Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy Dec 2022

Opportunities And Challenges In Code Search Tools, Chao Liu, Xin Xia, David Lo, Cuiying Gao, Xiaohu Yang, John Grundy

Research Collection School Of Computing and Information Systems

Code search is a core software engineering task. Effective code search tools can help developers substantially improve their software development efficiency and effectiveness. In recent years, many code search studies have leveraged different techniques, such as deep learning and information retrieval approaches, to retrieve expected code from a large-scale codebase. However, there is a lack of a comprehensive comparative summary of existing code search approaches. To understand the research trends in existing code search studies, we systematically reviewed 81 relevant studies. We investigated the publication trends of code search studies, analyzed key components, such as codebase, query, and modeling technique …


Modeling And Simulation Of Ultra Supercritical Unit Using A Composite Weighted Human Learning Network, Chuanliang Cheng, Chen Peng, Deliang Zeng, Tengfei Zhang Jul 2022

Modeling And Simulation Of Ultra Supercritical Unit Using A Composite Weighted Human Learning Network, Chuanliang Cheng, Chen Peng, Deliang Zeng, Tengfei Zhang

Journal of System Simulation

Abstract: Intermediate point temperature is an important parameter in ultra supercritical (USC) unit. However, due to strong nonlinearity, it is difficult to determine the form and coefficients of the corresponding model by using traditional methods. In order to get a better control effect, a novel composite weighted human learning optimization network (CWHLON) is proposed to tackle the above-mentioned problems. Though the real-time dynamic linear model, the characteristics of the object are accurately simulated. In the simulation experiment, CWHLON is compared with the traditional recursive least squares and other three meta heuristic methods. The data show that the proposed method improves …


Deep Learning For Anomaly Detection, Guansong Pang, Charu Aggarwal, Chunhua Shen, Nicu Sebe Jun 2022

Deep Learning For Anomaly Detection, Guansong Pang, Charu Aggarwal, Chunhua Shen, Nicu Sebe

Research Collection School Of Computing and Information Systems

A nomaly detection aims at identifying data points which are rare or significantly different from the majority of data points. Many techniques are explored to build highly efficient and effective anomaly detection systems, but they are confronted with many difficulties when dealing with complex data, such as failing to capture intricate feature interactions or extract good feature representations. Deep-learning techniques have shown very promising performance in tackling different types of complex data in a broad range of tasks/problems, including anomaly detection. To address this new trend, we organized this Special Issue on Deep Learning for Anomaly Detection to cover the …


Development Of Modeling And Simulation Platform For Path-Planning And Control Of Autonomous Underwater Vehicles In Three-Dimensional Spaces, Sai Krishna Abhiram Kondapalli May 2022

Development Of Modeling And Simulation Platform For Path-Planning And Control Of Autonomous Underwater Vehicles In Three-Dimensional Spaces, Sai Krishna Abhiram Kondapalli

Mechanical & Aerospace Engineering Theses & Dissertations

Autonomous underwater vehicles (AUVs) operating in deep sea and littoral environments have diverse applications including marine biology exploration, ocean environment monitoring, search for plane crash sites, inspection of ship-hulls and pipelines, underwater oil rig maintenance, border patrol, etc. Achieving autonomy in underwater vehicles relies on a tight integration between modules of sensing, navigation, decision-making, path-planning, trajectory tracking, and low-level control. This system integration task benefits from testing the related algorithms and techniques in a simulated environment before implementation in a physical test bed. This thesis reports on the development of a modeling and simulation platform that supports the design and …


Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev Mar 2022

Digital Discrimination In The Sharing Economy: Evidence, Policy, And Feature Analysis, Miroslav Tushev

LSU Doctoral Dissertations

Applications (apps) of the Digital Sharing Economy (DSE), such as Uber, Airbnb, and TaskRabbit, have become a main facilitator of economic growth and shared prosperity in modern-day societies. However, recent research has revealed that the participation of minority groups in DSE activities is often hindered by different forms of bias and discrimination. Evidence of such behavior has been documented across almost all domains of DSE, including ridesharing, lodging, and freelancing. However, little is known about the under- lying design decisions of DSE systems which allow certain demographics of the market to gain unfair advantage over others. To bridge this knowledge …


Research On Digital Twin-Based Modeling And Monitoring Of Five-Axis Grinder, Xiao Tong, Haifan Jiang, Guofu Ding, Jiang Lei, Shuwen Ma Jan 2022

Research On Digital Twin-Based Modeling And Monitoring Of Five-Axis Grinder, Xiao Tong, Haifan Jiang, Guofu Ding, Jiang Lei, Shuwen Ma

Journal of System Simulation

Abstract: Aiming at the poor virtual-real interaction ability, single data presentation mode, and hysteretic abnormality handling in CNC machine tool status monitoring, a visual monitoring method for machine tool process based on digital twin is proposed, Which realizes the mapping of three subsystems of machine tool, machinery, control and electrical to the information space from three dimensions of geometry, logic and data. The verification of instructions and CNC programs, real-time status monitoring and abnormality handling during operation are carried out. A digital twin-based machine tool modeling and monitoring system is designed and developed. Taking a five-axis CNC …


Track Deception Modeling Method Based On Multi-Jammer Cooperation, Wang Rui, Xiangyang Li, Zhili Zhang, Hongguang Ma Jan 2022

Track Deception Modeling Method Based On Multi-Jammer Cooperation, Wang Rui, Xiangyang Li, Zhili Zhang, Hongguang Ma

Journal of System Simulation

Abstract: The false track generated by the jammer formation is an effective interference measure against networked radars. This paper starts from the basic principle of false track generation and presents the model of the measurement error of the radar for the false track and the control error of the jammer formation. It also presents an analysis of the effects of these errors on the false track. The effectiveness of the false track is further analyzed through the confrontation scenario between the rectangular front formation of a certain type of equipment and networked radars. The simulation results show that the false …


Modeling The Heterogeneous Temporal Dynamics Of Epidemics On Networks, Andrea Joan Allen Jan 2022

Modeling The Heterogeneous Temporal Dynamics Of Epidemics On Networks, Andrea Joan Allen

Graduate College Dissertations and Theses

Mathematical models of infectious disease are important tools for understanding large-scale patterns of how a disease spreads through a population. Predictions of trends from disease models help guide public health prevention and mitigation measures. Most simple disease models assume that the population is randomly mixed, but real-world populations exhibit heterogeneous patterns in the way people interact. These differences in population structure can be represented by networks. Networks can then be incorporated into disease models by using various interdisciplinary concepts and tools. Yet even network disease models often overlook that populations change over time. In this thesis, two models of infectious …


Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen Jan 2022

Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen

VMASC Publications

In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …


Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour Jan 2022

Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour

Engineering Management & Systems Engineering Faculty Publications

In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …