Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- China Simulation Federation (315)
- TÜBİTAK (202)
- Singapore Management University (47)
- Old Dominion University (45)
- Wright State University (40)
-
- University of Arkansas, Fayetteville (23)
- Air Force Institute of Technology (21)
- Technological University Dublin (21)
- Chulalongkorn University (18)
- University of Nebraska - Lincoln (18)
- Embry-Riddle Aeronautical University (11)
- Portland State University (11)
- Washington University in St. Louis (11)
- New Jersey Institute of Technology (9)
- University of South Florida (9)
- University of Wisconsin Milwaukee (9)
- University of South Carolina (8)
- University of Texas at El Paso (7)
- University of Nevada, Las Vegas (6)
- University of Windsor (6)
- Ateneo de Manila University (5)
- California Polytechnic State University, San Luis Obispo (5)
- Chapman University (5)
- Nova Southeastern University (5)
- University of Kentucky (5)
- University of New Haven (5)
- University of Tennessee, Knoxville (5)
- City University of New York (CUNY) (4)
- Missouri University of Science and Technology (4)
- Sacred Heart University (4)
- Keyword
-
- Deep learning (49)
- Machine learning (36)
- Computer Science (32)
- Machine Learning (26)
- Department of Computer Science (21)
-
- Deep Learning (20)
- Simulation (17)
- Optimization (14)
- Artificial intelligence (13)
- Cybersecurity (13)
- Artificial Intelligence (12)
- COVID-19 (12)
- Classification (11)
- Reinforcement learning (10)
- Convolutional neural network (9)
- Department of Computer Science and Engineering (9)
- Genetic algorithm (9)
- Internet of things (9)
- Transfer learning (9)
- Computer Engineering (8)
- Sliding mode control (8)
- Support vector machine (8)
- Computer vision (7)
- Natural language processing (7)
- Augmented reality (6)
- Clustering (6)
- Computer generated forces (6)
- Convolutional neural networks (6)
- Feature extraction (6)
- Generative adversarial networks (6)
- Publication
-
- Journal of System Simulation (315)
- Turkish Journal of Electrical Engineering and Computer Sciences (202)
- Research Collection School Of Computing and Information Systems (46)
- Theses and Dissertations (37)
- Browse all Theses and Dissertations (29)
-
- Dissertations (26)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (18)
- Electronic Theses and Dissertations (15)
- Graduate Theses and Dissertations (14)
- Computer Science and Engineering Faculty Publications (11)
- McKelvey School of Engineering Theses & Dissertations (11)
- Department of Computer Science and Engineering: Dissertations, Theses, and Student Research (10)
- USF Tampa Graduate Theses and Dissertations (8)
- Articles (7)
- Doctoral Dissertations (7)
- Engineering Management & Systems Engineering Faculty Publications (7)
- Faculty Publications (7)
- Mathematical Sciences Spring Lecture Series (6)
- CCE Theses and Dissertations (5)
- Computer Science Faculty Publications (5)
- Electrical & Computer Engineering and Computer Science Faculty Publications (5)
- Engineering Technology Faculty Publications (5)
- Open Access Theses & Dissertations (5)
- Publications (5)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (5)
- VMASC Publications (5)
- Cybersecurity Undergraduate Research Showcase (4)
- Department of Information Systems & Computer Science Faculty Publications (4)
- Dissertations - ALL (4)
- Dissertations and Theses (4)
- Publication Type
Articles 61 - 90 of 979
Full-Text Articles in Engineering
Novel Approach To Integrate Can Based Vehicle Sensors With Gps Using Adaptive Filters To Improve Localization Precision In Connected Vehicles From A Systems Engineering Perspective, Abhijit Vasili
USF Tampa Graduate Theses and Dissertations
Research and development in Connected Vehicles (CV) Technologies has increased exponentially, with the allocation of 75 MHz radio spectrum in the 5.9 GHz band by the Federal Communication Commission (FCC) dedicated to Intelligent Transportation Systems (ITS) in 1999 and 30 MHz in the 5.9 GHz by the European Telecommunication Standards Institution (ETSI). Many applications have been tested and deployed in pilot programs across many cities all over the world.
