Hasil untuk "Transportation engineering"

Menampilkan 20 dari ~6462716 hasil · dari CrossRef, DOAJ, arXiv

JSON API
arXiv Open Access 2026
How Software Engineering Research Overlooks Local Industry: A Smaller Economy Perspective

Klara Borowa, Andrzej Zalewski, Lech Madeyski

The software engineering researchers from countries with smaller economies, particularly non-English speaking ones, represent valuable minorities within the software engineering community. As researchers from Poland, we represent such a country. We analyzed the ICSE FOSE (Future of Software Engineering) community survey through reflexive thematic analysis to show our viewpoint on key software community issues. We believe that the main problem is the growing research-industry gap, which particularly impacts smaller communities and small local companies. Based on this analysis and our experiences, we present a set of recommendations for improvements that would enhance software engineering research and industrial collaborations in smaller economies.

arXiv Open Access 2026
When Code Becomes Abundant: Redefining Software Engineering Around Orchestration and Verification

Karina Kohl, Luigi Carro

Software Engineering (SE) faces simultaneous pressure from AI automation (reducing code production costs) and hardware-energy constraints (amplifying failure costs). We position that SE must redefine itself around human discernment-intent articulation, architectural control, and verification-rather than code construction. This shift introduces accountability collapse as a central risk and requires fundamental changes to research priorities, educational curricula, and industrial practices. We argue that Software Engineering, as traditionally defined around code construction and process management, is no longer sufficient. Instead, the discipline must be redefined around intent articulation, architectural control, and systematic verification. This redefinition shifts Software Engineering from a production-oriented field to one centered on human judgment under automation, with profound implications for research, practice, and education.

DOAJ Open Access 2025
Collision Avoidance Strategies for Uncrewed Aircraft Systems in Structured Airspace Using a Roundabout Intersection

Skyler Hawkins, Jaya Sravani Mandapaka, Logan McCorkendale et al.

The increasing size of the Uncrewed Aircraft System (UAS) ecosystem necessitates effective infrastructure and Collision Avoidance (CA) systems to facilitate high-density UAS traffic in urban environments. Unfortunately, current-generation Air Traffic Management (ATM) and CA systems used for crewed aircraft cannot be used with UAS due to scalability issues and operational constraints. This paper introduces a novel UAS intersection called the Roundabout, specifically designed for facilitating UAS traffic in structured airspace. This paper also proposes the methodology for a CA system based on Vehicle-to-Vehicle (V2V) communications, specifically UAS-to-UAS (U2U) communications, for Tactical Deconfliction (TD) between UAS in real-time. Simulation results demonstrate the system's efficacy in handling the deconfliction process between two quadrotor UAS and can be expected to generalize to deconfliction scenarios involving UAS of all types, given that the proper control systems and trajectory generation methods are available. Overall, these findings highlight the Roundabout's potential for enhancing UAS operations in the National Airspace System (NAS).

Transportation engineering, Transportation and communications
DOAJ Open Access 2025
An enhanced model predictive control method for single-stage three-phase transformerless grid-connected photovoltaic inverter

Zhonglin Guo, Zhijie Liu, Miao Guo et al.

The single-stage transformerless photovoltaic (PV) topology is an attractive configuration as it offers high efficiency, low installation cost and smaller size. For such a configuration, the control algorithm should be designed to track the maximum power point, transform power from PV to grid, and reduce the common-mode voltage (CMV) simultaneously. However, the multi-objective handling problem will lead to degraded performance and slow response speed. In this paper, a model predictive control method with a revised switching states selection algorithm has been developed. The performance of the overall system can be enhanced under various conditions with improved efficiency. Furthermore, the CMV is greatly reduced and constrained to one sixth of the DC-link voltage. In addition, appropriate candidate region selection and pruning mechanism are employed to reduce the calculation burden of MPC. Finally, the performance of the proposed MPC method is verified by the control hardware-in-the-loop approach through OPAL real-time platform under various conditions.

Production of electric energy or power. Powerplants. Central stations
DOAJ Open Access 2025
Image encoding-based bearing fault diagnosis: Review and challenges for high-speed trains

Huimin Li, Lingfeng Li, Bin Liu et al.

