried out because …


Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu Mar 2024

Uncovering And Mitigating Spurious Features In Domain Generalization, Saeed Karimi, Hamdi̇ Di̇bekli̇oğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Domain generalization (DG) techniques strive to attain the ability to generalize to an unfamiliar target domain solely based on training data originating from the source domains. Despite the increasing attention given to learning from multiple training domains through the application of various forms of invariance across those domains, the enhancements observed in comparison to ERM are nearly insignificant under specified evaluation rules. In this paper, we demonstrate that the disentanglement of spurious and invariant features is a challenging task in conventional training since ERM simply minimizes the loss and does not exploit invariance among domains. To address this issue, we …


Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer Mar 2024

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer

ELAIA

Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …


Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee Mar 2024

Deepfake It Til You Make It: How To Make A Short Film, Adam G. Lee

ELAIA

A recent development in the realm of computer technology is the deepfake. Deepfakes, which train a computer model to digitally superimpose one person’s face onto another body in a separate video, has its uses for good and for ill, with the unfortunate tendency to the latter. The vast majority of deepfakes are used for pornography, most commonly depicting female celebrities as the subjects. At the less notable level, it is also often used for revenge pornography. These aspects of deepfake technology are rarely discussed in mainstream media, which tends to focus on the less harmful uses, such as those for …


Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb Mar 2024

Predicting The Water Situation In Jordan Using Auto Regressive Integrated Moving Average (Arima) Model, Shahed Al-Khateeb

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

Countries' water security is inextricably related to their economic position. Jordan is one of the world's five poorest countries regarding water resources. Climate change and water scarcity are threatening Jordan's economic growth and food security.

The objectives of the study are to use a statistical artificial intelligence model, which is called the Autoregressive Integrated Moving Average model to predict water productivity in Jordan and the world for the year 2021-2026, based on a real dataset from World Development Indicators from the World Bank. The study also aims to predict the total per capita share of fresh water based on the …


Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem Mar 2024

Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …


Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom Mar 2024

Requirements For Employing Artificial Intelligence Applications In Higher Education And Its Challenges, Nuha Musa Otoom

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

The study aimed to determine the requirements for applications of artificial intelligence in the field of higher education, and its challenges. The descriptive survey method (content analysis) was used, where the researcher collected information and documents about artificial intelligence and the requirements for employing its applications and challenges, by referring to many reliable sources and references that contributed to Reaching the results that the research seeks to achieve, The results showed that there are a set of requirements for employing artificial intelligence applications in higher education, the most prominent of which is spreading a culture that supports artificial intelligence in …


Optimal Scheduling Strategy Of Virtual Power Plant With Carbon Emission And Carbon Penalty Considering Uncertainty Of Wind Power And Photovoltaic Power, Jijun Shui, Daogang Peng, Yankan Song, Qiang Zhou Feb 2024

Optimal Scheduling Strategy Of Virtual Power Plant With Carbon Emission And Carbon Penalty Considering Uncertainty Of Wind Power And Photovoltaic Power, Jijun Shui, Daogang Peng, Yankan Song, Qiang Zhou

Journal of System Simulation

Abstract: To better meet the development needs of China's new power system, an optimal scheduling strategy of virtual power plant(VPP) with carbon emission and carbon penalty considering the uncertainty of wind power and photovoltaic power is proposed. The mathematical description of photovoltaic(PV), wind turbine(WT), combined heat and power(CHP) unit and energy storage system (ESS) is carried out, and a wind-solar output model considering the uncertainty is established. The scenario generation and reduction method is used to generate the typical scenario. To maximize the overall operation benefit of VPP, considering carbon emission cost and carbon penalty, an optimal scheduling model of …


Research Advances On Electric Vehicle Routing Problem Models And Algorithms, Helin Zhuang, Xiaoyun Xia, Kangshun Li, Zefeng Chen, Xianchao Zhang Feb 2024

Research Advances On Electric Vehicle Routing Problem Models And Algorithms, Helin Zhuang, Xiaoyun Xia, Kangshun Li, Zefeng Chen, Xianchao Zhang

Journal of System Simulation

Abstract: The development of electric vehicle provides an alternative to conventional fuel vehicles for logistics companies. Using electric vehicles has the merits of less pollution and low noise, but the characteristics of limited cruising range and limited number of charging stations are new challenges. Electric vehicle routing problems(EVRPs) have been widely used in transportation, logistics and other fields, and have received much attention. A comprehensive survey of EVRP and its many variants are presented and the respective backgrounds and applicable conditions are analyzed. The solving approaches of EVRPs are categorized, the strengths and weaknesses of each algorithm are analyzed, and …


Optimal Dispatch Of Microgrid Clusters Considering Energy Storage Life And Communication Failures, Jianfang Jiao, Anjie Wang, Guang Wang, Jiale Xie Feb 2024

Optimal Dispatch Of Microgrid Clusters Considering Energy Storage Life And Communication Failures, Jianfang Jiao, Anjie Wang, Guang Wang, Jiale Xie

Journal of System Simulation

Abstract: To ensure the economy and stability of microgrid operation, the power fluctuations of renewable energy source (RES) and the lifetime characteristics of battery energy storage system (BESS) should be considered. The influence of charging and discharging depth and rate on the lifetime of BESS is researched, a model of battery energy storage system for real-time optimal scheduling is established, and the alternating direction method of multipliers is adopted for the distributed optimal scheduling of microgrid clusters. The distributed optimization method does not require any global information and can protect the privacy of microgrid in the maximum extent. Simulation results …


Runoff Intelligent Prediction Method Based On Broad-Deep Fusion Time-Frequency Analysis, Ying Han, Lehao Wang, Shumei Wang, Xiang Zhang, Xingxing Luo Feb 2024

Runoff Intelligent Prediction Method Based On Broad-Deep Fusion Time-Frequency Analysis, Ying Han, Lehao Wang, Shumei Wang, Xiang Zhang, Xingxing Luo

Journal of System Simulation

Abstract: Broad learning system(BLS) is introduced to tackle the existed disadvantage that LSTM-based runoff prediction model is easy to fall into local optimization. To reduce the influence of noise on the prediction results, the variational mode decomposition (VMD) is adopted to transform the onedimensional time-domain runoff signal to the two-dimensional time-frequency plane. The runoff prediction model based on VMD-LSTM-BLS is proposed. The simulation results demonstrate that the prediction accuracy of the new model is more significantly improved compared with the baseline model and the existing LSTM-based runoff prediction model.


Simulation Platform Of Agv System Scheduling Algorithms In Uncertain Environment, Zhihao Shi, Haihui Shen Feb 2024

Simulation Platform Of Agv System Scheduling Algorithms In Uncertain Environment, Zhihao Shi, Haihui Shen

Journal of System Simulation

Abstract: As a complete automated guided vehicle(AGV) system scheduling algorithm, it must include conflict-handling strategy, together with common dispatching strategy and routing algorithm. However, due to the uncertainty, characteristics of such scheduling algorithm are difficult to be analyzed theoretically, and the relevant study is lacking. An AGV system simulation platform based on the discreteevent simulation technique is designed and developed, which can flexibly set the scheduling problem, choose the dispatching strategy, routing algorithm, and conflict-handling strategy for the scheduling algorithm, to run the simulation. The platform has a visual interface, from which the running status of AGVs and the performance …