This study investigates robot path planning for multiple agents,focusing on the critical requirement that agents can pursue concurrent pathways without *** agent is assigned a task within the environment to reach a de...
详细信息
This study investigates robot path planning for multiple agents,focusing on the critical requirement that agents can pursue concurrent pathways without *** agent is assigned a task within the environment to reach a designated *** the map or goal changes unexpectedly,particularly in dynamic and unknown environments,it can lead to potential failures or performance degradation in various ***,priority inheritance plays a significant role in path planning and can impact *** study proposes a ConflictBased Search(CBS)approach,introducing a unique hierarchical search mechanism for planning paths for multiple *** study aims to enhance flexibility in adapting to different *** scenarios were tested,and the accuracy of the proposed algorithm was *** the first scenario,path planning was applied in unknown environments,both stationary and mobile,yielding excellent results in terms of time to arrival and path length,with a time of 2.3 *** the second scenario,the algorithm was applied to complex environments containing sharp corners and unknown obstacles,resulting in a time of 2.6 s,with the algorithm also performing well in terms of path *** the final scenario,the multi-objective algorithm was tested in a warehouse environment containing fixed,mobile,and multi-targeted obstacles,achieving a result of up to 100.4 *** on the results and comparisons with previous work,the proposed method was found to be highly effective,efficient,and suitable for various environments.
In an era dominated by information dissemination through various channels like newspapers,social media,radio,and television,the surge in content production,especially on social platforms,has amplified the challenge of...
详细信息
In an era dominated by information dissemination through various channels like newspapers,social media,radio,and television,the surge in content production,especially on social platforms,has amplified the challenge of distinguishing between truthful and deceptive *** news,a prevalent issue,particularly on social media,complicates the assessment of news *** pervasive spread of fake news not only misleads the public but also erodes trust in legitimate news sources,creating confusion and polarizing *** the volume of information grows,individuals increasingly struggle to discern credible content from false narratives,leading to widespread misinformation and potentially harmful *** numerous methodologies proposed for fake news detection,including knowledge-based,language-based,and machine-learning approaches,their efficacy often diminishes when confronted with high-dimensional datasets and data riddled with noise or *** study addresses this challenge by evaluating the synergistic benefits of combining feature extraction and feature selection techniques in fake news *** employ multiple feature extraction methods,including Count Vectorizer,Bag of Words,Global Vectors for Word Representation(GloVe),Word to Vector(Word2Vec),and Term Frequency-Inverse Document Frequency(TF-IDF),alongside feature selection techniques such as Information Gain,Chi-Square,Principal Component Analysis(PCA),and Document *** comprehensive approach enhances the model’s ability to identify and analyze relevant features,leading to more accurate and effective fake news *** findings highlight the importance of a multi-faceted approach,offering a significant improvement in model accuracy and ***,the study emphasizes the adaptability of the proposed ensemble model across diverse datasets,reinforcing its potential for broader application in real-world *** introduce a pioneering ensemble
The increase in waste and related environmental problems is one of the major problems compromising health and environmental quality in urban and rural areas. There are a number of policies that can be implemented to r...
详细信息
This study illustrates a dual-band circular and pentagon antenna with dual-band configuration for the high return loss. When an antenna has a greater return loss, less power is reflected toward the transmitter, implyi...
详细信息
Integration of phase-change materials(PCMs)created a unique opportunity to implement reconfigurable photonics devices that their performance can be tuned depending on the target *** PCMs such as Ge-Sb-Te(GST)and Ge-Sb...
详细信息
Integration of phase-change materials(PCMs)created a unique opportunity to implement reconfigurable photonics devices that their performance can be tuned depending on the target *** PCMs such as Ge-Sb-Te(GST)and Ge-Sb-Se-Te(GSST)rely on melt-quench and high temperature annealing processes to change the organization of the molecules in the materials’*** a reorganization leads to different optical,electrical,and thermal properties which can be exploited to implement photonic memory cells that are able to store the data at different resistance or optical transmission *** the great promise of conventional PCMs for realizing reconfigurable photonic memories,their slow and extremely power-hungry thermal mechanisms make scaling the systems based on such devices *** addition,such materials do not offer a stable multi-level response over a long period of *** address these shortcomings,the research carried out in this study shows the proof of concept to implement next-generation photonic memory cells based on two-dimensional(2D)birefringence PCMs such as SnSe,which offer anisotropic optical properties that can be switched *** demonstrate that by leveraging the ultrafast and low-power crystallographic direction change of the material,the optical polarization state of the input optical signal can be *** enables the implementation of next-generation high-speed polarization-encodable photonic memory cells for future photonic computing *** to the conventional PCMs,the proposed SnSe-based photonic memory cells offer an ultrafast switching and low-loss optical response relying on ferroelectric property of SnSe to encode the data on the polarization state of the input optical *** a polarization encoding scheme also reduces memory read-out errors and alleviates the scalability limitations due to the optical insertion loss often seen in optical transmission encoding.
Let P be a set of points in the plane and let T be a maximum-weight spanning tree of P. For an edge (p, q), let Dpq be the diametral disk induced by (p, q), i.e., the disk having the segment pq as its diameter. Let DT...
详细信息
The smart world under Industry 4.0 is witnessing a notable spurt in sleep disorders and sleep-related issues in patients. Artificial intelligence and IoT are taking a giant leap in connecting sleep patients remotely w...
详细信息
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets ...
详细信息
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected *** detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual *** learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device *** addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to *** ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT *** overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)*** GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT *** data preprocessing,the min-max data normalization approach is primarily *** GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature ***,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet ***,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM *** experimental validation of the GTODL-BADC technique can be tested on a benchmark *** simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process.
The permanent magnet (PM) Vernier machines enhance torque density and decrease cogging torque compared to conventional permanent magnet synchronous motor. This paper presents a novel fractional-slot H-shaped PM Vernie...
详细信息
Automatic Speech Recognition systems that convert language into written text have greatly transformed human–machine interaction. Although these systems have achieved results, in languages building accurate and reliab...
详细信息
暂无评论