Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (7226)
- China Simulation Federation (3363)
- TÜBİTAK (3020)
- Selected Works (2644)
- Wright State University (2602)
-
- Purdue University (2057)
- Old Dominion University (1456)
- Missouri University of Science and Technology (1360)
- Edith Cowan University (1172)
- Air Force Institute of Technology (1108)
- University of Texas at El Paso (1094)
- Dartmouth College (1017)
- San Jose State University (995)
- University of Nebraska - Lincoln (979)
- Embry-Riddle Aeronautical University (853)
- City University of New York (CUNY) (818)
- Technological University Dublin (792)
- Washington University in St. Louis (785)
- Brigham Young University (759)
- California Polytechnic State University, San Luis Obispo (731)
- Kennesaw State University (713)
- University for Business and Technology in Kosovo (626)
- University of Texas at Arlington (614)
- Nova Southeastern University (535)
- Portland State University (529)
- Western University (524)
- SelectedWorks (522)
- New Jersey Institute of Technology (511)
- Syracuse University (501)
- University of Nebraska at Omaha (484)
- Keyword
-
- Machine learning (1332)
- Deep learning (799)
- Artificial intelligence (653)
- Machine Learning (649)
- Computer Science (638)
-
- Security (620)
- Computer science (435)
- Cybersecurity (409)
- Privacy (408)
- Simulation (377)
- Classification (367)
- Technical Reports (358)
- UTEP Computer Science Department (356)
- Data mining (349)
- Deep Learning (345)
- Algorithms (336)
- Optimization (333)
- Neural networks (307)
- Artificial Intelligence (299)
- Computer vision (291)
- College for Professional Studies (253)
- Software engineering (253)
- Education (252)
- Clustering (251)
- Cloud computing (244)
- Department of Computer Science and Engineering (243)
- Applied sciences (236)
- School of Computer & Information Science (236)
- Visualization (236)
- Social media (230)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (6878)
- Journal of System Simulation (3363)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Theses and Dissertations (2498)
- Department of Computer Science Technical Reports (1721)
-
- Computer Science & Engineering Syllabi (1312)
- Departmental Technical Reports (CS) (881)
- Master's Projects (845)
- Electronic Theses and Dissertations (735)
- Computer Science Faculty Publications (724)
- All Computer Science and Engineering Research (683)
- Computer Science Technical Reports (673)
- Computer Science Faculty Research & Creative Works (595)
- Faculty Publications (585)
- Kno.e.sis Publications (543)
- Journal of Digital Forensics, Security and Law (536)
- Computer Science Faculty Publications and Presentations (507)
- Dissertations (500)
- CCE Theses and Dissertations (488)
- All Works (478)
- Walden Dissertations and Doctoral Studies (467)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (463)
- Masters Theses (402)
- Computer Science and Engineering Theses (356)
- Theses (334)
- Electronic Thesis and Dissertation Repository (333)
- Computer Science and Software Engineering (332)
- USF Tampa Graduate Theses and Dissertations (320)
- Computer Science: Faculty Publications (316)
- Mathematics, Statistics and Computer Science Faculty Research and Publications (315)
- Publication Type
Articles 931 - 960 of 57930
Full-Text Articles in Physical Sciences and Mathematics
Subject Analysis Ex Machina: Developing A Subject Heading Recommendation Service For Jmu Libraries, Steven W. Holloway
Subject Analysis Ex Machina: Developing A Subject Heading Recommendation Service For Jmu Libraries, Steven W. Holloway
Libraries
Results of a 2022 evaluation of ANNIF, open-source software designed to generate controlled vocabulary subject headings, using James Madison University Libraries resources.
