Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Artificial Intelligence and Robotics (937)
- Engineering (932)
- Computer Engineering (675)
- Numerical Analysis and Scientific Computing (403)
- Databases and Information Systems (394)
-
- Operations Research, Systems Engineering and Industrial Engineering (334)
- Information Security (308)
- Electrical and Computer Engineering (287)
- Systems Science (287)
- Social and Behavioral Sciences (255)
- Software Engineering (234)
- Mathematics (181)
- Graphics and Human Computer Interfaces (165)
- Business (153)
- Data Science (148)
- Medicine and Health Sciences (147)
- Other Computer Sciences (142)
- Theory and Algorithms (133)
- Life Sciences (103)
- Education (101)
- Physics (95)
- OS and Networks (76)
- Arts and Humanities (72)
- Public Affairs, Public Policy and Public Administration (69)
- Programming Languages and Compilers (64)
- Law (61)
- Chemistry (58)
- Applied Mathematics (54)
- Institution
-
- Singapore Management University (467)
- China Simulation Federation (281)
- TÜBİTAK (166)
- Old Dominion University (148)
- University of Texas at El Paso (144)
-
- Kennesaw State University (137)
- MBZUAI (118)
- Chulalongkorn University (105)
- Zayed University (103)
- Technological University Dublin (69)
- Missouri University of Science and Technology (63)
- City University of New York (CUNY) (59)
- Air Force Institute of Technology (54)
- University of Nebraska - Lincoln (53)
- Karbala International Journal of Modern Science (49)
- Walden University (48)
- Western University (44)
- San Jose State University (42)
- University of Central Florida (39)
- University of Massachusetts Amherst (33)
- Loyola University Chicago (31)
- University of Arkansas, Fayetteville (31)
- Boise State University (28)
- Wright State University (28)
- Embry-Riddle Aeronautical University (27)
- Portland State University (26)
- University of South Carolina (25)
- University of South Florida (25)
- University of Texas Rio Grande Valley (25)
- Edith Cowan University (22)
- Keyword
-
- Machine learning (174)
- Deep learning (143)
- Technical Reports (129)
- UTEP Computer Science Department (129)
- Artificial intelligence (90)
-
- Machine Learning (84)
- Deep Learning (57)
- Cybersecurity (56)
- Security (42)
- COVID-19 (40)
- Computer Science (39)
- Blockchain (38)
- Natural language processing (36)
- Computer vision (34)
- Artificial Intelligence (30)
- Optimization (29)
- Neural networks (27)
- Privacy (25)
- AI (22)
- Classification (22)
- Reinforcement learning (22)
- Simulation (22)
- Internet of Things (21)
- Virtual reality (21)
- Anomaly detection (19)
- Department of Computer Science and Engineering (19)
- Convolutional neural network (18)
- Feature extraction (18)
- IoT (18)
- Machine Learning (cs.LG) (18)
- Publication
-
- Research Collection School Of Computing and Information Systems (438)
- Journal of System Simulation (281)
- Turkish Journal of Electrical Engineering and Computer Sciences (166)
- Departmental Technical Reports (CS) (129)
- Theses and Dissertations (114)
-
- Chulalongkorn University Theses and Dissertations (Chula ETD) (105)
- All Works (103)
- C-Day Computing Showcase (90)
- Machine Learning Faculty Publications (64)
- Computer Science Faculty Research & Creative Works (50)
- Articles (49)
- Karbala International Journal of Modern Science (49)
- Walden Dissertations and Doctoral Studies (48)
- Doctoral Dissertations (47)
- Electronic Theses and Dissertations (45)
- Computer Science Faculty Publications and Presentations (44)
- Computer Science Faculty Publications (35)
- Computer Vision Faculty Publications (35)
- Master's Projects (33)
- Cybersecurity Undergraduate Research Showcase (30)
- Electronic Theses and Dissertations, 2020- (28)
- Electronic Thesis and Dissertation Repository (28)
- School of Computing: Faculty Publications (28)
- Publications and Research (26)
- Dissertations (25)
- Computer Science: Faculty Publications and Other Works (23)
- Faculty Publications (20)
- USF Tampa Graduate Theses and Dissertations (20)
- Browse all Theses and Dissertations (19)
- Research outputs 2022 to 2026 (19)
- Publication Type
- File Type
Articles 1 - 30 of 3407
Full-Text Articles in Computer Sciences
Using Materialized Views For Answering Graph Pattern Queries, Michael Lan
Using Materialized Views For Answering Graph Pattern Queries, Michael Lan
Dissertations
Discovering patterns in graphs by evaluating graph pattern queries involving direct (edge-to-edge mapping) and reachability (edge-to-path mapping) relationships under homomorphisms on data graphs has been extensively studied. Previous studies have aimed to reduce the evaluation time of graph pattern queries due to the potentially numerous matches on large data graphs.
In this work, the concept of the summary graph is developed to improve the evaluation of tree pattern queries and graph pattern queries. The summary graph first filters out candidate matches which violate certain reachability constraints, and then finds local matches of query edges. This reduces redundancy in the representation …
Android Security: Analysis And Applications, Raina Samuel
Android Security: Analysis And Applications, Raina Samuel
Dissertations
The Android mobile system is home to millions of apps that offer a wide range of functionalities. Users rely on Android apps in various facets of daily life, including critical, e.g., medical, settings. Generally, users trust that apps perform their stated purpose safely and accurately. However, despite the platform’s efforts to maintain a safe environment, apps routinely manage to evade scrutiny. This dissertation analyzes Android app behavior and has revealed several weakness: lapses in device authentication schemes, deceptive practices such as apps covering their traces, as well as behavioral and descriptive inaccuracies in medical apps. Examining a large corpus of …
Machine Learning-Based Data Analytics For Understanding Space Weather And Climate, Yasser Abduallah
Machine Learning-Based Data Analytics For Understanding Space Weather And Climate, Yasser Abduallah
Dissertations
This dissertation addresses multiple crucial problems in space weather and climate, presenting new machine learning-based data analytics algorithms and models for tackling the problems.
First, the dissertation presents two new approaches to predicting solar flares. One approach, called DeepSun, predicts solar flares by utilizing a machine-learning-as-a-service (MLaaS) platform. The DeepSun system provides a friendly interface for Web users and an application programming interface (API) for remote programming users. It adopts an ensemble learning method that employs several machine learning algorithms to perform multiclass flare prediction. The other approach, named SolarFlareNet, forecasts the occurrence of solar flares within the next 24 …
Development Of Web-Based Project Tender Documents Application Using Extreme Programming Methods, Mustari Lamada, Aminuddin Bakry, Aulyah Zakilah Ifani, Khaerunnisa Khaerunnisa
Development Of Web-Based Project Tender Documents Application Using Extreme Programming Methods, Mustari Lamada, Aminuddin Bakry, Aulyah Zakilah Ifani, Khaerunnisa Khaerunnisa
Elinvo (Electronics, Informatics, and Vocational Education)
The application of technology is a need that is in demand in the industrial world today, especially in the field of contractors of goods and services that have implemented the use of applications to help the process of managing data and project documents in their companies. This study aims to optimize the web-based project tender document system using the extreme programming method. The extreme programming method consists of planning, design, coding, testing, and software increment. Research methods using extreme programming methods consisting of planning, design, coding, testing, and software increment. The planning stages obtain results in the form of functional …
Implementation Of Ahp And Black Box Testing To The Development Of An Information System For Assessing The Feasibility Of Bumdes Submissions, Hari Toha Hidayat, Husaini Husaini, Nanang Prihatin, Radhiyatammardhiyyah Radhiyatammardhiyyah
Implementation Of Ahp And Black Box Testing To The Development Of An Information System For Assessing The Feasibility Of Bumdes Submissions, Hari Toha Hidayat, Husaini Husaini, Nanang Prihatin, Radhiyatammardhiyyah Radhiyatammardhiyyah
Elinvo (Electronics, Informatics, and Vocational Education)
The existence of institutional village enterprises (BUMDES) has never been adequately monitored in terms of the growth of village-owned businesses in each village. According to the data, there are 17 BUMDES in the Muara District that have been inactive for the most part. Due to the difficulty of monitoring the progress of BUMDES, a significant number of them have become stalled or even inactive. In addition, many BUMDES managers are frequently unprepared to operate the newly opened business. Readiness in terms of the quality of human resources also affects the formation of BUMDES. Consequently, the objective of this study is …
Comparison Of Web 2.0 Use On State University Websites In Indonesia And Top World Universities Related To Webometric Ranking, Handaru Jati
Comparison Of Web 2.0 Use On State University Websites In Indonesia And Top World Universities Related To Webometric Ranking, Handaru Jati
Elinvo (Electronics, Informatics, and Vocational Education)
The present work determines the presence in the web 2.0 that twenty universities had through their educational portals. The universities are selected according to the Webometrics ranking (the ten best located in Indonesia and the best located worldwide) to identify what Web 2.0 tools they use. This study explores the educational portals of the twenty selected universities to determine which Web 2.0 tools they use and variables of the tools found will be assessed. The study only considers those Web 2.0 tools which are linked to the websites of universities. Of the two most used tools, the relevant indicators are …
Design Framework Of Uav-Based Environment Sensing, Localization, And Imaging System, Yue Sun
Design Framework Of Uav-Based Environment Sensing, Localization, And Imaging System, Yue Sun
Graduate Doctoral Dissertations
In this dissertation research, we develop a framework for designing an Unmanned Aerial Vehicle or UAV-based environment sensing, localization, and imaging system for challenging environments with no GPS signals and low visibility. The UAV system relies on the various sensors that it carries to conduct accurate sensing and localization of the objects in an environment, and further to reconstruct the 3D shapes of those objects. The system can be very useful when exploring an unknown or dangerous environment, e.g., a disaster site, which is not convenient or not accessible for humans. In addition, the system can be used for monitoring …
A Neural Analysis-Synthesis Approach To Learning Procedural Audio Models, Danzel Serrano
A Neural Analysis-Synthesis Approach To Learning Procedural Audio Models, Danzel Serrano
Theses
The effective sound design of environmental sounds is crucial to demonstrating an immersive experience. Classical Procedural Audio (PA) models have been developed to give the sound designer a fast way to synthesize a specific class of environmental sounds in a physically accurate and computationally efficient manner. These models are controllable due to the choice of parameters from analyzing a class of sound. However, the resulting synthesis lacks the fidelity for the preferred immersive experience; thus, the sound designer would rather search through an extensive database for real recordings of a target sound class. This thesis proposes the Procedural audio Variational …
Famaid: A Tool For Aiding People With Disability, Mohamad Maad, Ahmad Owaydate, Mohammad Kojok, Firas Aboudaher, Layal Abu Daher, May Itani
Famaid: A Tool For Aiding People With Disability, Mohamad Maad, Ahmad Owaydate, Mohammad Kojok, Firas Aboudaher, Layal Abu Daher, May Itani
BAU Journal - Science and Technology
People with disabilities suffer from discrimination and obstacles that restrict them from participating in society on an equal basis with others every day. They are deprived of their rights to be included in ordinary school systems and even in the work market. In the process of raising awareness, facilitating dailyroutines, and developing guidance, the idea of assisting such people with handy tools/software arose and was implemented in the FamAid tool. FamAid offers people with hearing disability the opportunity to be engaged in the society through many facilities. In this work, we implemented a web application that serves as a community …
Short Term Energy Consumption Forecasting Using Neural Basis Expansion Analysis For Interpretable Time Series, Abdul Khalique Shaikh, Amril Nazir, Imran Khan, Abdul Salam Shah
Short Term Energy Consumption Forecasting Using Neural Basis Expansion Analysis For Interpretable Time Series, Abdul Khalique Shaikh, Amril Nazir, Imran Khan, Abdul Salam Shah
All Works
Smart grids and smart homes are getting people's attention in the modern era of smart cities. The advancements of smart technologies and smart grids have created challenges related to energy efficiency and production according to the future demand of clients. Machine learning, specifically neural network-based methods, remained successful in energy consumption prediction, but still, there are gaps due to uncertainty in the data and limitations of the algorithms. Research published in the literature has used small datasets and profiles of primarily single users; therefore, models have difficulties when applied to large datasets with profiles of different customers. Thus, a smart …
Methods For Drone Trajectory Analysis Of Bottlenose Dolphins (Tursiops Truncatus), Jillian D. Bliss
Methods For Drone Trajectory Analysis Of Bottlenose Dolphins (Tursiops Truncatus), Jillian D. Bliss
Theses and Dissertations
With the increase in the use of UAS (Unmanned Aerial Systems) for marine mammal research, there is a need for the development of methods of analysis to transform UAS high resolution video into quantitative data. This study sought to develop a preliminary method of analysis that would quantify and present a way to visualize the dynamics and relative spatial distribution and changes in distribution of bottlenose dolphins (Tursiops truncatus) in the waters of Turneffe Atoll, Belize. This approach employs a previously developed video tracking program ‘Keypoint Tracking’ that enables manual tracking of individual dolphins and the creation of …
