Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (278)
  • Open Access

    ARTICLE

    LSDA-APF: A Local Obstacle Avoidance Algorithm for Unmanned Surface Vehicles Based on 5G Communication Environment

    Xiaoli Li, Tongtong Jiao#, Jinfeng Ma, Dongxing Duan, Shengbin Liang#,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 595-617, 2024, DOI:10.32604/cmes.2023.029367

    Abstract In view of the complex marine environment of navigation, especially in the case of multiple static and dynamic obstacles, the traditional obstacle avoidance algorithms applied to unmanned surface vehicles (USV) are prone to fall into the trap of local optimization. Therefore, this paper proposes an improved artificial potential field (APF) algorithm, which uses 5G communication technology to communicate between the USV and the control center. The algorithm introduces the USV discrimination mechanism to avoid the USV falling into local optimization when the USV encounter different obstacles in different scenarios. Considering the various scenarios between the USV and other dynamic obstacles… More > Graphic Abstract

    LSDA-APF: A Local Obstacle Avoidance Algorithm for Unmanned Surface Vehicles Based on 5G Communication Environment

  • Open Access

    ARTICLE

    IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks

    Ying Zhang1,*, Weiming Niu2, Leibing Yan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 885-902, 2024, DOI:10.32604/cmes.2023.029234

    Abstract In this paper, we consider mobile edge computing (MEC) networks against proactive eavesdropping. To maximize the transmission rate, IRS assisted UAV communications are applied. We take the joint design of the trajectory of UAV, the transmitting beamforming of users, and the phase shift matrix of IRS. The original problem is strong non-convex and difficult to solve. We first propose two basic modes of the proactive eavesdropper, and obtain the closed-form solution for the boundary conditions of the two modes. Then we transform the original problem into an equivalent one and propose an alternating optimization (AO) based method to obtain a… More >

  • Open Access

    ARTICLE

    FIDS: Filtering-Based Intrusion Detection System for In-Vehicle CAN

    Seungmin Lee, Hyunghoon Kim, Haehyun Cho, Hyo Jin Jo*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2941-2954, 2023, DOI:10.32604/iasc.2023.039992

    Abstract Modern vehicles are equipped with multiple Electronic Control Units (ECUs) that support various convenient driving functions, such as the Advanced Driver Assistance System (ADAS). To enable communication between these ECUs, the Controller Area Network (CAN) protocol is widely used. However, since CAN lacks any security technologies, it is vulnerable to cyber attacks. To address this, researchers have conducted studies on machine learning-based intrusion detection systems (IDSs) for CAN. However, most existing IDSs still have non-negligible detection errors. In this paper, we propose a new filtering-based intrusion detection system (FIDS) to minimize the detection errors of machine learning-based IDSs. FIDS uses… More >

  • Open Access

    PROCEEDINGS

    Mechanism of the Passive Tap-Scan Damage Detection Method

    Zhuyou Hu1, Ping Lin2,3, He Guo2,3, Yumei Zhang2,3, Zhihai Xiang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.1, pp. 1-2, 2023, DOI:10.32604/icces.2023.09475

    Abstract In recent years, the vehicle scanning method for bridge inspection has drawn much attention by researchers because of its simple operation and high efficiency [1]. Besides the natural frequency, modal modes and other information of bridges, damage can also be detected in this way [2]. For example, we proposed the passive tap-scan damage detection method [3], which scans the bridge with the tapping force generated by a toothed wheel, mimicking the hunting behavior of woodpeckers. In this talk, we will discuss two critical aspects related to the mechanism of this method. One is the quantitative relationship between the vehicle acceleration… More >

  • Open Access

    PROCEEDINGS

    Collocation-Based Reconstruction Harmonic Balance Method for Solving Periodic Orbits of Aerospace Vehicles

    Zipu Yan1,2, Honghua Dai1,2,*, Xiaokui Yue1,2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.3, pp. 1-1, 2023, DOI:10.32604/icces.2023.09138

    Abstract As a significant research interest in orbital mechanics, periodic orbits are fundamental for understanding orbital behaviors and space explorations. Although the harmonic balance (HB) method and its variants have been the most widely-used approaches for periodic dynamical systems, they are seldom applied to celestial dynamics. Here we use the reconstruction harmonic balance (RHB) method for solving periodic orbits. Starting from a presupposed Fourier form and an initial guess at the solution, the algorithm uses timedomain collocation points to optimally reconstruct the high-order HB procedure without complicated symbolic operations and non-physical solutions. Following a description of the method, it is applied… More >

  • Open Access

    ARTICLE

    Enhancement of UAV Data Security and Privacy via Ethereum Blockchain Technology

    Sur Singh Rawat1,*, Youseef Alotaibi2, Nitima Malsa1, Vimal Gupta1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1797-1815, 2023, DOI:10.32604/cmc.2023.039381

    Abstract Unmanned aerial vehicles (UAVs), or drones, have revolutionized a wide range of industries, including monitoring, agriculture, surveillance, and supply chain. However, their widespread use also poses significant challenges, such as public safety, privacy, and cybersecurity. Cyberattacks, targeting UAVs have become more frequent, which highlights the need for robust security solutions. Blockchain technology, the foundation of cryptocurrencies has the potential to address these challenges. This study suggests a platform that utilizes blockchain technology to manage drone operations securely and confidentially. By incorporating blockchain technology, the proposed method aims to increase the security and privacy of drone data. The suggested platform stores… More >

  • Open Access

    PROCEEDINGS

    Mechanism of the Passive Tap-Scan Damage Detection Method

    Zhuyou Hu1, Ping Lin2,3, He Guo2,3, Yumei Zhang2,3, Zhihai Xiang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.1, pp. 1-2, 2023, DOI:10.32604/icces.2023.09475

    Abstract In recent years, the vehicle scanning method for bridge inspection has drawn much attention by researchers because of its simple operation and high efficiency [1]. Besides the natural frequency, modal modes and other information of bridges, damage can also be detected in this way [2]. For example, we proposed the passive tap-scan damage detection method [3], which scans the bridge with the tapping force generated by a toothed wheel, mimicking the hunting behavior of woodpeckers. In this talk, we will discuss two critical aspects related to the mechanism of this method. One is the quantitative relationship between the vehicle acceleration… More >

  • Open Access

    ARTICLE

    Improving Intrusion Detection in UAV Communication Using an LSTM-SMOTE Classification Method

    Abdulrahman M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal of Cyber Security, Vol.4, No.4, pp. 287-298, 2022, DOI:10.32604/jcs.2023.042486

    Abstract Unmanned Aerial Vehicles (UAVs) proliferate quickly and play a significant part in crucial tasks, so it is important to protect the security and integrity of UAV communication channels. Intrusion Detection Systems (IDSs) are required to protect the UAV communication infrastructure from unauthorized access and harmful actions. In this paper, we examine a new approach for enhancing intrusion detection in UAV communication channels by utilizing the Long Short-Term Memory network (LSTM) combined with the Synthetic Minority Oversampling Technique (SMOTE) algorithm, and this integration is the binary classification method (LSTM-SMOTE). We successfully achieved 99.83% detection accuracy by using the proposed approach and… More >

  • Open Access

    ARTICLE

    Sparsity-Enhanced Model-Based Method for Intelligent Fault Detection of Mechanical Transmission Chain in Electrical Vehicle

    Wangpeng He1,*, Yue Zhou1, Xiaoya Guo2, Deshun Hu1, Junjie Ye3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2495-2511, 2023, DOI:10.32604/cmes.2023.027896

    Abstract In today’s world, smart electric vehicles are deeply integrated with smart energy, smart transportation and smart cities. In electric vehicles (EVs), owing to the harsh working conditions, mechanical parts are prone to fatigue damages, which endanger the driving safety of EVs. The practice has proved that the identification of periodic impact characteristics (PICs) can effectively indicate mechanical faults. This paper proposes a novel model-based approach for intelligent fault diagnosis of mechanical transmission train in EVs. The essential idea of this approach lies in the fusion of statistical information and model information from a dynamic process. In the algorithm, a novel… More >

  • Open Access

    ARTICLE

    Modeling and Validation of Base Pressure for Aerodynamic Vehicles Based on Machine Learning Models

    Jaimon Dennis Quadros1, Sher Afghan Khan2, Abdul Aabid3,*, Muneer Baig3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2331-2352, 2023, DOI:10.32604/cmes.2023.028925

    Abstract The application of abruptly enlarged flows to adjust the drag of aerodynamic vehicles using machine learning models has not been investigated previously. The process variables (Mach number (M), nozzle pressure ratio (η), area ratio (α), and length to diameter ratio (γ )) were numerically explored to address several aspects of this process, namely base pressure (β) and base pressure with cavity (βcav). In this work, the optimal base pressure is determined using the PCA-BAS-ENN based algorithm to modify the base pressure presetting accuracy, thereby regulating the base drag required for smooth flow of aerodynamic vehicles. Based on the identical dataset,… More > Graphic Abstract

    Modeling and Validation of Base Pressure for Aerodynamic Vehicles Based on Machine Learning Models

Displaying 1-10 on page 1 of 278. Per Page