|
|
|
Mihai Crengani?, Radu-Eugen Breaz, Sever-Gabriel Racz, Claudia-Emilia Gîrjob, Cristina-Maria Biri?, Adrian Maro?an and Alexandru Bârsan
This scientific paper presents the development and validation process of a dynamic model in Simulink used for decision-making regarding the locomotion and driving type of autonomous omnidirectional mobile platforms. Unlike traditional approaches relying ...
ver más
|
|
|
|
|
|
|
Pablo Brusola, Sergio Garcia-Nieto, Jose Vicente Salcedo, Miguel Martinez and Robert H. Bishop
This paper presents a mathematical modeling approach utilizing a fuzzy modeling framework for fixed-wing aircraft systems with the goal of creating a highly desirable mathematical representation for model-based control design applications. The starting p...
ver más
|
|
|
|
|
|
|
Liming Li and Zeang Zhao
To effectively enhance the adaptability of earthquake rescue robots in dynamic environments and complex tasks, there is an urgent need for an evaluation method that quantifies their performance and facilitates the selection of rescue robots with optimal ...
ver más
|
|
|
|
|
|
|
Tianhao Gao, Meng Zhang, Yifan Zhu, Youjian Zhang, Xiangsheng Pang, Jing Ying and Wenming Liu
Classifying sports videos is complex due to their dynamic nature. Traditional methods, like optical flow and the Histogram of Oriented Gradient (HOG), are limited by their need for expertise and lack of universality. Deep learning, particularly Convoluti...
ver más
|
|
|
|
|
|
|
Chengxi Wu, Yuewei Dai, Liang Shan and Zhiyu Zhu
This paper focuses on developing a data-driven trajectory tracking control approach for autonomous underwater vehicles (AUV) under uncertain external disturbance and time-delay. A novel model-free adaptive predictive control (MFAPC) approach based on a f...
ver más
|
|
|
|
|
|
|
Betty Saridou, Isidoros Moulas, Stavros Shiaeles and Basil Papadopoulos
Image conversion of malicious binaries, or binary visualisation, is a relevant approach in the security community. Recently, it has exceeded the role of a single-file malware analysis tool and has become a part of Intrusion Detection Systems (IDSs) thank...
ver más
|
|
|
|
|
|
|
Timothy Ganesan and Irraivan Elamvazuthi
Practical entanglement distillation is a critical component in quantum information theory. Entanglement distillation is often utilized for designing quantum computer networks and quantum repeaters. The practical entanglement distillation problem is formu...
ver más
|
|
|
|
|
|
|
Trishala Chauhan, Shilpa Sindhu and Rahul S. Mor
The spike in internet users led healthcare companies to confer their agile presence on various digital platforms and engage customers online to increase their viability amid the rising competition. Online customer engagement takes place through branded c...
ver más
|
|
|
|
|
|
|
Nguyet-Minh Nguyen, Reza Bahramloo, Jalal Sadeghian, Mehdi Sepehri, Hadi Nazaripouya, Vuong Nguyen Dinh, Afshin Ghahramani, Ali Talebi, Ismail Elkhrachy, Chaitanya B. Pande and Sarita Gajbhiye Meshram
The aim of this paper is to assess the extent to which the Sad-Kalan watershed in Iran participates in floods and rank the Sad-Kalan sub-watersheds in terms of flooding potential by utilizing multi-criteria decision-making approaches. We employed the ent...
ver más
|
|
|
|
|
|
|
Xiaolong Zhou, Xiangkun Wang, Haotian Wang, Linlin Cao, Zhongyuan Xing and Zhilun Yang
Rotor fault diagnosis has attracted much attention due to its difficulties such as non-stationarity of fault signals, difficulty in fault feature extraction and low diagnostic accuracy of small samples. In order to extract fault feature information of ro...
ver más
|
|
|
|