Emulating Future Neurotechnology Using Magic, Jay A. Olson, Mariève Cyr, Despina Z. Artenie, Thomas Strandberg, Lars Hall, Matthew L. Tompkins, Amir Raz, Petter Johansson
Emulating Future Neurotechnology Using Magic, Jay A. Olson, Mariève Cyr, Despina Z. Artenie, Thomas Strandberg, Lars Hall, Matthew L. Tompkins, Amir Raz, Petter Johansson
Psychology Faculty Articles and Research
Recent developments in neuroscience and artificial intelligence have allowed machines to decode mental processes with growing accuracy. Neuroethicists have speculated that perfecting these technologies may result in reactions ranging from an invasion of privacy to an increase in self-understanding. Yet, evaluating these predictions is difficult given that people are poor at forecasting their reactions. To address this, we developed a paradigm using elements of performance magic to emulate future neurotechnologies. We led 59 participants to believe that a (sham) neurotechnological machine could infer their preferences, detect their errors, and reveal their deep-seated attitudes. The machine gave participants randomly assigned positive …
Investigation, Detection And Prevention Of Online Child Sexual Abuse Material: A Comprehensive Survey, Vuong Ngo, Christina Thorpe, Cach N. Dang, Susan Mckeever
Investigation, Detection And Prevention Of Online Child Sexual Abuse Material: A Comprehensive Survey, Vuong Ngo, Christina Thorpe, Cach N. Dang, Susan Mckeever
Conference papers
Child sexual abuse inflicts lifelong devastating consequences for victims and is a growing social concern. In most countries, child sexual abuse material (CSAM) distribution is illegal. As a result, there are many research papers in the literature which proposed technologies to detect and investigate CSAM. In this survey, a comprehensive search of the peer reviewed journal and conference paper databases (including preprints) is conducted to identify high-quality literature. We use the PRISMA methodology to refine our search space to 2,761 papers published by Springer, Elsevier, IEEE and ACM. After iterative reviews of title, abstract and full text for relevance to …
Realizing Molecular Machine Learning Through Communications For Biological Ai: Future Directions And Challenges, Sasitharan Balasubramaniam, Samitha Somathilaka, Sehee Sun, Adrian Ratwatte, Massimiliano Pierobon
Realizing Molecular Machine Learning Through Communications For Biological Ai: Future Directions And Challenges, Sasitharan Balasubramaniam, Samitha Somathilaka, Sehee Sun, Adrian Ratwatte, Massimiliano Pierobon
School of Computing: Faculty Publications
Artificial Intelligence (AI) and Machine Learning (ML) are weaving their way into the fabric of society, where they are playing a crucial role in numerous facets of our lives. As we witness the increased deployment of AI and ML in various types of devices, we benefit from their use into energy-efficient algorithms for low powered devices. In this paper, we investigate a scale and medium that is far smaller than conventional devices as we move towards molecular systems that can be utilized to perform machine learning functions, i.e., Molecular Machine Learning (MML). Fundamental to the operation of MML is the …
Overview Of Research And Application On Autonomous Vehicle Oriented Perception System Simulation, Ruoxuan Wang, Jianping Wu, Hui Xu
Overview Of Research And Application On Autonomous Vehicle Oriented Perception System Simulation, Ruoxuan Wang, Jianping Wu, Hui Xu
Journal of System Simulation
Abstract: Following the rapid progress of science and technology, vehicles with autonomous driving or auxiliary driving function enter into vehicle market. However, in the past decade, traffic accidents still occurred frequently, and the safety of these functions become the focus. Simulation technology provides a good platform to test the perception system of autonomous vehicle. Focus on the sensor simulation modeling of autonomous vehicle perception system, from the perspective of single sensor simulation, multi-sensor simulation and classic simulation platform including millimeter wave radar, lidar and camera, the existing research are reviewed, and the shortcomings and development trends of simulation modeling of …
Simulation-Driven Based Utility Evaluation And Recommendation Of Expressway Proactive Speed Limit, Geqi Qi, Sijin Liu, Yikang He, Meng Wang, Ailing Huang
Simulation-Driven Based Utility Evaluation And Recommendation Of Expressway Proactive Speed Limit, Geqi Qi, Sijin Liu, Yikang He, Meng Wang, Ailing Huang
