66   Artículos

 
en línea
Bowen Xing, Xiao Wang and Zhenchong Liu    
The path planning strategy of deep-sea mining vehicles is an important factor affecting the efficiency of deep-sea mining missions. However, the current traditional path planning algorithms suffer from hose entanglement problems and small coverage in the... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Sungwon Moon, Seolwon Koo, Yujin Lim and Hyunjin Joo    
With recent technological advancements, the commercialization of autonomous vehicles (AVs) is expected to be realized soon. However, it is anticipated that a mixed traffic of AVs and human-driven vehicles (HVs) will persist for a considerable period unti... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chengpeng Jiang, Shuai Chen, Jinglin Li, Haoran Wang, Jing Wang, Taian Xu and Wendong Xiao    
Wireless energy transfer technology (WET)-enabled mobile charging provides an innovative strategy for energy replenishment in wireless rechargeable sensor networks (WRSNs), where the mobile charger (MC) can charge the sensors sequentially by WET accordin... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Junkai Yi and Xiaoyan Liu    
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losse... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Shao Xuan Seah and Sutthiphong Srigrarom    
This paper explores the use of deep reinforcement learning in solving the multi-agent aircraft traffic planning (individual paths) and collision avoidance problem for a multiple UAS, such as that for a cargo drone network. Specifically, the Deep Q-Networ... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Antonio Maci, Alessandro Santorsola, Antonio Coscia and Andrea Iannacone    
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramou... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Hy Nguyen, Srikanth Thudumu, Hung Du, Kon Mouzakis and Rajesh Vasa    
Several approaches have applied Deep Reinforcement Learning (DRL) to Unmanned Aerial Vehicles (UAVs) to do autonomous object tracking. These methods, however, are resource intensive and require prior knowledge of the environment, making them difficult to... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Minh Tran, Duc Pham-Hi and Marc Bui    
In this paper, we propose a novel approach to optimize parameters for strategies in automated trading systems. Based on the framework of Reinforcement learning, our work includes the development of a learning environment, state representation, reward fun... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Yuxin Zhao, Yanlong Liu and Xiong Deng    
The observation path planning of an ocean mobile observation network is an important part of the ocean mobile observation system. With the aim of developing a traditional algorithm to solve the observation path of the mobile observation network, a comple... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Bin Li, Caijie Yang and Zhongzhen Yang    
In response to the evolving challenges of the integration and combination of multiple container terminal operations under berth water depth constraints, the multi-terminal dynamic and continuous berth allocation problem emerges as a critical issue. Based... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »