Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 91 - 120 of 12790

Full-Text Articles in Physical Sciences and Mathematics

Prediction Of Converter Gas Generation Based On Intermission Production Improved Elman, Jiajie Fei, Dinghui Wu, Junyan Fan, Jing Wang May 2024

Prediction Of Converter Gas Generation Based On Intermission Production Improved Elman, Jiajie Fei, Dinghui Wu, Junyan Fan, Jing Wang

Journal of System Simulation

Abstract: Aiming at large fluctuations of intermission and low prediction accuracy in iron and steel industry, based on the classification of intermission characteristics, a converter gas generation predicting model(CPSO-Elman) based on Elman neural network(ENN) optimized by chaotic PSO(CPSO) algorithm is proposed. The intermittent characteristics of converter gas generation time series are extracted and raw data is classified according to intermittent duration. The PSO algorithm improved by chaotic disturbance is introduced to optimize the initial weight and threshold of ENN and inertia weight of nonlinear updating is designed to balance global search ability and local search ability. Construct the combined prediction …


Tri-Training Algorithm Based On Density Peaks Clustering, Yuhang Luo, Runxiu Wu, Zhihua Cui, Yiying Zhang, Yeshen He, Jia Zhao May 2024

Tri-Training Algorithm Based On Density Peaks Clustering, Yuhang Luo, Runxiu Wu, Zhihua Cui, Yiying Zhang, Yeshen He, Jia Zhao

Journal of System Simulation

Abstract: Tri-training can effectively improve the generalization ability of classifiers by using unlabeled data for classification, but it is prone to mislabeling unlabeled data, thus forming training noise. Tritraining (Tri-training with density peaks clustering, DPC-TT) algorithm based on density peaks clustering is proposed. The DPC-TT algorithm uses the density peaks clustering algorithm to obtain the class cluster centers and local densities of the training data, and the samples within the truncation distance of the class cluster centers are identified as the samples with better spatial structure, and these samples are labeled as the core data, and the classifier is updated …


Deep Learning Based Local Path Planning Method For Moving Robots, Zesen Liu, Sheng Bi, Chuanhong Guo, Yankui Wang, Min Dong May 2024

Deep Learning Based Local Path Planning Method For Moving Robots, Zesen Liu, Sheng Bi, Chuanhong Guo, Yankui Wang, Min Dong

Journal of System Simulation

Abstract: In order to integrate visual information into the robot navigation process, improve the robot's recognition rate of various types of obstacles, and reduce the occurrence of dangerous events, a local path planning network based on two-dimensional CNN and LSTM is designed, and a local path planning approach based on deep learning is proposed. The network uses the image from camera and the global path to generate the current steering angle required for obstacle avoidance and navigation. A simulated indoor scene is built for training and validating the network. A path evaluation method that uses the total length and the …


Path Planning Of Unmanned Delivery Vehicle Based On Improved Q-Learning Algorithm, Xiaokang Wang, Jie Ji, Yang Liu, Qing He May 2024

Path Planning Of Unmanned Delivery Vehicle Based On Improved Q-Learning Algorithm, Xiaokang Wang, Jie Ji, Yang Liu, Qing He

Journal of System Simulation

Abstract: To solve the traditional Q-learning algorithm for unmanned vehicle path planning suffers from the problems of low planning efficiency and slow convergence speed, for this reason, a path planning algorithm for unmanned delivery vehicles based on the improved Q-learning algorithm is proposed. Learning from the energy iteration principle of the simulated annealing algorithm, adjusts the greedy factor ε to make it change dynamically during the training process, so as to balance the relationship between exploration and utilization, and thus improve the planning efficiency. The reward value in the reward mechanism is changed from a discrete value to a continuous …


Research On Forest Fire Spread Simulation System Based On Osg, Lei Shao, Xiaotian Yan, Jian Liu, Yuming Liu May 2024

Research On Forest Fire Spread Simulation System Based On Osg, Lei Shao, Xiaotian Yan, Jian Liu, Yuming Liu

Journal of System Simulation

Abstract: A novel expended lattice structure of DEM-Cell model incorporating DEM elevation information is proposed, in response to the requirements of extrapolation of trends and hazards of forest fire spread, as well as the need of route selection and real-time path optimization for rescuers. Combining vegetation attributes of meta cells with geographic elevation information, we develop a simulation and fire fighting exercise system that computing the resultant data in real time and converting it into renderable resource, which is directly used by the OSG engines. With the help of the same data structure and the corresponding key algorithms and technologies, …