Journal of System Simulation
Abstract: Outside the specific punishment area, the traditional roadside passive speed limit mode lacks traffic management, and thus which indirectly leads to the inconsistency or even sudden change of vehicle behaviors in time and space, thereby affects the traffic efficiency and safety. Focusing on the proactive speed limit mode at vehicle side, a utility evaluation and recommendation method is proposed, which carries out the multi-scenario traffic simulation for varied proactive and passive speed limit considering road line types, traffic flow and vehicle type proportion. From the two perspectives of safety and efficiency, the utility evaluation indicators and weights are extracted …
Short-Term Prediction Method Of Wind Power Based On Blp-Alo-Svm, Yefeng Jiao, Yan Wang, Zhicheng Ji
Short-Term Prediction Method Of Wind Power Based On Blp-Alo-Svm, Yefeng Jiao, Yan Wang, Zhicheng Ji
Journal of System Simulation
Abstract: To effectively predict the short-term wind power and its fluctuation range, a prediction method based on hybrid algorithm-optimized support vector machine is proposed. Exploratory data analysis is used to preprocess the original wind speed data to improve the data quality. Chaotic map, Levy flight strategy and particle swarm optimization are used to improve the ant lion algorithm. The support vector machine model optimized by hybrid algorithm is used to predict the wind power. The experimental results show that, compared with the new wind power prediction model, the prediction error of the output results of the method is lower, and …
Low Voltage Ride-Through Modeling For Wind Turbines Based On Neural Odes, Qiping Lai, Tannan Xiao, Dongsheng Li, Chen Shen
Low Voltage Ride-Through Modeling For Wind Turbines Based On Neural Odes, Qiping Lai, Tannan Xiao, Dongsheng Li, Chen Shen
Journal of System Simulation
Abstract: Considering the difficulty of equivalent modeling of low voltage ride-through(LVRT) characteristics of a wind farm, a neural ordinary differential equation(ODE)-based wind farm LVRT modeling methodis proposed. The input of the model is the voltage and wind speed of each wind turbine at the grid connection point of wind farm, and the output is the current at the grid connection point. The model can better characterize the strong nonlinear switching process and describe LVRT characteristics of wind farms under different wind speed scenarios. A simulation example of a wind farm including three doubly-fed induction generators(DFIGs) is established on …
Anomaly Detection Method Of Electrical Power Consumption Based On Deep Autoencoder, Ningke Sun, Yan Wang, Zhicheng Ji
Anomaly Detection Method Of Electrical Power Consumption Based On Deep Autoencoder, Ningke Sun, Yan Wang, Zhicheng Ji
Journal of System Simulation
Abstract: Aiming at the nonlinear and non-stationary characteristics of electrical power consumption data, an abnormal electrical power consumption detection model based on deep autoencoder is proposed. Gated recurrent unit (GRU) network of the deep learning is combined with autoencoder structure, and the encoder and decoder parts of traditional autoencoder are realized by gated recurrent unit network, which gives full play to the data feature extraction capability of gated recurrent unit and the data reconstruction function of autoencoder structure. Based on the reconstruction error between original data and reconstructed data, abnormal data points of the electrical power consumption are detected. By …
Sis-Based Modeling And Simulation Analysis On Exercise Benefit Perception Transmission, Lei Wang, Jinhai Sun, Tuojian Li
Sis-Based Modeling And Simulation Analysis On Exercise Benefit Perception Transmission, Lei Wang, Jinhai Sun, Tuojian Li
Journal of System Simulation
Abstract: In order to distinguish the relationship between individual health behavior change and collective health behavior emergence, deal with the challenges of mathematical description of typical health information dissemination processes in social networks and social experiments, SIS(susceptible-infected-susceptible)model is introduced to simulate the dissemination process of classical health information exercise effect perception to meet the requirements of social system complexity, individual diversity and intelligence. To carry out numerical experiments on the propagation process of exercise effect perception to identify the phase change process of the collective health behavior emergence, agent-based modeling and simulation are utilized through NetLogo. Experimental results show …
Simulation On Flood Disaster In Urban Building Complex System Based On Lbm, Shen Zhang, Zewang Yang, Yifan Wang, Liang Sun, Ming Cheng, Fankai Meng, Ting Li
