Access to a topological map is important to network management. Autonomic Networks have been developed, in part, because they provide a convenient, secure platform for the development of operations, administration and...
详细信息
The growing field of urban monitoring has increasingly recognized the potential of utilizing autonomous technologies,particularly in drone *** deployment of intelligent drone swarms offers promising solutions for enha...
详细信息
The growing field of urban monitoring has increasingly recognized the potential of utilizing autonomous technologies,particularly in drone *** deployment of intelligent drone swarms offers promising solutions for enhancing the efficiency and scope of urban condition *** this context,this paper introduces an innovative algorithm designed to navigate a swarm of drones through urban landscapes for monitoring *** primary challenge addressed by the algorithm is coordinating drone movements from one location to another while circumventing obstacles,such as *** algorithm incorporates three key components to optimize the obstacle detection,navigation,and energy efficiency within a drone ***,the algorithm utilizes a method to calculate the position of a virtual leader,acting as a navigational beacon to influence the overall direction of the ***,the algorithm identifies observers within the swarm based on the current *** further refine obstacle avoidance,the third component involves the calculation of angular velocity using fuzzy *** approach considers the proximity of detected obstacles through operational rangefinders and the target’s location,allowing for a nuanced and adaptable computation of angular *** integration of fuzzy logic enables the drone swarm to adapt to diverse urban conditions dynamically,ensuring practical obstacle *** proposed algorithm demonstrates enhanced performance in the obstacle detection and navigation accuracy through comprehensive *** results suggest that the intelligent obstacle avoidance algorithm holds promise for the safe and efficient deployment of autonomous mobile drones in urban monitoring applications.
So as to reduce the interference of noisy information and enhance the accuracy of car marker image recognition in real life, a car marker image recognition model based on deep residual shrinkage network is proposed. T...
详细信息
This paper proposes a new on-demand wireless energy transfer (WET) scheme of multiple unmanned aerial vehicles (UAVs). Unlike the existing studies that simply pursuing the total or the minimum harvested energy maximiz...
详细信息
Multi-view multi-person 3D human pose estimation is a hot topic in the field of human pose estimation due to its wide range of application *** the introduction of end-to-end direct regression methods,the field has ent...
详细信息
Multi-view multi-person 3D human pose estimation is a hot topic in the field of human pose estimation due to its wide range of application *** the introduction of end-to-end direct regression methods,the field has entered a new stage of ***,the regression results of joints that are more heavily influenced by external factors are not accurate enough even for the optimal *** this paper,we propose an effective feature recalibration module based on the channel attention mechanism and a relative optimal calibration strategy,which is applied to themulti-viewmulti-person 3D human pose estimation task to achieve improved detection accuracy for joints that are more severely affected by external ***,it achieves relative optimal weight adjustment of joint feature information through the recalibration module and strategy,which enables the model to learn the dependencies between joints and the dependencies between people and their corresponding *** call this method as the Efficient Recalibration Network(ER-Net).Finally,experiments were conducted on two benchmark datasets for this task,Campus and Shelf,in which the PCP reached 97.3% and 98.3%,respectively.
As the most common data structure for key-value stores, LogStructured Merge Tree (LSM-tree) can eliminate random write operations and keep acceptable read performance. However, write stall and write amplification intr...
详细信息
Log-structured merge-tree (LSM-tree) is a storage architecture widely used in key-value (KV) stores. To enhance the read efficiency of LSM-tree, recent works utilize the learned index to learn the mapping between keys...
详细信息
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ...
详细信息
Kubernetes,a container orchestrator for cloud-deployed applications,allows the application provider to scale automatically to match thefluctuating intensity of processing *** cluster technology is used to encapsulate,...
详细信息
Kubernetes,a container orchestrator for cloud-deployed applications,allows the application provider to scale automatically to match thefluctuating intensity of processing *** cluster technology is used to encapsulate,isolate,and deploy applications,addressing the issue of low system reliability due to interlocking ***-based platforms usually entail users define application resource supplies for eco container *** is a constant problem of over-service in data centers for cloud service *** operating costs and incompetent resource utilization can occur in a waste of *** revolutionized the orchestration of the container in the cloud-native *** can adaptively manage resources and schedule containers,which provide real-time status of the cluster at runtime without the user’s *** clusters face unpredictable traffic,and the cluster performs manual expansion configuration by the *** to operational delays,the system will become unstable,and the service will be *** work proposed an RBACS that vigorously amended the distribution of containers operating in the entire Kubernetes *** allocation pattern is analyzed with the Kubernetes *** estimate the overall cost of RBACS,we use several scientific benchmarks comparing the accomplishment of container to remote node migration and on-site *** experiments ran on the simulations to show the method’s effectiveness yielded high precision in the real-time deployment of resources in eco *** to the default baseline,Kubernetes results in much fewer dropped requests with only slightly more supplied resources.
In an ever-changing environment,software as a Service(SaaS)can rarely protect users'*** able to manage and control the privacy is therefore an important goal for *** the participant of composite service is substit...
详细信息
In an ever-changing environment,software as a Service(SaaS)can rarely protect users'*** able to manage and control the privacy is therefore an important goal for *** the participant of composite service is substituted,it is unclear whether the composite service satisfy user privacy requirement or *** this paper,we propose a privacy policies automatic update method to enhance user privacy when a service participant change in the composite ***,we model the privacy policies and service variation ***,according to the service variation rules,the privacy policies are automatically generated through the negotiation between user and service ***,we prove the feasibility and applicability of our method with the *** the service quantity is 50,ratio that the services variations are successfully checked by monitor is 81%.Moreover,ratio that the privacy policies are correctly updated is 93.6%.
暂无评论