The maximal guaranteed result in a hierarchical game with an undetermined factor is found in the class of strategies with feedback. The stability of the problem under consideration concerning perturbations of the payo...
The maximal guaranteed result in a hierarchical game with an undetermined factor is found in the class of strategies with feedback. The stability of the problem under consideration concerning perturbations of the payoff function of the lower-level player is studied. Regularizing estimates are obtained.
Multiple-valued logic is a promising choice for future computer technologies, which provides a set of advantages comparing to binary circuits. In this paper, we have developed a genetic algorithm-based synthesis of te...
详细信息
Multiple-valued logic is a promising choice for future computer technologies, which provides a set of advantages comparing to binary circuits. In this paper, we have developed a genetic algorithm-based synthesis of ternary reversible circuits using Muthukrishnan-Stroud gates. The method for chromosomes coding, as well as a reasonable choice of algorithm parameters, allowed obtaining circuits for ternary Toffoli and modified Fredkin gates, which are better than other published methods in terms of quantum cost, delay times and amount of input ancillary and output garbage qutrits.
This paper is concerned with the finite-horizon recursive filtering problem for a class of nonlinear time-varying systems with missing measurements. The missing measurements are modeled by a series of mutually indepen...
详细信息
Open Educational Resources (OERs) are freely accessible materials for teaching, learning, and research that have been made available such that they can be freely used, modified, and shared. Prompted by the potential p...
详细信息
In medical practice, the precision of image segmentation is crucial for diagnosis and treatment evaluations. Specifically, in dentistry, accurate teeth segmentation from bite-wing images is important for automatic and...
详细信息
With the rapid development of industrial internet services, the integration of IT/OT has enabled the continuous expansion of network security boundaries and put forward higher requirements for platform application cro...
详细信息
In this paper we present a comparative analysis of two algorithms for image representation with application to recognition of 3D face scans with the presence of facial expressions. We begin with processing of the inpu...
详细信息
In this paper we present a comparative analysis of two algorithms for image representation with application to recognition of 3D face scans with the presence of facial expressions. We begin with processing of the input point cloud based on curvature analysis and range image representation to achieve a unique representation of the face features. Then, subspace projection using Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) are performed. Finally classification with different classifiers will be performed.
With the development of artificial intelligence technology,various sectors of industry have *** them,the autonomous vehicle industry has developed considerably,and research on self-driving controlsystems using artifi...
详细信息
With the development of artificial intelligence technology,various sectors of industry have *** them,the autonomous vehicle industry has developed considerably,and research on self-driving controlsystems using artificial intelligence has been extensively *** on the use of image-based deep learning to monitor autonomous driving systems have recently been *** this paper,we propose an advanced control for a serving robot.A serving robot acts as an autonomous line-follower vehicle that can detect and follow the line drawn on the floor and move in specified *** robot should be able to follow the trajectory with speed *** controllers were used simultaneously to achieve *** neural networks(CNNs)are used for target tracking and trajectory prediction,and a proportional-integral-derivative controller is designed for automatic steering and speed *** study makes use of a Raspberry PI,which is responsible for controlling the robot car and performing inference using CNN,based on its current image input.
At present, industrial Internet data is facing a severe security situation in storage, transmission, and use. This paper proposes data security management and security protection strategies by studying the data securi...
详细信息
暂无评论