Simulation On Flood Disaster In Urban Building Complex System Based On Lbm, Shen Zhang, Zewang Yang, Yifan Wang, Liang Sun, Ming Cheng, Fankai Meng, Ting Li
Journal of System Simulation
Abstract: Because of the extreme climate change, the potential flood disaster risk in the southeast coastal areas of China can not be ignored. Based on lattice Boltzmann computational fluid dynamics method, a three-dimensional simulation study of waterlogging process in tsunami impact scenario is carried out for a coastal city building complex system, and the reliability and accuracy of the numerical simulation method for the flood impact test of an ideal building complex are verified. The results show that the buildings along rivers and coastlines have obvious cloaking effect, while the buildings inside the city are less affected by floods. The …
Long-Term Resilience Simulation On Low-Carbon Urban Grid Based On Evolutionary Game, Zhengda Cui, Weiqiang Yao, Qin Xu, Chen Fang, Ying Chen
Long-Term Resilience Simulation On Low-Carbon Urban Grid Based On Evolutionary Game, Zhengda Cui, Weiqiang Yao, Qin Xu, Chen Fang, Ying Chen
Journal of System Simulation
Abstract: Because of the more frequent extreme disasters, the resilience of urban grid becomes more important. In the background of carbon neutralization policy, the decarbonization transition of urban grid also affects the development of grid resilience. An evolutionary game is used to simulate the resilience evolution of low-carbon urban grid and the evolution model is constructed. The decision to install photovoltaic and energy storage system for residents and to upgrade the grid for resilience is considered in the model and the stability conditions of equilibriums of the evolutionary game are analyzed. The resilience evolution simulation model considering disaster stochasticity is …
Research On Complex Combat Network Dynamic Evolution Based On Information Entropy, Lianyi Zhang, Xisheng Shen, Duzheng Qing, Han Zhang, Min Zhou, Xifu Wang
Research On Complex Combat Network Dynamic Evolution Based On Information Entropy, Lianyi Zhang, Xisheng Shen, Duzheng Qing, Han Zhang, Min Zhou, Xifu Wang
Journal of System Simulation
Abstract: Network-centric warfare, distributed and decentralized command and control gradually replace separately the traditional platform-centric warfare and centralized command and control, and information has become a combat capability. Based on the new information weapon equipment system operation loop, a complex combat network model based on information entropy is constructed, and the combat capability measurement method is proposed. On the basis of the combat capability upgrade being the network driving force, the dynamic evolution rule of the complex combat network is designed and the preferential evolution and stochastic evolution models are constructed. According to a typical system combat example, the influence …
Research On Modeling And Simulation Technology Of Microwave Radar High Precision Tracking Loop, Jiaji Lou, Jing Ma, Xiaowei Li, Yue Zhao, Youbin Song
Research On Modeling And Simulation Technology Of Microwave Radar High Precision Tracking Loop, Jiaji Lou, Jing Ma, Xiaowei Li, Yue Zhao, Youbin Song
Journal of System Simulation
Abstract: Aiming at the key problem of high-precision tracking loop design of a measurement radar for the weak signal (low carrier to noise ratio signal) in dynamic environment, the design and optimization methods of carrier tracking loop and code tracking loop are focused on. A signal structure with a single carrier as a pilot is proposed, and the loop structure of the frequency-locked loop and the phase-locked loop working together is studied. The modeling and simulation on the two structures show that for the week signal tracking in a dynamic environment, the loop combination structure of the frequency-serial auxiliary …
Research On Parameter Construction Method Of Blue Army Equipment Model Based On A Deep Network, Boyuan Zhang, Guanghong Gong, Ze Wang, Ni Li
Research On Parameter Construction Method Of Blue Army Equipment Model Based On A Deep Network, Boyuan Zhang, Guanghong Gong, Ze Wang, Ni Li
Journal of System Simulation
Abstract: The modeling of blue army equipment is an indispensable part of adversarial simulation environment construction. Aiming at the limited available parameters of "information-poor" and "small sample" characteristics to the blue system, a deep network-based method is proposed to generate the parameters of blue army equipment model. By injecting the information into the simulation model of the blue army equipment, the simulation data is generated and trained in the deep neural network. The obtained network has a certain generalization ability to the unknown parameters prediction of the same type of equipment and can be used directly in prediction or be …