High-Speed Trains (HSTs) have emerged as a mainstream mode of transportation in China, owing to their exceptional safety and efficiency. Ensuring the reliable operation of HSTs is of paramount economic and societal importance. As critical rotating mechanical components of the transmission system, bearings make their fault diagnosis a topic of extensive attention. This paper provides a systematic review of image encoding-based bearing fault diagnosis methods tailored to the condition monitoring of HSTs. First, it categorizes the image encoding techniques applied in the field of bearing fault diagnosis. Then, a review of state-of-the-art studies has been presented, encompassing both monomodal image conversion and multimodal image fusion approaches. Finally, it highlights current challenges and proposes future research directions to advance intelligent fault diagnosis in HSTs, aiming to provide a valuable reference for researchers and engineers in the field of intelligent operation and maintenance.

Transportation engineering
DOAJ Open Access 2025
Accuracy Analysis of Convergence Monitoring in Twin-tube Shield Tunnels Using Mobile Laser Scanning

WANG Xinhong, XIA Caichu, HU Guojin et al.

[Objective] Mobile 3D laser scanning technology is widely applied in single-tube tunnel monitoring due to its excellent measurement efficiency and high accuracy. However, the application of this technology for deformation monitoring in twin-tube shield tunnels is rare, necessitating analysis of the mobile 3D laser scanning accuracy for twin-tube shield tunnel deformation convergence monitoring. [Method] The feasibility of using this technology for convergence deformation monitoring in twin-tube shield tunnels is verified through accuracy validation. Point cloud data collected via mobile 3D laser scanning are processed using software parameter settings and segment ring correction to obtain convergence values, which are then compared with the convergence values measured by manual total station, thereby validating the accuracy of the mobile 3D laser scanning system. In addition, tunnel defects are analyzed by generating an unwrapped elevation view of the twin-tube shield tunnel. [Result & Conclusion] Based on a comparative analysis of 1 178 rings of measured data from a twin-tube shield tunnel on a rail transit line interval in Shanghai, it is found that: in both the first half and the second half of 2022, 90.66% of convergence changes in the twin-tube shield tunnel fell within the range of -1.0 to 1.0 mm, and 99.24% fell within -2.0 to 2.0 mm. The accuracy of the FARO S350 laser scanner in the twin-tube shield tunnel interval is 92.86% within -2.0 to 2.0 mm, and 99.58% within -3.0 to 3,0 mm. The field-measured data verifies the reliability of the mobile 3D laser scanning technology.

Transportation engineering
arXiv Open Access 2025
A First Look at Bugs in LLM Inference Engines

Mugeng Liu, Siqi Zhong, Weichen Bi et al.

Large language model-specific inference engines (in short as \emph{LLM inference engines}) have become a fundamental component of modern AI infrastructure, enabling the deployment of LLM-powered applications (LLM apps) across cloud and local devices. Despite their critical role, LLM inference engines are prone to bugs due to the immense resource demands of LLMs and the complexities of cross-platform compatibility. However, a systematic understanding of these bugs remains lacking. To bridge this gap, we present the first empirical study on bugs in LLM inference engines. We mine official repositories of 5 widely adopted LLM inference engines, constructing a comprehensive dataset of 929 real-world bugs. Through a rigorous open coding process, we analyze these bugs to uncover their symptoms, root causes, commonality, fix effort, fix strategies, and temporal evolution. Our findings reveal six bug symptom types and a taxonomy of 28 root causes, shedding light on the key challenges in bug detection and location within LLM inference engines. Based on these insights, we propose a series of actionable implications for researchers, inference engine vendors, and LLM app developers, along with general guidelines for developing LLM inference engines.

en cs.SE
arXiv Open Access 2025
Toward Copyright Integrity and Verifiability via Multi-Bit Watermarking for Intelligent Transportation Systems

Yihao Wang, Lingxiao Li, Yifan Tang et al.

