Object tracking is a crucial field in computer vision, with significant applications in areas like drone operation and intelligent driving, where real-time performance and high accuracy are essential. Conventional cor...
详细信息
This paper delves into the domain of Four Wheel Differential (4WD) Unmanned Ground Vehicles (UGV) and their autonomous navigation. The paper discusses the design and development of a 4WD UGV with sensor integration an...
详细信息
Medical image segmentation is a crucial step toward automatic clinical diagnosis, which has received growing interest. Although some existing methods based on convolutional neural networks or transformers have achieve...
详细信息
This work studies the distributed formation control problem of behavior-based unmanned aerial vehicles (UAVs). A novel distributed reinforcement learning behavioral control (DRLBC) is proposed to reduce the cost durin...
详细信息
The increasing demand for digital content is putting a strain on network infrastructures, prompting a shift towards edge server architecture, which aims to decentralize data processing and reduce content delivery late...
详细信息
With the developments of offshore oil industry, a large number of specification documents have been implemented in the field of offshore oil engineering quality, which has placed significant posed pressure and a serie...
详细信息
Under the Bayesian restoration framework, this paper aims at the problem of the inadequate accuracy of the sparse solution under the traditional convex regularization constraint, which leads to the loss of texture det...
详细信息
Mobile robots are increasingly being used to automate life science laboratories. Intelligent, easy-to-implement methods must be developed for tracking labware and samples. Modern solutions based on IoT (Internet of Th...
详细信息
The travel industry is undergoing profound changes with the continuous development of information technology. One such emerging technology is cloud computing, which boasts powerful computing power, massive storage spa...
详细信息
Penetration testing (Pen-Testing) detects potential vulnerabilities and exploits by imitating black hat hackers to stop cyber crimes. Despite recent attempts to automate Pen-Testing, the issue of automation is still u...
详细信息
暂无评论