Fast Generation Method Of Multi-Sensing Channel Fusion Virtual Experiment, Jingwei Deng, Hanwu He, Yueming Wu, Jianhao Su
Fast Generation Method Of Multi-Sensing Channel Fusion Virtual Experiment, Jingwei Deng, Hanwu He, Yueming Wu, Jianhao Su
Journal of System Simulation
Abstract: Aiming at the low development efficiency and single experience in traditional virtual experiments, a rapid generation method of multi-sensing channel fusion virtual experiment visualization is proposed. The experimental steps and sequence of experimental steps of the virtual experiment are defined. A parameterized description method of experimental elements based on Petri net is proposed to describe the sequence of experimental steps, which breaks through the constraints the established procedure steps of traditional virtual experiments and supports the exploratory virtual experiments. The visual expression method of the routing graph and the conversion method between the routing graph and the Petri …
Multi-Robot Path Planning Based On Cbs Algorithm, Qiao Qiao, Yan Wang, Zhicheng Ji
Multi-Robot Path Planning Based On Cbs Algorithm, Qiao Qiao, Yan Wang, Zhicheng Ji
Journal of System Simulation
Abstract: Aiming at the long multi-robot planning path and long one-way search running time of conflict-based search(CBS) in the multi-agent path finding(MAPF), an improved CBS algorithm is proposed, which in a two-way A* focus search is used to optimize the search direction and search method. The suboptimal factorωis introduced into the underlying search function of the CBS algorithm to improve the efficiency of path search. The one-way search in the conflict search algorithm is optimized to a two-way A* search. The experimental results show that the path cost of the improved CBS algorithm is shortened …
Reliability Parameter Optimization Complex System Simulation Based On R-Vikor Method, Zhiguang Wang, Baiting Liu, Xiaolei Wang, Tao Liu, Zhaowei Yang
Reliability Parameter Optimization Complex System Simulation Based On R-Vikor Method, Zhiguang Wang, Baiting Liu, Xiaolei Wang, Tao Liu, Zhaowei Yang
Journal of System Simulation
Abstract: The operation of complex simulation system is not isolated, and always affected by multiple external factors and its own performance. In simulation reliability calculation, parameters need to be chosen, and different performance indexes need to be taken into account when comparing with the reference model. The research is transformed into the multi-attribute decision. An system simulation trusted parameter optimization method based on R-VIKOR(resist rank reversal of visekriterijumska optimizacija | kompromisno resenje) is proposed. Multiple sets of aerodynamic parameters of the new model are obtained through model migration theory, and similarity calculation is carried out with the optimal parameters of …
Research On Low Computational Predictive Control Strategy Of Three-Level Four-Arm Apf, Guifeng Wang, Jinxing Guo
Research On Low Computational Predictive Control Strategy Of Three-Level Four-Arm Apf, Guifeng Wang, Jinxing Guo
Journal of System Simulation
Abstract: Four-arm active power filter(APF) is an ideal device to the power quality of three-phase four-wire distribution network. Owing to the sufficient number of base vectors, three-level four-arm APF has better current tracking performance, but the prediction calculation amount is too large when model predictive current control is applied. A model prediction voltage control strategy based on the idea of space stratification is proposed. Based on the deadbeat control idea and the discrete mathematical model in αβγ coordinate system, the expected reference voltage is predicted from the reference current, and the multiple current predictions are converted into the single voltage …
Research On Emotional Contagion And Intervention Strategy Of Indoor Evacuation Based On Risk Perception, Yang Zeng, Jinling Li, Haixiang Guo, Weiming Chen
Research On Emotional Contagion And Intervention Strategy Of Indoor Evacuation Based On Risk Perception, Yang Zeng, Jinling Li, Haixiang Guo, Weiming Chen
Journal of System Simulation
Abstract: Aiming at the panic emotion contagion in the indoor emergency evacuation with multi-exit and multi-obstacle, an emotional contagion model is constructed on personality traits, risk perception differences of age and gender, and consciousness regulation. The simulation is carried out by using AnyLogic, which combines individual emotions with evacuation speed to realize the real-time updating of emotional state and speed. That personnel intervention in the process of evacuation can effectively alleviate the spread of panic emotion, is verified and can provide the theoretical basis for panic contagion in the process of emergency evacuation. The results show that the degree of …