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka
Cybersecurity Undergraduate Research Showcase
The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …
Use Of Deep Learning In Content-Based Image Retrieval (Cbir), Angelina Das
Use Of Deep Learning In Content-Based Image Retrieval (Cbir), Angelina Das
ATU Research Symposium
In the world of computer vision and data retrieval, a crucial task is finding images within a database based on their visual content. This is known as content-based image retrieval (CBIR). As the number of digital images explodes across fields like online shopping, healthcare, and social media, the need for powerful and precise CBIR systems becomes ever more critical. Early CBIR methods depended on features crafted by hand, like color distributions, texture descriptions, and shape characteristics. However, these techniques often have difficulty capturing the true meaning of an image and might not handle very large datasets effectively. With the rise …
Optimizing Keyboard Layouts For English Text, David Sommerfield
Optimizing Keyboard Layouts For English Text, David Sommerfield
Research & Creative Achievement Day
QWERTY has been the de facto layout for English text input since its invention in 1874. Its continued usage has led to concerns about its ergonomic shortcomings. Previous attempts at layout creation have usually relied on manual observations of typing data rather than a predictive model. To address this issue, we propose a methodology that incorporates both corpus data from 22 million English websites and 8,228 hours of real-world typing data from participants. The corpus data is processed into bigrams and their number of occurrences. The typing data is preprocessed to exclude user-made typos, and then each bigram is tabulated …
Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales
Binder, Tyler A. Peaster, Lindsey M. Davenport, Madelyn Little, Alex Bales
ATU Research Symposium
Binder is a mobile application that aims to introduce readers to a book recommendation service that appeals to devoted and casual readers. The main goal of Binder is to enrich book selection and reading experience. This project was created in response to deficiencies in the mobile space for book suggestions, library management, and reading personalization. The tools we used to create the project include Visual Studio, .Net Maui Framework, C#, XAML, CSS, MongoDB, NoSQL, Git, GitHub, and Figma. The project’s selection of books were sourced from the Google Books repository. Binder aims to provide an intuitive interface that allows users …
Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy
Jsper (Just Stablediffusion Plus Easy Retraining), Adam Rusterholz, Meghan Finn, Zach Zolliecoffer, Zach Judy
ATU Research Symposium
JSPER is an an AI art generation Web Application that is both flexible and accessible. Our goal is to enable anyone to create and use their own customized art models, regardless of technical skill level. These models can be trained on almost anything, from a person, to an animal, to a specific object, or even style. The user only has to upload a handful of images of their subject. Then, training settings get optimized at the push of a button to match the type of subject the user is training. After training, their customized model can be used to generate …
Optimizing Campus Chat-Bot Experience Using Puaa: Integrating Large Language Model (Llm) Into University Ai Assistants, Sijan Panday, Zurab Sabakhtarishvili, Clayton Jensen
Optimizing Campus Chat-Bot Experience Using Puaa: Integrating Large Language Model (Llm) Into University Ai Assistants, Sijan Panday, Zurab Sabakhtarishvili, Clayton Jensen
ATU Research Symposium
The advent of large language models (LLMs) such as Chat-GPT and Bard marks a significant milestone in knowledge acquisition, offering a streamlined alternative to the traditionally labor-intensive process of navigating through multiple checkpoints on the web. This emerging trend in LLMs renders the prevalent rule-based chatbots, commonly utilized by universities, increasingly outdated and subpar. This research project proposes integrating LLM technology into university websites, specifically targeting the needs of students seeking information about their institutions by introducing PUAA (Personal University AI Assistant). Our approach involves using the Retrieval-Augmented Generation (RAG) framework, leveraging the capabilities of the LlamaIndex in conjunction with …
Genetic Association In Entylia Carinata Using Random Forest Classification, Caden J. Harper
Genetic Association In Entylia Carinata Using Random Forest Classification, Caden J. Harper
Research & Creative Achievement Day
The goal of this research was to identify locations in the genome of the Entylia carinata, known as the treehopper, that are associated with anomalous behavior exhibited by the species. Treehoppers are phytophagous insects and are shown to feed, reproduce, and rear their young on specific aster species. Observation has shown that the insects will disregard potential mates in close proximity in favor of those that originate from the same plant species as themselves. This behavior suggests genetic separation in the species based on plant nativity and warrants genetic analysis. Machine learning offers an effective genetic association technique due to …
Spoton, Corey A. Naegle, Caleb Mcclure, Chase M. Tallon, Holden J. O'Neal
Spoton, Corey A. Naegle, Caleb Mcclure, Chase M. Tallon, Holden J. O'Neal
ATU Research Symposium
SpotOn is a project developed to solve problems with owners losing their pets. The project is in short a solar-powered dog harness with GPS capability with its own application for mobile devices.