CV pilot programs have played a vital role in evaluating the effectiveness and impact of the technology and understanding the effects of the applications over the safety of road users. The …
The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez
The Maritime Domain Awareness Center– A Human-Centered Design Approach, Gary Gomez
Political Science & Geography Faculty Publications
This paper contends that Maritime Domain Awareness Center (MDAC) design should be a holistic approach integrating established knowledge about human factors, decision making, cognitive tasks, complexity science, and human information interaction. The design effort should not be primarily a technology effort that focuses on computer screens, information feeds, display technologies, or user interfaces. The existence of a room with access to vast amounts of information and wall-to-wall video screens of ships, aircraft, weather data, and other regional information does not necessarily correlate to possessing situation awareness. Fundamental principles of human-centered information design should guide MDAC design and technology selection, and …
Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara
Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara
Journal of Digital Forensics, Security and Law
Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are designed on internet banking(e-banking) and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, real phishing attack studies are essential to study and analyze the attackers’ attack techniques and strategies. This study focused …
Efficient Server-Aided Secure Two-Party Computation In Heterogeneous Mobile Cloud Computing, Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe L. Jiang, Qian Chen, Peng Xu
Efficient Server-Aided Secure Two-Party Computation In Heterogeneous Mobile Cloud Computing, Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe L. Jiang, Qian Chen, Peng Xu
Research Collection School Of Computing and Information Systems
With the ubiquity of mobile devices and rapid development of cloud computing, mobile cloud computing (MCC) has been considered as an essential computation setting to support complicated, scalable and flexible mobile applications by overcoming the physical limitations of mobile devices with the aid of cloud. In the MCC setting, since many mobile applications (e.g., map apps) interacting with cloud server and application server need to perform computation with the private data of users, it is important to realize secure computation for MCC. In this article, we propose an efficient server-aided secure two-party computation (2PC) protocol for MCC. This is the …
Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen
Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen
Cybersecurity Undergraduate Research Showcase
An existing StudentLife Study mobile dataset was evaluated and organized to be applied to different machine learning methods. Different variables like user activity, exercise, sleep, study space, social, and stress levels are optimized to train a model that could predict user stress level. The different machine learning methods would test if both patient data privacy and training efficiency can be ensured.
Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett
Cybersecurity Maturity Model Certification (Cmmc) Compliance For Dod Contractors, Sierra Burnett
Cybersecurity Undergraduate Research Showcase
The DoD is currently taking a supply-chain risk management strategy to foster cybersecurity. This unique strategy is often referred to as CMMC which stands for “Cybersecurity Maturity Model Certification”. The approach requires that all the 300,000 DoD contractors acquire third-party authentication that may attain the requirements for the CMMC maturity level suitable to the work they desire to do for the DoD. CMMC typically examines the organization's capability to safeguard Federal Contract Information as well as CUI. It integrates various cybersecurity standards already in place and plots the best practices alongside processes to five maturity levels that range from the …
Development Of Sensor, Sensory System And Signal Processing Algorithm For Intelligent Sensing Applications, Xingzhe Zhang
Development Of Sensor, Sensory System And Signal Processing Algorithm For Intelligent Sensing Applications, Xingzhe Zhang
Dissertations
Sensors have been receiving significant attention in the last decade and the demand for sensory systems has increased in recent years due to the rapid growth in the field of artificial intelligence (AI). Sensors can improve people’s awareness by providing them with real-time information on the environment and their immediate health conditions. This dissertation presents the fulfilment of three main projects and focuses on the development of a sensor, a sensory system, and a sensor signal recognition system for AI applications by employing printed electronics, analog circuit design, and digital signal processing techniques.
