Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

2023

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 456

Full-Text Articles in Physical Sciences and Mathematics

Research On 3d Object Detection Method With Cross-Module Attention, Renjie Xu, Xiaoming Zhang, Chen Wang, Peng Wu Dec 2023

Research On 3d Object Detection Method With Cross-Module Attention, Renjie Xu, Xiaoming Zhang, Chen Wang, Peng Wu

Journal of System Simulation

Abstract: To address the issue of feature loss that occurs during the extraction and transmission of target features in 3D object detection tasks using point cloud data, this study proposes an object detection method based on cross-module attention. This method incorporates a channel attention module and a spatial attention module to enhance the crucial feature information. Through feature transformation, the features from different stages of the attention module are connected to mitigate the loss of features during the extraction and transmission process. To tackle the problem of inadequate detection performance in target detection networks for objects of different scales, a …


Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin Dec 2023

Reliable Emergency Rescue Model Of Uavs Based On Blockchain, Mengyao Du, Kai Xu, Miao Zhang, Xiang Fu, Quanjun Yin

Journal of System Simulation

Abstract: Natural disasters may unpredictably disrupt ground communication infrastructure and transportation systems, and UAVs emergency response can deal with such uncertainties and highly dynamic scenarios. Aiming at the robustness requirements of decentralized rescue systems. UAV emergency rescue chain (UERChain) based on blockchain technology is proposed. By deploying UAV backbone nodes within a layered local network, the smart contracts for managing reputation considering UAV social relationships are designed. The blockchain is employed as a trust mechanism to realize the trustworthy interactions among distributed UAVs. Experimental results show that, UERChain has higher robustness, and within controllable resource constraints, the reputation management and …


Automatic Target Recognition Of Substation 3d Scene For Digital Twin, Qian Tu, Jun Li, Dongliang Fan, Qi Kong, Jie Shen Dec 2023

Automatic Target Recognition Of Substation 3d Scene For Digital Twin, Qian Tu, Jun Li, Dongliang Fan, Qi Kong, Jie Shen

Journal of System Simulation

Abstract: In order to improve the accuracy of automatic target recognition and promote the effect on substation operation and maintenance, automatic target recognition of substation 3D scene for digital twin is proposed. The automatic target recognition model for the three dimensional scene of the substation is constructed. The perception module of the model is used to collect the real-time status data of substation, and the communication module is used to transmit the data to digital twin modules. This module, based on the received data information, realizes the deep fusion and panoramic mapping of substation information through the knowledge base constructed …


Application Of Improved Path Tracking Algorithm In Robot Slam, Qian Li, Ye Tao, Hui Li Dec 2023

Application Of Improved Path Tracking Algorithm In Robot Slam, Qian Li, Ye Tao, Hui Li

Journal of System Simulation

Abstract: Mapping is an important part of automated logistics. At present, SLAM is widely used. However, in large-scale scenes, errors are accumulated because robots often repeatedly measure and scan the region edge, which makes it impossible to quickly build a high-precision and complete map. An autonomous mapping method based on auxiliary path tracking is proposed, in which the given initial sketch is grid denoised and the auxiliary path is fitted and improved by multi segment cubic polynomial. The improved pure pursuit algorithm is used to guide the robot to build the map and improve the total distance and time of …


Simulation On High-Speed Train Carriage Evacuation Considering Passengers Moving To Adjacent Carriages, Zuoan Hu, Tian Zeng, Yidong Wei, Yi Ma Dec 2023

Simulation On High-Speed Train Carriage Evacuation Considering Passengers Moving To Adjacent Carriages, Zuoan Hu, Tian Zeng, Yidong Wei, Yi Ma

Journal of System Simulation

Abstract: To study the influence of passengers moving to adjacent carriages on high-speed train carriages' evacuation, a cellular automata model considering export selection is established. Taking the CR400BF second-class carriage as the research object, some analytical indexes such as evacuation efficiency, number of conflicts and the congestion degree are used to study the effect of passengers moving to adjacent carriages on carriage evacuation, and the passenger seat distribution, the number of passengers transferred from adjacent carriages and the opening door modes of adjacent carriages are discussed. The simulation results show that the discretized seat distribution reduces the times of conflicts …


Development Of Several Typical Virtual Reality Fusion Technologies, Qiqi Feng, Zhiming Dong, Wencheng Peng, Yi Dai, Bingshan Si Dec 2023

Development Of Several Typical Virtual Reality Fusion Technologies, Qiqi Feng, Zhiming Dong, Wencheng Peng, Yi Dai, Bingshan Si

Journal of System Simulation

Abstract: Virtual reality fusion can realize the two-way interaction, mapping and linkage between virtual world and physical world, which attracts the attention of countries in the world. In order to sort out and make statistics on concept connotation, academic status and application of the related new technologies, digital twin, cyber-physical systems, metaverse and live-virtual-constructive simulation are taken as representatives. The comparison on the development process, functional characteristics, target trends, etc. is carried out.


