|
|
|
Igor Kotenko, Igor Saenko, Andrey Privalov and Oleg Lauta
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic networks. Unlike oth...
ver más
|
|
|
|
|
|
|
Jiaming Ye, Defu Che, Baodong Ma, Quan Liu, Kehan Qiu and Xiangxiang Shang
Existing approaches for the 3D modeling of tunnels suffer from several problems, such as highly difficult data acquisition, redundancy of model data, large computational burden, and the inability of the resulting models to be monolithic. Therefore, solut...
ver más
|
|
|
|
|
|
|
Jiawei Kang, Shangwen Yang, Xiaoxuan Shan, Jie Bao and Zhao Yang
Exploring the delay causality between airports and comparing the delay propagation patterns across different airport networks is critical to better understand delay propagation mechanisms and provide effective delay mitigation strategies. A novel attenti...
ver más
|
|
|
|
|
|
|
Zhuangzhuang Yang, Chengxin Pang and Xinhua Zeng
Predicting the future trajectories of multiple agents is essential for various applications in real life, such as surveillance systems, autonomous driving, and social robots. The trajectory prediction task is influenced by many factors, including individ...
ver más
|
|
|
|
|
|
|
Thi Hong Diep Dao and Jean-Claude Thill
In this paper, we take the position that cities gain to be represented as three-dimensional spaces populated by scores of micro-scale-built spaces (buildings, rooms, passageways, squares, etc.). Effective algorithms that evaluate place-based accessibilit...
ver más
|
|
|
|
|
|
|
Xiongfeng Yan and Min Yang
The shape encoding of geospatial objects is a key problem in the fields of cartography and geoscience. Although traditional geometric-based methods have made great progress, deep learning techniques offer a development opportunity for this classical prob...
ver más
|
|
|
|
|
|
|
Erika Nazaruka
Pág. 28 - 43
Specification and traceability of security requirements is still a challenge since modeling and analysis of security aspects of systems require additional efforts at the very beginning of software development. The topological functioning model is a forma...
ver más
|
|
|
|
|
|
|
Edgars Edelmers, Dzintra Kazoka, Katrina Bolocko and Mara Pilmane
The choice of technique for the creation of a 3D digital human bone model from natural specimens has a critical impact on the final result and usability of the obtained model. The cornerstone factor in 3D modeling is the number of faces of polygon mesh, ...
ver más
|
|
|
|
|
|
|
Yang Liu and Mei-Po Kwan
Deriving the proper structure of lotic habitats, namely the structuralization of lotic habitats, is crucial to monitoring and modeling water quality on a large scale. How to structuralize complicated lotic habitats for practical use remains challenging. ...
ver más
|
|
|
|
|
|
|
Ji-Hong Li, Hyungjoo Kang, Min-Gyu Kim, Mun-Jik Lee, Gun Rae Cho and Han-Sol Jin
In this paper, we present a 3D formation control scheme for a group of torpedo-type underactuated autonomous underwater vehicles (AUVs). These multiple AUVs combined with an unmanned surface vessel (USV) construct a sort of star-topology acoustic communi...
ver más
|
|
|
|