In the first project, a multi-channel stethograph …
Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson
Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson
Faculty Publications
Safety is a simple concept but an abstract task, specifically with aircraft. One critical safety system, the Traffic Collision Avoidance System II (TCAS), protects against mid-air collisions by predicting the course of other aircraft, determining the possibility of collision, and issuing a resolution advisory for avoidance. Previous research to identify vulnerabilities associated with TCAS’s communication processes discovered that a false injection attack presents the most comprehensive risk to veritable trust in TCAS, allowing for a mid-air collision. This research explores the viability of successfully executing a false injection attack against a target aircraft, triggering a resolution advisory. Monetary constraints precluded …
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …
Enabling Declarative And Scalable Prescriptive Analytics In Relational Data, Matteo Brucato
Enabling Declarative And Scalable Prescriptive Analytics In Relational Data, Matteo Brucato
Doctoral Dissertations
Constrained optimization problems are at the heart of significant applications in a broad range of domains, including finance, transportation, manufacturing, and healthcare. They are often found at the final step of business analytics, namely prescriptive analytics, to allow businesses to transform a rich understanding of data, typically provided by advanced predictive models, into actionable decisions. Modeling and solving these problems has relied on application-specific solutions, which are often complex, error-prone, and do not generalize. Our goal is to create a domain-independent, declarative approach, supported and powered by the system where the data relevant to these problems typically resides: the database. …
Fixed-Time Event-Triggered Formation Control For Multiple Uavs, Ye Shuai, Guoping Jiang, Yingjiang Zhou, Liu Shang
Fixed-Time Event-Triggered Formation Control For Multiple Uavs, Ye Shuai, Guoping Jiang, Yingjiang Zhou, Liu Shang
Journal of System Simulation
Abstract: To solve the quadrotor UAV formation control problem, an event-triggered fixed time formation control algorithm of multi quadrotor UAV system is studied. For the attitude loop control problem of UAV, the switching fixed time sliding surface is selected to make the system reach the equilibrium point in a fixed time when the system state is on the sliding surface. A fixed-time sliding mode controller is designed so that the system state which is not on the sliding surface can reach the sliding surface within a fixed time. In view of the position loop control problem of UAV, the event-driven …
Scheduling Optimization Research Based On Tabu Algorithm For Uncertainty Carrier Aircraft Support, Yangkai Meng, Wang Zheng, Jiali Fan
Scheduling Optimization Research Based On Tabu Algorithm For Uncertainty Carrier Aircraft Support, Yangkai Meng, Wang Zheng, Jiali Fan
Journal of System Simulation
Abstract: In order to improve the scheduling stability of ship-borne and reduce the uncertainty risk during the operation, the deck scheduling mathematical model is designed. For the refueling uncertainty, the equipment failure distribution function is established, and the research method of guarantee operation risk factor value and fault opportunity influence factor is proposed. The uncertainty target function calculation model is derived and solved using the improved taboo algorithm to obtain the scheduling optimization scheme. Simulation experimental results verify the effectiveness and feasibility of the proposed research method.
Three-Dimensional Visual Dynamic Simulation Of Rice Leaf Cells, Deheng Zhao, Yingding Zhao, Hongyun Yang, Wenlong Yi
Three-Dimensional Visual Dynamic Simulation Of Rice Leaf Cells, Deheng Zhao, Yingding Zhao, Hongyun Yang, Wenlong Yi
Journal of System Simulation
Abstract: To explore the evolution process of rice leaf cell morphology with the help of computer visualization technology, it is necessary to establish the biomechanical relationship between the cell geometry model and its deformation. A dynamic simulation method is proposed for the 3D visualization of leaf cells based on the physical-mechanical properties, in which the cytoskeleton topology is represented by a "half-edge" data structure, and the surface geometries are constructed using a bicubic Bézier surface. The control parameters of a deformed surface are determined through "vertex", "edge" or "face" topological unit query algorithms of the cytoskeleton, and the cell stress-strain …
Virtual And Real Fusion Experiment Simulation Technology Based On Gesture Interaction, Xuyan Zou, Hanwu He, Yueming Wu, Jingwei Deng
Virtual And Real Fusion Experiment Simulation Technology Based On Gesture Interaction, Xuyan Zou, Hanwu He, Yueming Wu, Jingwei Deng
Journal of System Simulation
Abstract: In experimental teaching, some traditional experiments cannot be carried out due to limitations of experimental environment, experimental equipment, and faculty. In order to solve the above problems, the method of constructing virtual and real fusion simulation experiment using depth cameras is explored.. The Aruco labeling algorithm is used to achieve one-to-one registration of the virtual scene and the real scene, and the experimental environment of virtual and real fusion is constructed combining the colour images and depth images collected by the depth camera in real time. In order to achieve the purpose of operating virtual equipment, a gesture interaction …