Urban Uav Path Planning Based On Improved Beetle Search Algorithm, Qingqing Yang, Minyi Deng, Yi Peng Dec 2023

Urban Uav Path Planning Based On Improved Beetle Search Algorithm, Qingqing Yang, Minyi Deng, Yi Peng

Journal of System Simulation

Abstract: An improved SABAS is proposed to improve the safety and path smoothing of UAV missions in urban multi-obstacle environments and to obtain the shortest path. The algorithm no longer completely depends on the difference of odor concentration between the left and the right tentacles of beetle when exploring the path for position update. Instead, it makes full use of the strong searching ability of BAS algorithm, and introduces the annealing algorithm to add the neighborhood position solution of the next position, and finally selects the next best position from the neighborhood position solution. Metropolis criterion of annealing algorithm is …


Airport Operational Efficiency Evaluation Based On Combined Weighting-Topsis Model, Jie Hu, Fan Bao Dec 2023

Airport Operational Efficiency Evaluation Based On Combined Weighting-Topsis Model, Jie Hu, Fan Bao

Journal of System Simulation

Abstract: In order to improve the scientificity and comprehensiveness of the airport operational efficiency evaluation, a new method based on the combined weighting-TOPSIS model is proposed. From 4 dimensions of stand operational efficiency, passenger boarding efficiency, aircraft taxiing efficiency, and coordination efficiency, a new airport operational efficiency evaluation system consisting of 11 indicators, such as flight approach rate, corridor bridge turnover rate, stand change ratio, etc., are constructed. G1 method and entropy weight method are implemented respectively to calculate the subjective and objective weights of the evaluation indicators, and the combined weights are calculated by minimizing the deviation of subjective …


Research And Design Of Etc Simulation Platform For Expressway, Fumin Zou, Feng Guo, Sijie Luo, Lüchao Liao, Nan Li, Yue Xing Dec 2023

Research And Design Of Etc Simulation Platform For Expressway, Fumin Zou, Feng Guo, Sijie Luo, Lüchao Liao, Nan Li, Yue Xing

Journal of System Simulation

Abstract: It is difficult to quantitatively calculate and display the real-time traffic situation of expressway ETC system, and there is no simulation system for ETC to optimize the operating situation. A simulation system based on ETC data in proposed, in witch there are three key algorithms. ETC data feature extraction algorithm provides the feature of generating simulation data for the simulation platform. The improved multitask scheduling algorithm has the computing ability of multitasks in simulation environment. The algorithm of expressway traffic flow control strategy provides the decision index for traffic flow control on the way. The experimental results show that …


Research On Digital Twin Data Modeling And Evaluation Method Of Automated Container Terminal, Guoxuan Xu, Daofang Chang, Jiaqi Li, Qiang Ling Dec 2023

Research On Digital Twin Data Modeling And Evaluation Method Of Automated Container Terminal, Guoxuan Xu, Daofang Chang, Jiaqi Li, Qiang Ling

Journal of System Simulation

Abstract: To make full use of the massive operation data of automated container terminals and further realize the digital and intelligent transformation of terminals driven by digital twin, a method for digital twin data modeling and effect verification and evaluation of automated container terminals is proposed. The application framework and operation mechanism based on digital twin are studied. Based on the data processing logic of digital twin framework, a method of terminal operation process evolution and dynamic data modeling based on digital twin is proposed. To verify whether the data could meet the effective operation of the digital twin, a …


Optimized Scheduling Of Distribution Network With Distributed Generation Based On Coronavirus Herd Immunity Optimizer Algorithm, Xiaomeng Wu, Rongze Yuan, Yingliang Li, Qi Zhu Dec 2023

Optimized Scheduling Of Distribution Network With Distributed Generation Based On Coronavirus Herd Immunity Optimizer Algorithm, Xiaomeng Wu, Rongze Yuan, Yingliang Li, Qi Zhu

