|
|
|
Hanqiao Huang, Weiye Weng, Huan Zhou, Zijian Jiang and Yue Dong
When facing problems in the aerial pursuit game, most of the current unmanned aerial vehicles (UAVs) have good maneuverability performance, but it is difficult to utilize the overload maneuverability of UAVs properly; further, UAVs tend to be more costly...
ver más
|
|
|
|
|
|
|
Saad Inshi, Rasel Chowdhury, Hakima Ould-Slimane and Chamseddine Talhi
Predicting context-aware activities using machine-learning techniques is evolving to become more readily available as a major driver of the growth of IoT applications to match the needs of the future smart autonomous environments. However, with today?s i...
ver más
|
|
|
|
|
|
|
Kai Zhou, Yan Xie, Zhan Gao, Fang Miao and Lei Zhang
Road semantic segmentation is unique and difficult. Road extraction from remote sensing imagery often produce fragmented road segments leading to road network disconnection due to the occlusion of trees, buildings, shadows, cloud, etc. In this paper, we ...
ver más
|
|
|
|
|
|
|
Elisabetta Colucci, Xufeng Xing, Margarita Kokla, Mir Abolfazl Mostafavi, Francesca Noardo and Antonia Spanò
Nowadays, cultural and historical built heritage can be more effectively preserved, valorised and documented using advanced geospatial technologies. In such a context, there is a major issue concerning the automation of the process and the extraction of ...
ver más
|
|
|
|
|
|
|
Fernando De la Prieta, Sara Rodríguez-González, Pablo Chamoso, Yves Demazeau and Juan Manuel Corchado
The cloud computing paradigm has the ability to adapt to new technologies and provide consistent cloud services. These features have led to the widespread use of the paradigm, making it necessary for the underlying computer infrastructure to cope with th...
ver más
|
|
|
|
|
|
|
Andrei Brazhuk,Evgeny Olizarovich
Pág. 14 - 20
Threat modelling of a computer system is based on the system analysis of its architecture on early development stages (requirements, design) and creation of a threat model that represents security aspects of the system (threats and mitigations). Used in ...
ver más
|
|
|
|
|
|
|
Florent Poux, Romain Neuville, Line Van Wersch, Gilles-Antoine Nys and Roland Billen
Digital investigations of the real world through point clouds and derivatives are changing how curators, cultural heritage researchers and archaeologists work and collaborate. To progressively aggregate expertise and enhance the working proficiency of al...
ver más
|
|
|
|
|
|
|
Ziyun Deng, Lei Chen, Tingqing He and Tao Meng
In order to develop a Supercomputing Cloud Platform (SCP) prototype system using Service-Oriented Architecture (SOA) and Petri nets, we researched some technologies for Web service composition. Specifically, in this paper, we propose a reliability calcul...
ver más
|
|
|
|