Survey Of Evolutionary Behavior Tree Algorithm, Yang Jie, Zhang Qi, Junjie Zeng, Quanjun Yin
Survey Of Evolutionary Behavior Tree Algorithm, Yang Jie, Zhang Qi, Junjie Zeng, Quanjun Yin
Journal of System Simulation
Abstract: Evolutionary behavior tree method is an agent behavior modeling method which uses evolutionary algorithm to generate and optimize behavior tree model. Based on the background knowledge of behavior tree and evolutionary algorithm, three kinds of evolutionary behavior tree algorithms based on genetic programming, grammar evolution and hybrid algorithm as well as corresponding improved algorithms are described, and the advantages and disadvantages of different algorithms are analyzed and compared. The specific applications of evolutionary behavior tree in combat simulation, game artificial intelligence, robotics and other fields are summarized. The future development trends of evolutionary behavior tree are proposed and discussed …
Modeling And Simulation Of Channel Passage Capacity Based On Cellular Automata, Zongyang Liu, Chunhui Zhou, Junnan Zhao, Jinli Xiao, Langxiong Gan
Modeling And Simulation Of Channel Passage Capacity Based On Cellular Automata, Zongyang Liu, Chunhui Zhou, Junnan Zhao, Jinli Xiao, Langxiong Gan
Journal of System Simulation
Abstract: In order to study the passage capacity of the seaport and explore the service level of the channel, the cellular automata theory is used to discretize and model the main channel of the seaport, and the movement rules of the cell in the channel are processed in sections. In addition, this study focuses on the existence of a traffic "warning zone" in the curved channel section. The ship motion rules of the straight channel section and the curved channel section are respectively constrained, through simulation experiments, the vessel traffic flow of the channel and the maximum ship passing …
Research On The Network Of 3d Smoke Flow Super-Resolution Data Generation, Jinlian Du, Shufei Li, Xueyun Jin
Research On The Network Of 3d Smoke Flow Super-Resolution Data Generation, Jinlian Du, Shufei Li, Xueyun Jin
Journal of System Simulation
Abstract: Aiming at the problem of low data generation efficiency due to the high complexity of solving the N-S equation of smoke flow field, a deep learning model which can generate high-resolution smoke flow data based on low-resolution smoke flow data solved by N-S equation is explored and designed. Based on the Generative Adversarial Network, the smoke data reconstruction network based on the sub voxel convolution layer is constructed. Considering the fluidity of smoke, time loss based on advection step is introduced into the loss function to realize high-precision smoke simulation. By extending the image super-resolution quality evaluation index, the …
Research On Assocoation Information Mining Of Space Reconnaissance Equipment System Index, Han Chi, Xiong Wei
Research On Assocoation Information Mining Of Space Reconnaissance Equipment System Index, Han Chi, Xiong Wei
Journal of System Simulation
Abstract: The system effectiveness and system contribution rate of the Space Reconnaissance Equipment System (SRES) has a large number of mutally associated indicators. How to identify relationships the association, select the key indicators and clarify the assocition between core indicators and system contribution rate are the key of the evaluation of system effectiveness and contribution rate. Through the joint simulation of MATLAB and STK, the underlying index data of SRES is obtained. Based on the Frequent Pattern-Tree (FP-Tree) algorithm, the assocition information is discovered, the redundancy is removed and the type of indicator assocition is determined, and an optimization model …
An Equivalent Method Of Uav Simulating High-Altitude Reconnaissance Equipment Optical Imaging, Jiangang Tu, Xu Cheng, Wang Hui, Zenghui Shen
An Equivalent Method Of Uav Simulating High-Altitude Reconnaissance Equipment Optical Imaging, Jiangang Tu, Xu Cheng, Wang Hui, Zenghui Shen
Journal of System Simulation
Abstract: Aiming at the situation that the actual image of enemy reconnaissance equipment is difficult to be obtained, and the process of using similar equipment of our army is complicated and expensive in the detection of the camouflage effect of our important military targets, an equivalent detection method of using the UAV aerial photography to generate the high-altitude optical reconnaissance images is proposed. The number of pixels in the equivalent image is determined by comparing the acquisition height and the optical imaging device’s parameters of the UAV and the high-altitude reconnaissance equipment. The compressed pixel value is calculated through the …
Modeling And Simulation Of Crowd Multi-Perception Behavior Model In Closed Public Places, Ma Jun, Hu Jun
Modeling And Simulation Of Crowd Multi-Perception Behavior Model In Closed Public Places, Ma Jun, Hu Jun
Journal of System Simulation