Research On Simulation Methods For Forest Fire Extinguishing Using Water Mist, Bing Xiang, Xiaohong Dong, Yang Li May 2024

Research On Simulation Methods For Forest Fire Extinguishing Using Water Mist, Bing Xiang, Xiaohong Dong, Yang Li

Journal of System Simulation

Abstract: As a highly hazardous natural disaster, the occurrence and spread of forest fires are usually affected by a variety of complex factors such as climate, terrain, vegetation, combustible materials, etc., which makes it difficult to accurately simulate the spread and extinguishing process of forest fires. The spread of forest fires and the process of water mist fire extinguishing are physically modele. The spread model adopts a tree module structure to simulate the pyrolysis reaction of tree burning, and considers the effects of temperature, wind field,mass loss rate and other factors on the spread of tree burning.In the fire extinguishing …


Time Slot Allocation Method Of Data Link Based On Improved Difference Algorithm, Yuting Zhu, Huankun Su, Xiaodong Feng, Shijie Lei, Yanfang Fu May 2024

Time Slot Allocation Method Of Data Link Based On Improved Difference Algorithm, Yuting Zhu, Huankun Su, Xiaodong Feng, Shijie Lei, Yanfang Fu

Journal of System Simulation

Abstract: Aiming at the problems of single algorithm, being prone to local optima, and weak generalization ability of the current strategies, based on an improved differential evolutionary algorithm, a chaos algorithm, an adaptive variational crossover algorithm, and a problem solution processing mechanism, a time slot allocation strategy is proposed. The chaos algorithm is used to initialize the population to increase the diversity and avoid the premature convergence. The selection probability parameter is then used to make the crossover and variation process more flexible, expanding the search range in early to increase the possibility of global optima in late. The experiment …


Research On Verification Method Of Missile Elastic Suppression Based On Frequency Compensation, Rixin Su, Ou Zhang May 2024

Research On Verification Method Of Missile Elastic Suppression Based On Frequency Compensation, Rixin Su, Ou Zhang

Journal of System Simulation

Abstract: For the elastic model of missile body in six degree of freedom mathematical simulation, the research on the verification method of elastic vibration suppression is carried out.. The notch filter used for elastic vibration suppression is introduced, the verification idea for filter design in boost-phase and passive-phase stages of missile flight is analyzed, and the problem currently existing in mathematical simulation verification is pointed out. Based on the frequency modulation phenomenon, an online verification method of frequency compensation for the notch filter is put forward, and it can be found that the function can be applied to any order …


Gradient-Based Deep Reinforcement Learning Interpretation Methods, Yuan Wang, Lin Xu, Xiaoze Gong, Yongliang Zhang, Yongli Wang May 2024

Gradient-Based Deep Reinforcement Learning Interpretation Methods, Yuan Wang, Lin Xu, Xiaoze Gong, Yongliang Zhang, Yongli Wang

Journal of System Simulation

Abstract: The learning process and working mechanism of deep reinforcement learning methods such as DQN are not transparent, and their decision basis and reliability cannot be perceived, which makes the decisions made by the model highly questionable and greatly limits the application scenarios of deep reinforcement learning. To explain the decision-making mechanism of intelligent agents, this paper proposes a gradient based saliency map generation algorithm SMGG. It uses the gradient information of feature maps generated by high-level convolutional layers to calculate the importance of different feature maps. With the known structure and internal parameters of the model, starting from the …


Implementation And Numerical Simulation On Object-Oriented Elastic-Plastic Finite Element Method Based On Python, Henghui Li, Yingxiong Xiao May 2024

Implementation And Numerical Simulation On Object-Oriented Elastic-Plastic Finite Element Method Based On Python, Henghui Li, Yingxiong Xiao

Journal of System Simulation

Abstract: With the continuous expansion of the application fields of finite element methods, higher requirements are put forward for the scalability of finite element methods. In order to overcome the defects of the traditional finite element methods, a simple and easily extensible object-oriented elasticplastic finite element program framework is proposed based on Python. Combined with the characteristics of Python, we design some finite element classes such as the pre-processing class, the post-processing class, the linear solution class, the stress integration class and the analysis class. By applying the resulting framework to several typical elastic-plastic mechanical problems and comparing the results …


Hierarchical Guided Enhanced Multi-Objective Firefly Algorithm, Jia Zhao, Zhizhen Lai, Runxiu Wu, Zhihua Cui, Hui Wang May 2024