Journal of System Simulation

Abstract: Following the large-scale entry of distributed new energy into the network, the uncertainty factor of the distribution network increases significantly, and the difficulty of reactive power optimization scheduling increases accordingly. Traditional optimization solutions have many limitations and shortcomings, and a dynamic reactive power optimization scheme for active distribution networks based on a multi-scenario approach is proposed. The mathematical modeling is carried out separately for the uncertainty of new energy and load, and the multi-scenario method is used to transform the uncertainty problem into a deterministic problem. A mathematical model is constructed on the distribution network side to pursue the …


Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia Dec 2023

Reducing Food Scarcity: The Benefits Of Urban Farming, S.A. Claudell, Emilio Mejia

Journal of Nonprofit Innovation

Urban farming can enhance the lives of communities and help reduce food scarcity. This paper presents a conceptual prototype of an efficient urban farming community that can be scaled for a single apartment building or an entire community across all global geoeconomics regions, including densely populated cities and rural, developing towns and communities. When deployed in coordination with smart crop choices, local farm support, and efficient transportation then the result isn’t just sustainability, but also increasing fresh produce accessibility, optimizing nutritional value, eliminating the use of ‘forever chemicals’, reducing transportation costs, and fostering global environmental benefits.

Imagine Doris, who is …


Data Simulation Testing Framework For Complex Process Equipment Software, Jinkun Zhang, Longfei Shi, Chi Hu, Hao Zhang, Yonghui Yang Dec 2023

Data Simulation Testing Framework For Complex Process Equipment Software, Jinkun Zhang, Longfei Shi, Chi Hu, Hao Zhang, Yonghui Yang

Journal of System Simulation

Abstract: Due to the complex task, tight coupling, strict timing, and a large amount of interchange data, the technical threshold of automated testing of bus communication equipment software is high, and the implementation is difficult. The ideas of data-driven testing and keyword-driven testing are introduced, and a data simulation testing framework is proposed. Configuration rules are formulated and implemented in the framework. Testers can simulate peripheral data for complex process equipment software and implement automated testing by only focusing on the task analysis, and configuring interchange data and keywords. There is no need to develop test scripts, which reduces the …


Task Scheduling For Internet Of Vehicles Based On Deep Reinforcement Learning In Edge Computing, Xiang Ju, Shengchao Su, Chaojie Xu, Beibei He Dec 2023

Task Scheduling For Internet Of Vehicles Based On Deep Reinforcement Learning In Edge Computing, Xiang Ju, Shengchao Su, Chaojie Xu, Beibei He

Journal of System Simulation

Abstract: Aiming at the offloading and execution of delay-constrained computing tasks for internet of vehicles in edge computing, a task scheduling method based on deep reinforcement learning is proposed. In multi-edge server scenario, a software-defined network-aided internet of vehicles task offloading system is built. On this basis, the task scheduling model of vehicle computation offloading is given. According to the characteristics of task scheduling, a scheduling method based on an improved pointer network is designed. Considering the complexity of task scheduling and computing resource allocation, the deep reinforcement learning algorithm is used to train the pointer network. The vehicle offloading …


Unrelated Parallel Machine Scheduling With Additional Resource And Learning Effect, Youlian Zheng, Deming Lei Dec 2023

Unrelated Parallel Machine Scheduling With Additional Resource And Learning Effect, Youlian Zheng, Deming Lei

Journal of System Simulation

Abstract: To solve unrelated parallel machine scheduling problem(UPMSP) with additional resource and learning effect, a dynamical artificial bee colony(DABC) algorithm is proposed to minimize the makespan. A new representation and decoding process is given and two initial bee swarms are constructed. A swarm evaluation method is applied to dynamically decide employed bee swarms and onlooker bee swarms. Employed bee phase and onlooker bee phase are implemented in different ways to increase exploration ability. The experimental results show that the new strategies of DABC are effective and reasonable, and can obtain results with better convergence, average value and stability, which d …


Research On Network Public Opinion Propagation Model Of Major Epidemics Under Cross-Infection Of Double Emotions, Yaming Zhang, Yanyuan Su, Guiru Zhao, Xiaoyu Guo Dec 2023

Research On Network Public Opinion Propagation Model Of Major Epidemics Under Cross-Infection Of Double Emotions, Yaming Zhang, Yanyuan Su, Guiru Zhao, Xiaoyu Guo