Techniques To Detect Fake Profiles On Social Media Using The New Age Algorithms – A Survey, A K M Rubaiyat Reza Habib, Edidiong Elijah Akpan
Techniques To Detect Fake Profiles On Social Media Using The New Age Algorithms – A Survey, A K M Rubaiyat Reza Habib, Edidiong Elijah Akpan
ATU Research Symposium
This research explores the growing issue of fake accounts in Online Social Networks [OSNs]. While platforms like Twitter, Instagram, and Facebook foster connections, their lax authentication measures have attracted many scammers and cybercriminals. Fake profiles conduct malicious activities, such as phishing, spreading misinformation, and inciting social discord. The consequences range from cyberbullying to deceptive commercial practices. Detecting fake profiles manually is often challenging and causes considerable stress and trust issues for the users. Typically, a social media user scrutinizes various elements like the profile picture, bio, and shared posts to identify fake profiles. These evaluations sometimes lead users to conclude …
Enhancing R2l Intrusion Detection Using Decision Trees, Stephen Sommer
Enhancing R2l Intrusion Detection Using Decision Trees, Stephen Sommer
Research & Creative Achievement Day
In the age of advancing technology, artificial intelligence, and big data, Remote to Local (R2L) attacks are increasingly threatening cloud computing environments, heightening concerns about security and privacy. Intrusion detection systems (IDS) using Artificial Intelligence play a role in safeguarding data integrity within databases by swiftly identifying and isolating suspicious records. Furthermore, machine learning techniques enhance the effectiveness of these IDS by continuously adapting to new attack patterns and improving accuracy. This research investigates the use of Decision Tree, a Machine Learning Algorithm for enhancing Remote to Local (R2L) intrusion detection capabilities, utilizing the KDD Cup 1999 dataset and the …
Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni
Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni
ATU Research Symposium
Abstract:
Anomaly detection, the identification of rare or unusual patterns that deviate from normal behavior, is a fundamental task with wide-ranging applications across various domains. Traditional machine learning techniques often struggle to effectively capture the complex temporal dynamics present in real-world data streams. Spiking Neural Networks (SNNs), inspired by the spiking nature of biological neurons, offer a promising approach by inherently modeling temporal information through precise spike timing. In this study, we investigate the use of Spiking Neural Networks (SNNs) for detecting anomalies or unusual patterns in data. We propose an SNN model that can learn what constitutes normal …
Innovating Inventory And Alert Systems With Object Tracking, Juan Harmse, Esther Peden
Innovating Inventory And Alert Systems With Object Tracking, Juan Harmse, Esther Peden
Campus Research Day
Security system users require safeguarding inventory from potential theft while reducing manual tracking of physical objects. Our contribution harnesses the power of artificial intelligence and computer vision with YOLO to automate the process of tracking inventory items. The system sends alerts to the inventory manager when it detects particular events. Our approach was evaluated with KernProf profiling, interference, and orientation tests. The results were overall positive in these testing areas.
Accessing Advanced National Supercomputing And Storage Resources For Computational Research, Ramazan Aygun
Accessing Advanced National Supercomputing And Storage Resources For Computational Research, Ramazan Aygun
All Things Open
This presentation will cover ACCESS (Advanced Cyberinfrastructure Coordination Ecosystem: Services & Support), and Kennesaw State University's involvement in Open Science Data Federation program as a data origin to help researchers and educators with or without supporting grants to utilize the nation’s advanced computing systems and services. ACCESS, a program established and funded by the National Science Foundation, is an ecosystem with capabilities for new modes of research and further democratizing participation. The presentation covers how to apply for allocations on ACCESS. The last part of the presentation will briefly explain Open Science Data Federation and Kennesaw State University's involvement as …
Providing Beginners With Interactive Exploration Of Error Messages In Clojure, John Walbran, Elena Machkasova
Providing Beginners With Interactive Exploration Of Error Messages In Clojure, John Walbran, Elena Machkasova
Undergraduate Research Symposium 2024
Programmers are imperfect, and will often make mistakes when programming and create a program error, for example, attempting to divide by zero. When a computer tries to run a program with an error, the program will halt and present the details of the error to the user in the form of an error message. These error messages are often very jargon-heavy, and are not designed to be palatable to a novice programmer. This creates significant friction for new programmers trying to learn programming languages. This work is a part of an ongoing project (called Babel) led by Elena Machkasova in …
Enhancing Evolutionary Computation: Optimizing Phylogeny-Informed Fitness Estimation Through Strategic Modifications, Chenfei Peng, Nic Mcphee
Enhancing Evolutionary Computation: Optimizing Phylogeny-Informed Fitness Estimation Through Strategic Modifications, Chenfei Peng, Nic Mcphee
Undergraduate Research Symposium 2024
In evolutionary computation, programs are developed using evolution's basic principles, such as selection, mutation, and recombination, to iteratively improve problem solutions towards optimal outcomes in a reasonable amount of time. To save time and be more efficient, we are currently exploring a modified version of phylogeny-informed fitness estimation. The original version evaluates each individual program on a subset of the training cases and estimates the performance everywhere else according to its parent's performance. Our approach involves comprehensive evaluation of promising programs across all training cases, increasing computational investment where the sub-sampled results indicated potential gains. This method led to our …