Abstract: The social forces-based multi-agent modeling method is used to build the crowd simulation models in most of the existing crowd behavior simulation software systems. From the perspective of cognitive psychology, combined with the spatial logic model of the generalized influence of the crowd obtained by the author’s previous research, and based on the sigmoid function, the mathematical model of the individual visual and auditory perception of the crowd is constructed. Taking the typical subway transfer hall as an example, the objective function of large passenger volume evacuation optimization is established to construct the crowd evacuation simulation model. The simulation …
High Performance Simulation Method And Test Platform For Full Envelop Of Flight Vehicle, Jianlin Wang, Sufang Chen, Tie Ming, Liu Jing, Zhang Jun
High Performance Simulation Method And Test Platform For Full Envelop Of Flight Vehicle, Jianlin Wang, Sufang Chen, Tie Ming, Liu Jing, Zhang Jun
Journal of System Simulation
Abstract: In order to meet the needs of the overall performance simulation and verification of the vehicle with large subsamples and massive states, a high-performance simulation method is proposed, in which a parallel simulation architecture based on high-performance computers is established, the technologies and software such as decoupling of simulation tasks, real-time monitoring of simulation, concurrent conflict control and automatic aggregation of large-scale test results are realized, and a test platform for the large-scale parallel verification of flight performance is developed. Simulation results show that the method has high acceleration ratio and scalability, and can complete the verification efficiently, …
Research On Simulation And Optimization Of Maintenance Support Mode And Human Resources Auocation For Complex Equipment, Junhai Cao, Yiming Guo, Chuang Zhang, Qingyi Guo
Research On Simulation And Optimization Of Maintenance Support Mode And Human Resources Auocation For Complex Equipment, Junhai Cao, Yiming Guo, Chuang Zhang, Qingyi Guo
Journal of System Simulation
Abstract: Aiming at the single maintenance support mode of the army’s complex equipment and the strong randomness of human resource allocation, the military-level equipment maintenance process is taken as the research object, the complex equipment maintenance plan, maintenance support mode, human resource configuration, and maintenance process flow are analyzed. The simulation model of a complex equipment maintenance workshop is constructed, the influence of maintenance plans, maintenance support modes, and human resource allocation on indicators of “maintenance support time” and “human resource satisfaction rate” is explored, the internal laws is analyzed and the manpower optimal allocation for the maintenance of …
Optimized-Xgboost Early Warning Of Wind Turbine Generator Front Bearing Fault, Le Wei, Xiaodong Hu, Yin Shi
Optimized-Xgboost Early Warning Of Wind Turbine Generator Front Bearing Fault, Le Wei, Xiaodong Hu, Yin Shi
Journal of System Simulation
Abstract: In order to identify the abnormal running state of the generator in time, a wind turbine generator front bearing fault early warning method based on Bayesian optimized extreme gradient boosting algorithm is proposed. The historical data collected by SCADA (Supervisory Control And Data Acquisition) are preprocessed by effective data preprocessing methods. The temperature prediction model of the front bearing of wind turbine generator is constructed based on the Bayesian-optimized XGBoost (eXtreme Gradient Boosting) algorithm and the fault early warning threshold of the front bearing of the wind turbine generator is determined based on the 3σ criterion. The experimental …
Research On Path Tracking Control Strategy Of Four-Wheel Steering Intelligent Vehicle, Jingbo Zhao, Liangpeng Zhu, Chengye Liu
Research On Path Tracking Control Strategy Of Four-Wheel Steering Intelligent Vehicle, Jingbo Zhao, Liangpeng Zhu, Chengye Liu
Journal of System Simulation
Abstract: Aiming at the instability of path tracking control of intelligent vehicle at high speed, a path tracking control strategy of four-wheel steering combined with differential braking is proposed. In the upper layer, the front wheel active steering controller is designed based on the path tracking model. In the lower layer, the integrated controller of active rear steering and additional yaw moment is designed using the sliding mode control method. The additional yaw moment is transformed into the control of single wheel by designing differential braking distribution strategy. Simulation results show that the tracking accuracy of the combined control strategy …
Modeling And Simulation Of Car Following In Fog Based On Cellular Automata, Zhanhong Liu, Xiujian Yang, Xiangji Wu, Huang Zhen
Modeling And Simulation Of Car Following In Fog Based On Cellular Automata, Zhanhong Liu, Xiujian Yang, Xiangji Wu, Huang Zhen
Journal of System Simulation
Abstract: In order to ensure the safety of driving in foggy weather, a microscopic model of car following and lane changing traffic flow is established based on cellular automata. In view of the instability of car following state in foggy weather, dynamic random acceleration is introduced to segment modeling. The simulation accuracy is improved by refining cell size and cell step size and adding position update allowance. The relationship curves of speed and vehicle dispersion with time and the speed density diagram are obtained. The results show that: the vehicle speed fluctuates greatly in medium fog; the dispersion …
Research On Simulation Data Mapping For Production Performance Digital Twin, Junfeng Wang, Yufan Zhang, Yaoqi Shao, Shiqi Li
Research On Simulation Data Mapping For Production Performance Digital Twin, Junfeng Wang, Yufan Zhang, Yaoqi Shao, Shiqi Li
Journal of System Simulation
Abstract: To fully use the real-time data of the physical workshop to realize the accurate mapping of the data to the virtual workshop and drive the simulation and optimization of the manufacturing system, a data mapping method for the digital twin simulation of production performance is proposed. The fusion process of simulation data and production logic model is analyzed from the aspects of simulation data modeling, storage and updating. Focusing on the production performance simulation requirements, the redundancy analysis, outlier analysis and elimination, statistics and fitting of the original production site sample data is preprocessed. The real-time mapping update process …
Simulation Of Civil Aircraft Takeoff Scenario Based On Mbse, Liangyu Zhao, Junjie Ye, He Qi, Guo Wei, Zhao Yong
Simulation Of Civil Aircraft Takeoff Scenario Based On Mbse, Liangyu Zhao, Junjie Ye, He Qi, Guo Wei, Zhao Yong
Journal of System Simulation
Abstract: Aiming at the interactions and flaws of design being difficult to be fully discovered, the requirements being hard to be traced, the early verification of system design being difficult to be realized and so on, a Model-Based System Engineering (MBSE) method is adopted to realize the simulation of civil aircraft take-off scenario. Based on the analysis of civil aircraft takeoff scenario requirements, the civil aircraft takeoff scenario simulation architecture, take-off scenario discrete logic model, and continuous physical simulation model are established. The method of fusing the SysML model and Simulink model and the 3D visualization of simulation data …
Constructing Frameworks For Task-Optimized Visualizations, Ghulam Jilani Abdul Rahim Quadri
Constructing Frameworks For Task-Optimized Visualizations, Ghulam Jilani Abdul Rahim Quadri
USF Tampa Graduate Theses and Dissertations
Visualization is crucial in today’s data-driven world to augment and enhance human understanding and decision-making. Effective visualizations must support accuracy in visual task performance and expressive data communication. Effective visualization design depends on the visual channels used, chart types, or visual tasks. However, design choices and visual judgment are co-related, and effectiveness is not one-dimensional, leading to a significant need to understand the intersection of these factors to create optimized visualizations. Hence, constructing frameworks that consider both design decisions and the task being performed enables optimizing visualization design to maximize efficacy. This dissertation describes experiments, techniques, and user studies to …
Research On Experimental Method Of Joint Operation Simulation Based On Human-Machine Hybrid Intelligence, Ma Jun, Jingyu Yang, Wu Xi
Research On Experimental Method Of Joint Operation Simulation Based On Human-Machine Hybrid Intelligence, Ma Jun, Jingyu Yang, Wu Xi
Journal of System Simulation
Abstract: In view of the difficulties that the joint operation simulation experiment methods are mainly for guiding equipment evaluation and demonstration, which is difficult to effectively support the research of operation problems, a joint operation simulation experiment method based on human-machine hybrid intelligence is proposed. The classification, generation and accumulation process of the knowledge in joint operation simulation experiment are clarified. Through the detailed descriptions of experimental interaction process, experimental operation process, experimental driving mode, simulation operation mode, supporting system structure, etc., a joint operation simulation experiment framework based on man-machine hybrid intelligence is constructed. It provides a new method …
Reusability Analysis And Application For Complex System Simulation Model, Zhu Feng, Yiping Yao, Wenjie Tang, Li Jin
Reusability Analysis And Application For Complex System Simulation Model, Zhu Feng, Yiping Yao, Wenjie Tang, Li Jin
Journal of System Simulation
Abstract: Model reuse is an important way to improve the development efficiency of complex system simulation application. At present, there are few researches on the reusability of simulation model and its impact on the development efficiency of complex system simulation application integration by using qualitative/quantitative methods. A simulation model reusability analysis method is proposed. By introducing the simulation application integration development speedup ratio, the simulation model reusability analysis mathematical model is constructed, and the requirements of model interface, model testing and information description for improving model reusability are analyzed qualitatively. Through two typical case studies, the influence of reusable simulation …