Journal of System Simulation

Abstract: Major epidemics provoke a variety of netizens' emotions. To some degree, the interaction of netizens' intense emotions determine the development direction of public opinion. Considering the complexity and dual emotional contagion, the impact of emotional factors in network public opinion is quantified to three dimensions indicators, emotional enhancement, differences and conversion rates. SIPINR public opinion propagation model is constructed. The equilibrium points and the transmission threshold are estimated and the stability is proved. The law of network public opinion propagation during major epidemics is revealed through numerical simulation. The results show that the dual emotional contagion would lead to …


Modeling And Simulation On Production Logistics Of Intelligent Workshop Manufacturing System Based On Efsm, Liuzhen Li, Chao Jin, Tingyu Lin, Yaoqin Zhu Dec 2023

Modeling And Simulation On Production Logistics Of Intelligent Workshop Manufacturing System Based On Efsm, Liuzhen Li, Chao Jin, Tingyu Lin, Yaoqin Zhu

Journal of System Simulation

Abstract: The production logistics mode of manufacturing industry is developing rapidly, on which the modeling and simulation can provide the decision support for the design, analysis and transformation of manufacturing system. A description of the entity elements in intelligent workshop manufacturing system is given according to the classification of "human machine material environment rule". A production and logistics componentized EFSM model is created on the basis of EFSM and componentized modeling ideas. The modeling process for multi-job production in smart shop and the component model instantiation methodology are elaborated. The simulation running through the automatic conversion of EFSM-DEVS model and …


Research And Development Of Simulation Training Platform For Multi-Agent Collaborative Decision-Making, Cheng Cheng, Zhijie Chen, Ziming Guo, Ni Li Dec 2023

Research And Development Of Simulation Training Platform For Multi-Agent Collaborative Decision-Making, Cheng Cheng, Zhijie Chen, Ziming Guo, Ni Li

Journal of System Simulation

Abstract: Reinforcement learning simulation platform can be an interactive and training environment for reinforcement learning. In order to make the simulation platform compatible with the multi-agent reinforcement learning algorithms and meet the needs of simulation in military field, the similar processes in multi-agent reinforcement learning algorithms are refined and a unified interface is designed to embed and verify different types of deep reinforcement learning algorithms on the simulation platform and to optimize the back-end service of the simulation platform to accelerate the training process of the algorithm model. The experimental results show that, by unifing the interface, the simulation platform …


Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances Dec 2023

Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances

AFIT Patents

A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …


Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman Dec 2023

Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman

Journal of Cybersecurity Education, Research and Practice

Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …


Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros Dec 2023

Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros

USF Tampa Graduate Theses and Dissertations

The human brain still has many mysteries and one of them is how it encodes information. The following study intends to unravel at least one such mechanism. For this it will be demonstrated how a set of specialized neurons may use spatial and temporal information to encode information. These neurons, called Place Cells, become active when the animal enters a place in the environment, allowing it to build a cognitive map of the environment. In a recent paper by Scleidorovich et al. in 2022, it was demonstrated that it was possible to differentiate between two sequences of activations of a …


Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros Dec 2023

Brain-Inspired Spatio-Temporal Learning With Application To Robotics, Thiago André Ferreira Medeiros

USF Tampa Graduate Theses and Dissertations

The human brain still has many mysteries and one of them is how it encodes information. The following study intends to unravel at least one such mechanism. For this it will be demonstrated how a set of specialized neurons may use spatial and temporal information to encode information. These neurons, called Place Cells, become active when the animal enters a place in the environment, allowing it to build a cognitive map of the environment. In a recent paper by Scleidorovich et al. in 2022, it was demonstrated that it was possible to differentiate between two sequences of activations of a …


Convolution And Autoencoders Applied To Nonlinear Differential Equations, Noah Borquaye Dec 2023

Convolution And Autoencoders Applied To Nonlinear Differential Equations, Noah Borquaye

Electronic Theses and Dissertations

Autoencoders, a type of artificial neural network, have gained recognition by researchers in various fields, especially machine learning due to their vast applications in data representations from inputs. Recently researchers have explored the possibility to extend the application of autoencoders to solve nonlinear differential equations. Algorithms and methods employed in an autoencoder framework include sparse identification of nonlinear dynamics (SINDy), dynamic mode decomposition (DMD), Koopman operator theory and singular value decomposition (SVD). These approaches use matrix multiplication to represent linear transformation. However, machine learning algorithms often use convolution to represent linear transformations. In our work, we modify these approaches to …


Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett Dec 2023

Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett

<strong> Theses and Dissertations </strong>

Over the last two decades, side-channel vulnerabilities have shown to be a major threat to embedded devices. Most side-channel research has developed our understanding of the vulnerabilities to cryptographic devices due to their implementation and how we can protect them. However, side-channel leakage can yield useful information about many other processes that run on the device. One promising area that has received little attention is the side-channel leakage due to the execution of assembly instructions. There has been some work in this area that has demonstrated the idea’s potential, but so far, this research has assumed the adversary has physical …


In Situ Water Sensing Systems: Research On Advancements In Environmental Monitoring, Abigail Seibel Dec 2023

In Situ Water Sensing Systems: Research On Advancements In Environmental Monitoring, Abigail Seibel

Honors Theses

In this work, two sensing systems were researched in order to improve in situ environmental monitoring. The first is a pH and Total Alkalinity sensor used to determine these characteristics of sea water. I explored the facets of this sensor over a 7-week internship with Dr. Ellen Briggs in her lab in summer of 2023. The second is a more holistic sensing system that reads temperature, turbidity, and pressure used for studying environmental characteristics of Alaskan bever ponds. Both systems were developed in close collaboration with scientists who are collecting data to better understand the impacts of climate change. Better …


Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson Dec 2023

Potential Security Vulnerabilities In Raspberry Pi Devices With Mitigation Strategies, Briana Tolleson

Cybersecurity Undergraduate Research Showcase

For this research project I used a Raspberry Pi device and conducted online research to investigate potential security vulnerabilities along with mitigation strategies. I configured the Raspberry Pi by using the proper peripherals such as an HDMI cord, a microUSB adapter that provided 5V and at least 700mA of current, a TV monitor, PiSwitch, SD Card, keyboard, and mouse. I installed the Rasbian operating system (OS). The process to install the Rasbian took about 10 minutes to boot starting at 21:08 on 10/27/2023 and ending at 21:18. 1,513 megabytes (MB) was written to the SD card running at (2.5 MB/sec). …


Integrating Ai Into Uavs, Huong Quach Dec 2023

Integrating Ai Into Uavs, Huong Quach

Cybersecurity Undergraduate Research Showcase

This research project explores the application of Deep Learning (DL) techniques, specifically Convolutional Neural Networks (CNNs), to develop a smoke detection algorithm for deployment on mobile platforms, such as drones and self-driving vehicles. The project focuses on enhancing the decision-making capabilities of these platforms in emergency response situations. The methodology involves three phases: algorithm development, algorithm implementation, and testing and optimization. The developed CNN model, based on ResNet50 architecture, is trained on a dataset of fire, smoke, and neutral images obtained from the web. The algorithm is implemented on the Jetson Nano platform to provide responsive support for first responders. …


Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike Dec 2023

Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike

Masters Theses & Specialist Projects

The Jing-Jin-Ji region of China is a highly industrialized and populated area of the country. Its periodic high pollution and smog includes particles smaller than 2.5 μm, known as PM2.5, linked to many respiratory and cardiovascular illnesses. PM2.5 concentration around Jing-Jin-Ji has exceeded China’s urban air quality safety threshold for over 20% of all days in 2017 through 2020.

The quantity of ground weather stations that measure the concentrations of these pollutants, and their valuable data, is unfortunately small. By employing many machine learning strategies, many researchers have focused on interpolating finer spatial grids of PM2.5, or hindcasting PM2.5. However, …


On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez Dec 2023

On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez

Department of Mathematics: Dissertations, Theses, and Student Research

In order to communicate information over a noisy channel, error-correcting codes can be used to ensure that small errors don’t prevent the transmission of a message. One family of codes that has been found to have good properties is low-density parity check (LDPC) codes. These are represented by sparse bipartite graphs and have low complexity graph-based decoding algorithms. Various graphical properties, such as the girth and stopping sets, influence when these algorithms might fail. Additionally, codes based on algebraically structured parity check matrices are desirable in applications due to their compact representations, practical implementation advantages, and tractable decoder performance analysis. …


Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum Dec 2023

Ensuring Non-Repudiation In Long-Distance Constrained Devices, Ethan Blum

Honors Theses

Satellite communication is essential for the exploration and study of space. Satellites allow communications with many devices and systems residing in space and on the surface of celestial bodies from ground stations on Earth. However, with the rise of Ground Station as a Service (GsaaS), the ability to efficiently send action commands to distant satellites must ensure non-repudiation such that an attacker is unable to send malicious commands to distant satellites. Distant satellites are also constrained devices and rely on limited power, meaning security on these devices is minimal. Therefore, this study attempted to propose a novel algorithm to allow …