Intelligent transportation systems (ITS) use advanced technologies such as artificial intelligence to significantly improve traffic flow management efficiency, and promote the intelligent development of the transportation industry. However, if the data in ITS is attacked, such as tampering or forgery, it will endanger public safety and cause social losses. Therefore, this paper proposes a watermarking that can verify the integrity of copyright in response to the needs of ITS, termed ITSmark. ITSmark focuses on functions such as extracting watermarks, verifying permission, and tracing tampered locations. The scheme uses the copyright information to build the multi-bit space and divides this space into multiple segments. These segments will be assigned to tokens. Thus, the next token is determined by its segment which contains the copyright. In this way, the obtained data contains the custom watermark. To ensure the authorization, key parameters are encrypted during copyright embedding to obtain cipher data. Only by possessing the correct cipher data and private key, can the user entirely extract the watermark. Experiments show that ITSmark surpasses baseline performances in data quality, extraction accuracy, and unforgeability. It also shows unique capabilities of permission verification and tampered location tracing, which ensures the security of extraction and the reliability of copyright verification. Furthermore, ITSmark can also customize the watermark embedding position and proportion according to user needs, making embedding more flexible.

en cs.CR, cs.CL
arXiv Open Access 2025
Quantum Software Engineering and Potential of Quantum Computing in Software Engineering Research: A Review

Ashis Kumar Mandal, Md Nadim, Chanchal K. Roy et al.

Research in software engineering is essential for improving development practices, leading to reliable and secure software. Leveraging the principles of quantum physics, quantum computing has emerged as a new computational paradigm that offers significant advantages over classical computing. As quantum computing progresses rapidly, its potential applications across various fields are becoming apparent. In software engineering, many tasks involve complex computations where quantum computers can greatly speed up the development process, leading to faster and more efficient solutions. With the growing use of quantum-based applications in different fields, quantum software engineering (QSE) has emerged as a discipline focused on designing, developing, and optimizing quantum software for diverse applications. This paper aims to review the role of quantum computing in software engineering research and the latest developments in QSE. To our knowledge, this is the first comprehensive review on this topic. We begin by introducing quantum computing, exploring its fundamental concepts, and discussing its potential applications in software engineering. We also examine various QSE techniques that expedite software development. Finally, we discuss the opportunities and challenges in quantum-driven software engineering and QSE. Our study reveals that quantum machine learning (QML) and quantum optimization have substantial potential to address classical software engineering tasks, though this area is still limited. Current QSE tools and techniques lack robustness and maturity, indicating a need for more focus. One of the main challenges is that quantum computing has yet to reach its full potential.

en cs.SE
arXiv Open Access 2025
Cybersecurity in Transportation Systems: Policies and Technology Directions

Ostonya Thomas, M Sabbir Salek, Jean-Michel Tine et al.

The transportation industry is experiencing vast digitalization as a plethora of technologies are being implemented to improve efficiency, functionality, and safety. Although technological advancements bring many benefits to transportation, integrating cyberspace across transportation sectors has introduced new and deliberate cyber threats. In the past, public agencies assumed digital infrastructure was secured since its vulnerabilities were unknown to adversaries. However, with the expansion of cyberspace, this assumption has become invalid. With the rapid advancement of wireless technologies, transportation systems are increasingly interconnected with both transportation and non-transportation networks in an internet-of-things ecosystem, expanding cyberspace in transportation and increasing threats and vulnerabilities. This study investigates some prominent reasons for the increase in cyber vulnerabilities in transportation. In addition, this study presents various collaborative strategies among stakeholders that could help improve cybersecurity in the transportation industry. These strategies address programmatic and policy aspects and suggest avenues for technological research and development. The latter highlights opportunities for future research to enhance the cybersecurity of transportation systems and infrastructure by leveraging hybrid approaches and emerging technologies.

en cs.CR
arXiv Open Access 2025
Knowledge-Based Aerospace Engineering -- A Systematic Literature Review

Tim Wittenborg, Ildar Baimuratov, Ludvig Knöös Franzén et al.