Hierarchical Guided Enhanced Multi-Objective Firefly Algorithm, Jia Zhao, Zhizhen Lai, Runxiu Wu, Zhihua Cui, Hui Wang

Journal of System Simulation

Abstract: The multi-objective firefly algorithm is easy to produce oscillation and aggregation phenomenon in the solution process, which leads to weak development ability and poor solution accuracy. This paper proposes a hierarchical guided enhanced multi-objective firefly algorithm (HGEMOFA). HGEMOFA builds a hierarchical guidance model, uses non-dominated sorting to obtain different levels of individuals. The individuals in the dominant layer are used to guide the evolution of the individuals in the inferior layer, the guidance direction is clear, the oscillation in the evolution process is solved, the aggregation phenomenon is reduced, and the convergence of the algorithm is enhanced. The Lévy …


Toward Intuitive 3d Interactions In Virtual Reality: A Deep Learning- Based Dual-Hand Gesture Recognition Approach, Trudi Di Qi, Franceli L. Cibrian, Meghna Raswan, Tyler Kay, Hector M. Camarillo-Abad, Yuxin Wen May 2024

Toward Intuitive 3d Interactions In Virtual Reality: A Deep Learning- Based Dual-Hand Gesture Recognition Approach, Trudi Di Qi, Franceli L. Cibrian, Meghna Raswan, Tyler Kay, Hector M. Camarillo-Abad, Yuxin Wen

Engineering Faculty Articles and Research

Dual-hand gesture recognition is crucial for intuitive 3D interactions in virtual reality (VR), allowing the user to interact with virtual objects naturally through gestures using both handheld controllers. While deep learning and sensor-based technology have proven effective in recognizing single-hand gestures for 3D interactions, research on dual-hand gesture recognition for VR interactions is still underexplored. In this work, we introduce CWT-CNN-TCN, a novel deep learning model that combines a 2D Convolution Neural Network (CNN) with Continuous Wavelet Transformation (CWT) and a Temporal Convolution Network (TCN). This model can simultaneously extract features from the time-frequency domain and capture long-term dependencies using …


Planetary Exploration Via Fully Automatic Topological Structure Extraction Using Adaptive Resonance, Jonathan Kissi May 2024

Planetary Exploration Via Fully Automatic Topological Structure Extraction Using Adaptive Resonance, Jonathan Kissi

Electronic Thesis and Dissertation Repository

Renewed interest in Solar System exploration, along with ongoing improvements in computing, robotics and instrumentation technologies, have reinforced the case for remote science acquisition systems development in space exploration. Testing systems and procedures that allow for autonomously collected science has been the focus of analogue field deployments and mission planning for some time, with such systems becoming more relevant as missions increase in complexity and ambition. The introduction of lidar and laser scanning-type instruments into the geological and planetary sciences has proven popular, and, just as with the established image and photogrammetric methods, has found widespread use in several research …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko May 2024

Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Deep Neural Networks (DNNs) have become a popular instrument for solving various real-world problems. DNNs’ sophisticated structure allows them to learn complex representations and features. However, architecture specifics and floating-point number usage result in increased computational operations complexity. For this reason, a more lightweight type of neural networks is widely used when it comes to edge devices, such as microcomputers or microcontrollers – Binary Neural Networks (BNNs). Like other DNNs, BNNs are vulnerable to adversarial attacks; even a small perturbation to the input set may lead to an errant output. Unfortunately, only a few approaches have been proposed for verifying …


Detection Of Deficiencies And Data Analysis Of Bridge Members With Deep Convolutional Neural Networks, Bennett Jackson May 2024

Detection Of Deficiencies And Data Analysis Of Bridge Members With Deep Convolutional Neural Networks, Bennett Jackson

Department of Civil and Environmental Engineering: Dissertations, Theses, and Student Research

Concrete cracks and structural steel corrosion are two of the most common defects in bridges. Quantifying and classifying these defects provide bridge inspectors and engineers with valuable data for assessing deterioration levels. However, the bridge inspection process is typically a subjective, time intensive, and tedious task, as defects can be overlooked or in locations not easily accessible. Previous studies have investigated deep learning-based inspection methods, implementing popular models such as Mask R-CNN and U-Net. The architectures of these models offer certain advantages depending on the required task. This thesis aims to evaluate and compare Mask R-CNN and U-Net regarding their …


From Bits To Beds: Design And Implementation Of A Hotel Booking System A Coding Project, Alexa Gilman May 2024

