Trajectory tracking is a critical issue in the field of mobile robotics. This paper aims to design and implement a backstepping PID controller for trajectory tracking of a differential drive-wheeled mobile robot, eval...
详细信息
In this paper, we explore how to use a Nvidia Jetson Nano and Python to create a system that detects weariness in a person's face using computer vision and machine learning techniques. The system captures the pers...
详细信息
This article describes the invention of autonomous cannabis seeding equipment to reduce contamination and planting time. The automated cannabis seeder employs an NI myRIO control board to operate a y-axis stepper moto...
详细信息
Two-axis gimbals are used in stabilizing and controlling the aiming of optical systems. The main task is to isolate the angular motion of the payload and the disturbances affecting the optical axis of the camera while...
详细信息
Reinforcement learning (RL) has seen significant research and application results but often requires large amounts of training data. This paper proposes two data-efficient off-policy RL methods that use parametrized Q...
详细信息
Regularization of control policies using entropy can be instrumental in adjusting predictability levels of real-world systems. Applications benefiting from such approaches range from cybersecurity, which aims at maxim...
详细信息
This paper presents the possibility of using statistical modeling to automate the process of dynamic pricing management with revenue control and adaptation to current legislation in this area. In addition, it is propo...
详细信息
Functional Data Analysis (FDA) is a modern statistical technique that deals with data in the form of curves or functions. It has recently gained popularity in the field of fault detection as it can capture the dynamic...
详细信息
College of Computer Science Beijing University of technology, Beijing 100124, China, 1374622525@*** This paper proposes a trust collaboration technology for edge computing, addressing trust isolation and security issu...
详细信息
As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur...
详细信息
暂无评论