Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (59)
  • Open Access

    REVIEW

    Overview of Earth-Moon Transfer Trajectory Modeling and Design

    Jiye Zhang, Huichang Yu, Honghua Dai*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 5-43, 2023, DOI:10.32604/cmes.2022.022585 - 29 September 2022

    Abstract The Moon is the only celestial body that human beings have visited. The design of the Earth-Moon transfer orbits is a critical issue in lunar exploration missions. In the 21st century, new lunar missions including the construction of the lunar space station, the permanent lunar base, and the Earth-Moon transportation network have been proposed, requiring low-cost, expansive launch windows and a fixed arrival epoch for any launch date within the launch window. The low-energy and low-thrust transfers are promising strategies to satisfy the demands. This review provides a detailed landscape of Earth-Moon transfer trajectory design More >

  • Open Access

    ARTICLE

    Interactive Trajectory Star Coordinates i-tStar and Its Extension i-tStar (3D)

    Jing He1,2, Haonan Chen3,*, Lingxiao Li4, Yebin Zou5

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 211-237, 2023, DOI:10.32604/cmes.2022.020597 - 29 September 2022

    Abstract There are many sources of geographic big data, and most of them come from heterogeneous environments. The data sources obtained in this case contain attribute information of different spatial scales, different time scales and different complexity levels. It is worth noting that the emergence of new high-dimensional trajectory data types and the increasing number of details are becoming more difficult. In this case, visualizing high-dimensional spatiotemporal trajectory data is extremely challenging. Therefore, i-tStar and its extension i-tStar (3D) proposed, a trajectory behavior feature for moving objects that are integrated into a view with less effort More > Graphic Abstract

    Interactive Trajectory Star Coordinates i-tStar and Its Extension i-tStar (3D)

  • Open Access

    ARTICLE

    Tracking Pedestrians Under Occlusion in Parking Space

    Zhengshu Zhou1,*, Shunya Yamada2, Yousuke Watanabe2, Hiroaki Takada1,2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2109-2127, 2023, DOI:10.32604/csse.2023.029005 - 01 August 2022

    Abstract Many traffic accidents occur in parking lots. One of the serious safety risks is vehicle-pedestrian conflict. Moreover, with the increasing development of automatic driving and parking technology, parking safety has received significant attention from vehicle safety analysts. However, pedestrian protection in parking lots still faces many challenges. For example, the physical structure of a parking lot may be complex, and dead corners would occur when the vehicle density is high. These lead to pedestrians’ sudden appearance in the vehicle’s path from an unexpected position, resulting in collision accidents in the parking lot. We advocate that… More >

  • Open Access

    ARTICLE

    A Traceable Capability-based Access Control for IoT

    Chao Li1, Fan Li1,2, Cheng Huang3, Lihua Yin1,*, Tianjie Luo1,2, Bin Wang4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4967-4982, 2022, DOI:10.32604/cmc.2022.023496 - 21 April 2022

    Abstract Delegation mechanism in Internet of Things (IoT) allows users to share some of their permissions with others. Cloud-based delegation solutions require that only the user who has registered in the cloud can be delegated permissions. It is not convenient when a permission is delegated to a large number of temporarily users. Therefore, some works like CapBAC delegate permissions locally in an offline way. However, this is difficult to revoke and modify the offline delegated permissions. In this work, we propose a traceable capability-based access control approach (TCAC) that can revoke and modify permissions by tracking… More >

  • Open Access

    ARTICLE

    Generating Synthetic Trajectory Data Using GRU

    Xinyao Liu1, Baojiang Cui1,*, Lantao Xing2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 295-305, 2022, DOI:10.32604/iasc.2022.020032 - 15 April 2022

    Abstract With the rise of mobile network, user location information plays an increasingly important role in various mobile services. The analysis of mobile users’ trajectories can help develop many novel services or applications, such as targeted advertising recommendations, location-based social networks, and intelligent navigation. However, privacy issues limit the sharing of such data. The release of location data resulted in disclosing users’ privacy, such as home addresses, medical records, and other living habits. That promotes the development of trajectory generators, which create synthetic trajectory data by simulating moving objects. At current, there are some disadvantages in… More >

  • Open Access

    ARTICLE

    The Intelligent Trajectory Optimization of Multistage Rocket with Gauss Pseudo-Spectral Method

    Lihua Zhu1,*, Yu Wang1, Zhiqiang Wu1, Cheire Cheng2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 291-303, 2022, DOI:10.32604/iasc.2022.024252 - 05 January 2022

    Abstract The rapid developments of artificial intelligence in the last decade are influencing aerospace engineering to a great extent and research in this context is proliferating. In this paper, the trajectory optimization of a three-stage launch vehicle in the powering phase subject to the sun-synchronous orbit is considered. To solve the optimal control problem, the Gauss pseudo-spectral method (GPM) is used to transform the optimization model to a nonlinear programming (NLP) problem and sequential quadratic programming is applied to find the optimal solution. However, the sensitivity of the initial guess may cost the solver significant time More >

  • Open Access

    ARTICLE

    A Novel Method of User Identity Recognition Based on Finger Trajectory

    Xia Zhou1, Zijian Wang2, Tianyu Wang2, Jin Han2,*, Zhiling Wang2, Yannan Qian3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 473-481, 2022, DOI:10.32604/iasc.2022.022493 - 05 January 2022

    Abstract User identity recognition is the key shield to protect users’ privacy data from disclosure and embezzlement. The user identity of mobile devices such as mobile phones mainly includes fingerprint recognition, nine-grid password, face recognition, digital password, etc. Due to the requirements of computing resources and convenience of mobile devices, these verification methods have their own shortcomings. In this paper, a user identity recognition technology based on finger trajectory is proposed. Based on the analysis of the users’ finger trajectory data, the feature of the user's finger movement trajectory is extracted to realize the identification of More >

  • Open Access

    ARTICLE

    SOINN-Based Abnormal Trajectory Detection for Efficient Video Condensation

    Chin-Shyurng Fahn1, Chang-Yi Kao2,*, Meng-Luen Wu3, Hao-En Chueh4

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 451-463, 2022, DOI:10.32604/csse.2022.022368 - 04 January 2022

    Abstract With the evolution of video surveillance systems, the requirement of video storage grows rapidly; in addition, safe guards and forensic officers spend a great deal of time observing surveillance videos to find abnormal events. As most of the scene in the surveillance video are redundant and contains no information needs attention, we propose a video condensation method to summarize the abnormal events in the video by rearranging the moving trajectory and sort them by the degree of anomaly. Our goal is to improve the condensation rate to reduce more storage size, and increase the accuracy More >

  • Open Access

    ARTICLE

    Time Synchronized Velocity Error for Trajectory Compression

    Haibao Jiang1, Dezhi Han1,*, Han Liu1, Jiuzhang Han1 and Wenjing Nie2

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.2, pp. 1193-1219, 2022, DOI:10.32604/cmes.2022.017663 - 13 December 2021

    Abstract Nowadays, distance is usually used to evaluate the error of trajectory compression. These methods can effectively indicate the level of geometric similarity between the compressed and the raw trajectory, but it ignores the velocity error in the compression. To fill the gap of these methods, assuming the velocity changes linearly, a mathematical model called SVE (Time Synchronized Velocity Error) for evaluating compression error is designed, which can evaluate the velocity error effectively, conveniently and accurately. Based on this model, an innovative algorithm called SW-MSVE (Minimum Time Synchronized Velocity Error Based on Sliding Window) is proposed,… More >

  • Open Access

    ARTICLE

    Estimating Fuel-Efficient Air Plane Trajectories Using Machine Learning

    Jaiteg Singh1, Gaurav Goyal1, Farman Ali2, Babar Shah3, Sangheon Pack4,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6189-6204, 2022, DOI:10.32604/cmc.2022.021657 - 11 October 2021

    Abstract Airline industry has witnessed a tremendous growth in the recent past. Percentage of people choosing air travel as first choice to commute is continuously increasing. Highly demanding and congested air routes are resulting in inadvertent delays, additional fuel consumption and high emission of greenhouse gases. Trajectory planning involves creation identification of cost-effective flight plans for optimal utilization of fuel and time. This situation warrants the need of an intelligent system for dynamic planning of optimized flight trajectories with least human intervention required. In this paper, an algorithm for dynamic planning of optimized flight trajectories has… More >

Displaying 21-30 on page 3 of 59. Per Page