From Bits To Beds: Design And Implementation Of A Hotel Booking System A Coding Project, Alexa Gilman

University Honors College

This thesis presents a comprehensive hotel booking system designed and implemented to showcase the transition "From Bits to Beds". There are two main motivations behind this project: firstly, to provide users with a user-friendly and efficient platform for booking accommodations. Secondly, it serves as a great learning opportunity, providing hands-on practice with coding, collaboration with teammates, and exposure to real-world challenges. The system utilizes technologies such as JavaScript, Express.js, and HTML/CSS to offer features like browsing hotels, filtering options, user authentication, and booking management. The implementation of this project demonstrates a successful integration of backend and frontend components, ensuring reliability …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Poster Presentations

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Vr Circuit Simulation With Advanced Visualization For Enhancing Comprehension In Electrical Engineering, Elliott Wolbach May 2024

Vr Circuit Simulation With Advanced Visualization For Enhancing Comprehension In Electrical Engineering, Elliott Wolbach

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

As technology advances, the field of electrical and computer engineering continuously demands innovative tools and methodologies to facilitate effective learning and comprehension of fundamental concepts. Through a comprehensive literature review, it was discovered that there was a gap in the current research on using VR technology to effectively visualize and comprehend non-observable electrical characteristics of electronic circuits. This thesis explores the integration of Virtual Reality (VR) technology and real-time electronic circuit simulation with enhanced visualization of non-observable concepts such as voltage distribution and current flow within these circuits. The primary objective is to develop an immersive educational platform that makes …


Sliding Markov Decision Processes For Dynamic Task Planning On Uncrewed Aerial Vehicles, Trent Wiens May 2024

Sliding Markov Decision Processes For Dynamic Task Planning On Uncrewed Aerial Vehicles, Trent Wiens

Department of Mechanical and Materials Engineering: Dissertations, Theses, and Student Research

Mission and flight planning problems for uncrewed aircraft systems (UASs) are typically large and complex in space and computational requirements. With enough time and computing resources, some of these problems may be solvable offline and then executed during flight. In dynamic or uncertain environments, however, the mission may require online adaptation and replanning. In this work, we will discuss methods of creating MDPs for online applications, and a method of using a sliding resolution and receding horizon approach to build and solve Markov Decision Processes (MDPs) in practical planing applications for UASs. In this strategy, called a Sliding Markov Decision …


Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman May 2024

Bidding Strategy For A Wind Power Producer In Us Energy And Reserve Markets, Anne Stratman

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Wind power is one of the world's fastest-growing renewable energy resources and has expanded quickly within the US electric grid. Currently, wind power producers (WPPs) may sell energy products in US markets but are not allowed to sell reserve products, due to the uncertain and intermittent nature of wind power. However, as wind’s share of the power supply grows, it may eventually be necessary for WPPs to contribute to system-wide reserves. This paper proposes a stochastic optimization model to determine the optimal offer strategy for a WPP that participates in the day-ahead and real-time energy and spinning reserve markets. The …


Navigate The World Of Rfid: Diversity, Capabilities, And Constraints Of Readers And Tags, Rachana Pandey May 2024

Navigate The World Of Rfid: Diversity, Capabilities, And Constraints Of Readers And Tags, Rachana Pandey

2024 Spring Honors Capstone Projects

Radio-Frequency Identification (RFID) technology, a method for storing and retrieving data through electromagnetic transmission to an RFID tag, is revolutionizing inventory and asset management in various sectors, including healthcare. This research explores the applications of RFID in a medical setting. It assesses various RFID readers and tags, focusing on their functional capabilities, ranges, and limitations within a medical environment. Employing a comprehensive approach, the study integrates an extensive literature review, comparative analysis, and empirical data from both experimental simulations and real-world healthcare scenarios. The aim is to identify RFID solutions that optimize surgical equipment management, thereby enhancing both operational efficiency …


Non-Vacuous Generalization Bounds For Adversarial Risk In Stochastic Neural Networks, Mustafa Waleed, Liznerski Philipp, Antoine Ledent, Wagner Dennis, Wang Puyu, Kloft Marius May 2024

Non-Vacuous Generalization Bounds For Adversarial Risk In Stochastic Neural Networks, Mustafa Waleed, Liznerski Philipp, Antoine Ledent, Wagner Dennis, Wang Puyu, Kloft Marius