The aerospace industry operates at the frontier of technological innovation while maintaining high standards regarding safety and reliability. In this environment, with an enormous potential for re-use and adaptation of existing solutions and methods, Knowledge-Based Engineering (KBE) has been applied for decades. The objective of this study is to identify and examine state-of-the-art knowledge management practices in the field of aerospace engineering. Our contributions include: 1) A SWARM-SLR of over 1,000 articles with qualitative analysis of 164 selected articles, supported by two aerospace engineering domain expert surveys. 2) A knowledge graph of over 700 knowledge-based aerospace engineering processes, software, and data, formalized in the interoperable Web Ontology Language (OWL) and mapped to Wikidata entries where possible. The knowledge graph is represented on the Open Research Knowledge Graph (ORKG), and an aerospace Wikibase, for reuse and continuation of structuring aerospace engineering knowledge exchange. 3) Our resulting intermediate and final artifacts of the knowledge synthesis, available as a Zenodo dataset. This review sets a precedent for structured, semantic-based approaches to managing aerospace engineering knowledge. By advancing these principles, research, and industry can achieve more efficient design processes, enhanced collaboration, and a stronger commitment to sustainable aviation.

en cs.CE
arXiv Open Access 2025
Ten Simple Rules for Catalyzing Collaborations and Building Bridges between Research Software Engineers and Software Engineering Researchers

Nasir U. Eisty, Jeffrey C. Carver, Johanna Cohoon et al.

In the evolving landscape of scientific and scholarly research, effective collaboration between Research Software Engineers (RSEs) and Software Engineering Researchers (SERs) is pivotal for advancing innovation and ensuring the integrity of computational methodologies. This paper presents ten strategic guidelines aimed at fostering productive partnerships between these two distinct yet complementary communities. The guidelines emphasize the importance of recognizing and respecting the cultural and operational differences between RSEs and SERs, proactively initiating and nurturing collaborations, and engaging within each other's professional environments. They advocate for identifying shared challenges, maintaining openness to emerging problems, ensuring mutual benefits, and serving as advocates for one another. Additionally, the guidelines highlight the necessity of vigilance in monitoring collaboration dynamics, securing institutional support, and defining clear, shared objectives. By adhering to these principles, RSEs and SERs can build synergistic relationships that enhance the quality and impact of research outcomes.

arXiv Open Access 2025
Work in Progress: AI-Powered Engineering-Bridging Theory and Practice

Oz Levy, Ilya Dikman, Natan Levy et al.

This paper explores how generative AI can help automate and improve key steps in systems engineering. It examines AI's ability to analyze system requirements based on INCOSE's "good requirement" criteria, identifying well-formed and poorly written requirements. The AI does not just classify requirements but also explains why some do not meet the standards. By comparing AI assessments with those of experienced engineers, the study evaluates the accuracy and reliability of AI in identifying quality issues. Additionally, it explores AI's ability to classify functional and non-functional requirements and generate test specifications based on these classifications. Through both quantitative and qualitative analysis, the research aims to assess AI's potential to streamline engineering processes and improve learning outcomes. It also highlights the challenges and limitations of AI, ensuring its safe and ethical use in professional and academic settings.

en eess.SY, cs.SE
arXiv Open Access 2025
Extending Behavioral Software Engineering: Decision-Making and Collaboration in Human-AI Teams for Responsible Software Engineering

Lekshmi Murali Rani

The study of behavioral and social dimensions of software engineering (SE) tasks characterizes behavioral software engineering (BSE);however, the increasing significance of human-AI collaboration (HAIC) brings new directions in BSE by presenting new challenges and opportunities. This PhD research focuses on decision-making (DM) for SE tasks and collaboration within human-AI teams, aiming to promote responsible software engineering through a cognitive partnership between humans and AI. The goal of the research is to identify the challenges and nuances in HAIC from a cognitive perspective, design and optimize collaboration/partnership (human-AI team) that enhance collective intelligence and promote better, responsible DM in SE through human-centered approaches. The research addresses HAIC and its impact on individual, team, and organizational level aspects of BSE.

en cs.SE
arXiv Open Access 2024
Requirements Engineering for Research Software: A Vision

Adrian Bajraktari, Michelle Binder, Andreas Vogelsang

Modern science is relying on software more than ever. The behavior and outcomes of this software shape the scientific and public discourse on important topics like climate change, economic growth, or the spread of infections. Most researchers creating software for scientific purposes are not trained in Software Engineering. As a consequence, research software is often developed ad hoc without following stringent processes. With this paper, we want to characterize research software as a new application domain that needs attention from the Requirements Engineering community. We conducted an exploratory study based on 8 interviews with 12 researchers who develop software. We describe how researchers elicit, document, and analyze requirements for research software and what processes they follow. From this, we derive specific challenges and describe a vision of Requirements Engineering for research software.

Halaman 3 dari 323136