Algorithmic Approaches For Object Tracking And Facial Detection Using Drones, Kareem Shahatta, Peter Savarese, Gina Egitto, Jongwook Kim
Algorithmic Approaches For Object Tracking And Facial Detection Using Drones, Kareem Shahatta, Peter Savarese, Gina Egitto, Jongwook Kim
Computer Science Student Work
Drones are unmanned aerial vehicles that have a variety of uses in many fields such as package delivery and search operations. Tello is a small, programmable drone designed for educational purposes. We developed algorithms using DJI Tello Py, an open-source Application Programming Interface, to command the movements of Tello for tracking a target object (i.e., human). Our algorithms utilize digital image processing techniques on Tello's live video stream to optimize the number of movements Tello needs to reach its target. Our poster presentation will explain our approaches to implement object-tracking and facial detection for Tello, discuss lessons we learned, and …
Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik
Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik
Ocean Engineering and Marine Sciences Faculty Publications
Ever since the first image of a coral reef was captured in 1885, people worldwide have been accumulating images of coral reefscapes that document the historic conditions of reefs. However, these innumerable reefscape images suffer from perspective distortion, which reduces the apparent size of distant taxa, rendering the images unusable for quantitative analysis of reef conditions. Here we solve this century-long distortion problem by developing a novel computer-vision algorithm, ReScape, which removes the perspective distortion from reefscape images by transforming them into top-down views, making them usable for quantitative analysis of reef conditions. In doing so, we demonstrate the …
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
The African Journal of Information Systems
Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …
5675 Wiredcats Scouting Hub, Sebastian Smiley
5675 Wiredcats Scouting Hub, Sebastian Smiley
Honors Theses
The WiredCats Scouting Hub was created to provide FIRST team 5675 with an application that allows them to make more informed strategic decisions regarding their competitive play. The app synthesizes data from multiple sources, parsing multiple data formats into a single source of truth. It also presents data to users through graphs and charts and provides interactive tables. The application meets the requirements set forth by the leadership of team 5675, effectively providing the capabilities they seek.
Kalamazoo Nature Center Mobile Application, Jacob Tebben
Kalamazoo Nature Center Mobile Application, Jacob Tebben
Honors Theses
This project aimed to address the challenge of enhancing visitor engagement and information dissemination at the Kalamazoo Nature Center (KNC) through the development of an integrated mobile and desktop application system. This initiative arose due to the limitations posed by traditional mobile applications which often become outdated and need to be updated by a dedicated software team. This project was designed for any user of the KNC desktop app to be able to update content on the mobile app, without the need of a dedicated software team.
The mobile application was designed for visitor use, enabling them to access up-to-date …
The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov
The Vulnerabilities Of Artificial Intelligence Models And Potential Defenses, Felix Iov
Cybersecurity Undergraduate Research Showcase
The rapid integration of artificial intelligence (AI) into various commercial products has raised concerns about the security risks posed by adversarial attacks. These attacks manipulate input data to disrupt the functioning of AI models, potentially leading to severe consequences such as self-driving car crashes, financial losses, or data breaches. We will explore neural networks, their weaknesses, and potential defenses. We will discuss adversarial attacks including data poisoning, backdoor attacks, evasion attacks, and prompt injection. Then, we will explore defense strategies such as data protection, input sanitization, and adversarial training. By understanding how adversarial attacks work and the defenses against them, …
A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla
A Reputation System For Provably-Robust Decision Making In Iot Blockchain Networks, Charles C. Rawlins, Sarangapani Jagannathan, Venkata Sriram Siddhardh Nadendla
Electrical and Computer Engineering Faculty Research & Creative Works
Blockchain systems have been successful in discerning truthful information from interagent interaction amidst possible attackers or conflicts, which is crucial for the completion of nontrivial tasks in distributed networking. However, the state-of-the-art blockchain protocols are limited to resource-rich applications where reliably connected nodes within the network are equipped with significant computing power to run lottery-based proof-of-work (pow) consensus. The purpose of this work is to address these challenges for implementation in a severely resource-constrained distributed network with internet of things (iot) devices. The contribution of this work is a novel lightweight alternative, called weight-based reputation (wbr) scheme, to classify new …
Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang
Research On Cross-Domain Unmanned Swarm Cooperative Anti-Submarine Search Method, Ning Wang, Xiaolong Liang, Jiaqiang Zhang, Yueqi Hou, Aiwu Yang
Journal of System Simulation
Abstract: For the maritime ASW search, a cross-domain unmanned swarm cooperative search method is proposed in which USVs are used as the communication relay of UAVs. The digital grid map is used to characterize the mission area and the kinematic model of cross-domain platform is constructed. The cooperative method of cross-domain unmanned systems is proposed, and the distributed information fusion mechanism of unmanned systems is designed. The search objective function for heterogeneous platforms is designed to guide the unmanned systems to make real-time decisions in search task. The simulation results show that the proposed method can be effective to the …
Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong
Simulation Verification And Decision-Making Key Technologies Of Unmanned Swarm Game Confrontation: A Survey, Xiaolong Liang, Aiwu Yang, Jiaqiang Zhang, Yueqi Hou, Ning Wang, Xiao Huang, Junbin Gong
Journal of System Simulation
Abstract: Unmanned swarm game confrontation is a new combat mode and plays a crucial role in intelligent warfare. Its core is the autonomous generation of a series of game confrontation decision sequences to "empower" the swarm. The progress of system simulation verification for the unmanned swarm game confrontation is analyzed. The key technologies of the autonomous decision-making are discussed from three aspects, technology based on expert systems and game theory, technology based on swarm intelligence and optimization theory, and technology based on neural networks and reinforcement learning. The key technology research conducted by the author's team on the autonomous decisionmaking …
Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo
Research On Integration Of Virtual-Real Hybrid Simulation Experiment Environment For Unmanned Swarm, Huijie Yang, Taoshun Xiao, Chen Wu, Lingfeng Guo
Journal of System Simulation
Abstract: Constructing the experiment environment and researching the core technology, key equipment and operation theory is the key step for the development of unmanned swarm. Based on the requirement of hybrid simulation environment for unmanned swarm, the elements of the experiment environment are analyzed, and the architecture is proposed, which is composed of common infrastructure, general experiment services, special experiment tools, security and support tool. The key experiment environment integration technology is studied from the aspects of experiment network, model data and experiment application. The feasibility of the method to construct the virtual-real hybrid simulation environment is verified by an …
Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang
Mixed-Variable Particle Swarm Optimization Algorithm Based On Competitive Coevolution, Hu Zhang, Heng Zhang, Zilu Huang, Zhe Wang, Qingpo Fu, Jin Peng, Feng Wang
Journal of System Simulation
Abstract: For the current algorithm, it is difficult to obtain the available solution due to the irregularity of problem decision space caused by the numerous mixed variable optimization problems during real industrial applications. The coevolution strategy is introduced and a mixed variable particle swarm optimization algorithm(CCPSO) based on competitive coevolution is proposed. The search direction adjustment mechanism based on tolerance is designed to judge the evolution state of particles, adaptively adjust the search direction of particles, avoid falling into local optimum, and balance the convergence and diversity of the population. The learning object generation mechanism is adopted for each particle …
Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu
Distributed Energy Management Strategy Of Microgrid Based On Master-Slave Game, Miaomiao Ma, Hao Wang, Lipeng Dong, Xiangjie Liu
Journal of System Simulation
Abstract: Under the operation mode of power market, based on two-layer master-slave game, a distributed energy management strategy for the microgrid is proposed to tackle the conflict between the overall optimal operation of renewable microgrid and the maximum profit of each investor. To fully consider the balance between energy supply and demand, the concept of power trading agent is introduced, and an integrated demand response strategy based on consumer satisfaction and adjustable load is proposed on the user side. Considering the initiative and decision-making ability of power supply and load, the decision-making game model is established with power trading agent …
Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang
Optimization Of Urban Traffic Microsimulation Model For Carbon Emission Reduction, Bo Liu, Jianxin Lin, Yini Liu, Dong Zhang
Journal of System Simulation
Abstract: To assess the environmental benefits of transportation management or control strategies, a method to effectively integrate the micro-traffic simulation model and the micro-vehicle emission model is proposed. VISSIM platform is used to build a case micro traffic simulation model. K-means clustering method is used to divide the driving behavior into 4 types based on the acceleration and deceleration characteristics of different speed intervals of the trajectory data, and the global parameters of the simulation model are calibrated based on the driving characteristics, which quantitatively describe the total sensitivity of the parameters and the sensitivity of the interactions between the …
Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu
Asl-Catboost Method For Wind Turbine Fault Detection Integrated With Digital Twin, Hongtao Liang, Lingchao Kong, Guozhu Liu, Wenxuan Dong, Xiangyi Liu
Journal of System Simulation
Abstract: In view of the low visibility of the current wind farm status monitoring and insufficient realtime operation and maintenance, based on the concept of digital twin five-dimensional model, the framework of wind farm digital twin five-dimensional model is constructed. Aiming at the insufficient fault detection capability of traditional algorithms and unbalanced positive and negative samples in fan fault data set, the improved ASL-CatBoost algorithm is proposed to achieve the accurate detection of fan fault status. Based on the digital twinning platform, combined with MATLAB/Simulink, the simulation mathematical model of doubly-fed wind turbine under the condition of blade mass imbalance …