Research Collection School Of Computing and Information Systems

Adversarial examples are manipulated samples used to deceive machine learning models, posing a serious threat in safety-critical applications. Existing safety certificates for machine learning models are limited to individual input examples, failing to capture generalization to unseen data. To address this limitation, we propose novel generalization bounds based on the PAC-Bayesian and randomized smoothing frameworks, providing certificates that predict the model’s performance and robustness on unseen test samples based solely on the training data. We present an effective procedure to train and compute the first non-vacuous generalization bounds for neural networks in adversarial settings. Experimental results on the widely recognized …


Multithreaded Applications On The Heterogeneous Research Computing Environment., Sungbo Jung May 2024

Multithreaded Applications On The Heterogeneous Research Computing Environment., Sungbo Jung

Electronic Theses and Dissertations

Bioinformatics is a domain that has experienced rapid research growth in recent years, as evidenced by the increasing number of articles in biomedical databases such as PubMed, which adds over a million publications every year. However, this also poses a challenge for researchers who need to find relevant citations for their work. Therefore, developing efficient indexing and searching methods for text data is crucial for Bioinformatics. One key technique for information retrieval is document inversion, which involves creating an inverted index to enable efficient searching through vast collections of text or documents. This Ph.D. research aims to design the research …


Mapping Arbitrary Spiking Neural Networks To The Ravens Neuroprocessor, Jongheon Park May 2024

Mapping Arbitrary Spiking Neural Networks To The Ravens Neuroprocessor, Jongheon Park

Masters Theses

In neuromorphic computing, a hardware implementation of a spiking neural network is used to provide improved speed and power efficiency over simulations of the networks on a traditional Von Neumann architecture. These hardware implementations employ bio-inspired architecture usually consisting of artificial neurons and synapses implemented in either analog, digital, or mixed-signal circuits. Since these hardware spiking neural networks are designed to support arbitrary networks under the constraints imposed by the available hardware resource, they have to be programmed by off-chip software with awareness of those constraints. The TENNLab research group at the University of Tennessee, Knoxville has recently developed the …


Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark May 2024

Side Channel Detection Of Pc Rootkits Using Nonlinear Phase Space, Rebecca Clark

Honors Theses

Cyberattacks are increasing in size and scope yearly, and the most effective and common means of attack is through malicious software executed on target devices of interest. Malware threats vary widely in terms of behavior and impact and, thus, effective methods of detection are constantly being sought from the academic research community to offset both volume and complexity. Rootkits are malware that represent a highly feared threat because they can change operating system integrity and alter otherwise normally functioning software. Although normal methods of detection that are based on signatures of known malware code are the standard line of defense, …


Determining The Viability Of Marine Sensor Construction, Roman Sequeira May 2024

Determining The Viability Of Marine Sensor Construction, Roman Sequeira

Honors College

I intend to determine the viability of building a sensor that can be deployed in marine environments. Viability is defined as a summary of economic affordability, practicality of construction and deployment, knowledge required, and effectiveness. In order to get the best results, our sensor must be able to be modified to suit individual circumstances, constructed out of easy to obtain materials, be robust enough to withstand less than lab grade environments, and most importantly function well enough to be worth the effort of building it. I have built a sensor using the cheapest and most widely available options available. It …


Experiment Development And Validation Of A Granular Jamming Robotic Gripper, Jacob R. Dowd May 2024

Experiment Development And Validation Of A Granular Jamming Robotic Gripper, Jacob R. Dowd

UNLV Theses, Dissertations, Professional Papers, and Capstones

A granular jamming gripper (GJG) is widely known as a Universal Gripper because of the wide range of objects that it can grasp and the simplicity of control, design, and manufacturing. Despite multitude of research improving the GJG, here, we focus on the base version of the GJG and attempt to glean the range of objects that it may reliably grasp. Despite the limited range of objects, which were a sphere, rectangular prism, and cylinder, we gleaned geometric properties as it relates to successful and unsuccessful grasping. This was based on the two types of testing: push and pull testing …


Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre Apr 2024

Data Engineering: Building Software Efficiency In Medium To Large Organizations, Alessandro De La Torre

Whittier Scholars Program

The introduction of PoetHQ, a mobile application, offers an economical strategy for colleges, potentially ushering in significant cost savings. These savings could be redirected towards enhancing academic programs and services, enriching the educational landscape for students. PoetHQ aims to democratize access to crucial software, effectively removing financial barriers and facilitating a richer educational experience. By providing an efficient software solution that reduces organizational overhead while maximizing accessibility for students, the project highlights the essential role of equitable education and resource optimization within academic institutions.


A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …