|
|
|
Avi Shaked and Oded Margalit
The cyber threat landscape is highly dynamic, posing a significant risk to the operations of systems and organisations. An organisation should, therefore, continuously monitor for new threats and properly contextualise them to identify and manage the res...
ver más
|
|
|
|
|
|
Yudong Hu, Changsheng Gao and Wuxing Jing
Aimed at joint state and parameter estimation problems in hypersonic glide vehicle defense, a novel moving horizon estimation algorithm via Carleman linearization is developed in this paper. First, the maneuver characteristic parameters that reflect the ...
ver más
|
|
|
|
|
|
Haiying Liu, Yuncheng Pei, Qiancheng Bei and Lixia Deng
At present, the detection-based pedestrian multi-target tracking algorithm is widely used in artificial intelligence, unmanned driving cars, virtual reality and other fields, and has achieved good tracking results. The traditional DeepSORT algorithm main...
ver más
|
|
|
|
|
|
Mohammed A. Qasim, Vladimir I. Velkin and Sergey E. Shcheklein
At the present time, the entire world is suffering from global climate change due to emissions caused by the combustion of fossil fuels. Thus, it is necessary to look for alternative power sources to generate clean electrical energy. Thermoelectric gener...
ver más
|
|
|
|
|
|
Synne Frydenberg, Katie Aylward, Kjetil Nordby and Jon Olav H. Eikenes
A vessel convoy is a complex and high-risk operation completed during icebreaking operations in the Arctic. Icebreaker navigators need to continuously communicate with their crew while monitoring information such as speed, heading, and distance between v...
ver más
|
|
|