Legged robotic systems can play an important role in real-world applications due to their superior load-bearing capabilities, enhanced autonomy, and effective navigation on uneven terrain. They offer an optimal trade-...
详细信息
Visual simultaneous localisation and mapping(vSLAM)finds applications for indoor and outdoor navigation that routinely subjects it to visual complexities,particularly mirror *** effect of mirror presence(time visible ...
详细信息
Visual simultaneous localisation and mapping(vSLAM)finds applications for indoor and outdoor navigation that routinely subjects it to visual complexities,particularly mirror *** effect of mirror presence(time visible and its average size in the frame)was hypothesised to impact localisation and mapping performance,with systems using direct techniques expected to perform ***,a dataset,MirrEnv,of image sequences recorded in mirror environments,was collected,and used to evaluate the performance of existing representative *** ORB-SLAM3 and BundleFusion appear to show moderate degradation of absolute trajectory error with increasing mirror duration,whilst the remaining results did not show significantly degraded localisation *** mesh maps generated proved to be very inaccurate,with real and virtual reflections colliding in the reconstructions.A discussion is given of the likely sources of error and robustness in mirror environments,outlining future directions for validating and improving vSLAM performance in the presence of planar *** MirrEnv dataset is available at https://***/10.17035/d.2023.0292477898.
The BART model is an advanced adaptation of transformers introduced by Facebook. It has incorporated elements from both BERT and GPT transformers, enabling significant advancements in language understanding and genera...
详细信息
In this paper, an efficient resource allocation scheme-based nonlinear energy harvesting (EH) Timeslot switching (TS) for single-input-single-output (SISO) SWIPT systems-(ERAS-NETS) is presented. The energy saturation...
详细信息
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the ***,smart healthcare has emerged as a significant application of the IoMT,parti...
详细信息
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the ***,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning *** healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical *** smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance *** security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of ***,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission *** address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos *** results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,*** validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks.
The classification of blood donor candidates is a crucial process that requires thorough health checks and assessments. Implementing a reliable and efficient classification system for blood donor candidates is essenti...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and protectable events,in order to make the proposed methodology applicable to various practical systems and employ two existing works of DES security:Degree of opacity and state ***,the authors consider that all protectable events are observable,and some observable events are *** addition,protectable events cannot be protected once they are *** such a constraint,the goal is to figure out which events to conceal and which transitions to protect so that the prescribed requirements of degree of opacity and state protection are *** this work the authors decide which events to conceal as all transitions of a given event label are concealed or not *** proposed problem formulation also requires a solution to only involve absolutely necessary protectable events in order for the system to avoid superfluous protection *** authors first examine a general version of our security problem with an intuitive algorithm to compute acceptable solutions,and then present a special version which results in a reduced computation time compared to the general version.
This study presents an edge-based system for underwater image enhancement using CLAHE and its fusion with various techniques. Utilizing the NVIDIA Jetson Orin Nano and the Streamlit framework, the system processes ima...
详细信息
This paper studies markerless augmented reality applications for displaying digital objects on different colored surfaces under varying lighting conditions and tracking angles. The study aimed to evaluate the applicat...
详细信息
The importance of sound recognition and classification systems in various fields has led researchers to seek innovative methods to address these challenges. In this paper, the authors propose a concise yet effective a...
详细信息
暂无评论