Deep neural networks virtually dominate the domain of most modern vision systems, providing high performance at a cost of increased computational complexity. Since for those systems it is often required to operate bot...
详细信息
Community search is the problem of identifying the community in which a given node *** from traditional community search methods based on specific topological structures,this paper proposes a community search algorith...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
Community search is the problem of identifying the community in which a given node *** from traditional community search methods based on specific topological structures,this paper proposes a community search algorithm based on containment control of multi-agent system by studying the influence of opinion leaders with competitive relationships in community ***,the Breadth-First Search method is used to locally sample the ***,containment control of multi-agent system is applied to obtain the final state of each node for local community ***,grounded in practical considerations,an effective leadership transfer mechanism is proposed to update the results and enhance search *** experiments on real-world networks and synthetic networks in comparison with three local community detection algorithms,the effectiveness and rationality of our algorithm are demonstrated.
Practical and accurate traffic models play an important role in capturing real traffic dynamics and then in achieving effective control performance. This paper studies traffic signal control in a traffic network with ...
详细信息
Location-based service (LBS) devices have enhanced daily life convenience but raised privacy concerns regarding user location data. For this, this research presents a novel approach to safeguard trajectory privacy thr...
详细信息
ISBN:
(数字)9798350381993
ISBN:
(纸本)9798350382006
Location-based service (LBS) devices have enhanced daily life convenience but raised privacy concerns regarding user location data. For this, this research presents a novel approach to safeguard trajectory privacy through Similarity-based Trajectory Partitioning (STSM). The process begins by dividing trajectory equivalence classes based on distinct timestamps. Trajectory similarity is then assessed within each class using metrics such as Frechet distance, trajectory direction, and speed. Subsequently, a trajectory graph is constructed for each class, and the Dijkstra algorithm is applied to partition the graph using the k-subgraph method, effectively converting trajectory partitioning into graph partitioning. To meet publication requirements, Laplace noise is added to sensitive data linked to nodes and edges within the subgraph. Comparative experiments on real-world data confirm the efficacy, rationality, data availability, and privacy protection capabilities of the proposed trajectory partitioning algorithm, underscoring its superiority over alternative methods.
In recent years, significant advancements have been made in the field of anomaly detection. Expanding anomaly detection tasks to new scenarios has become a development avenue. Anomaly detection for the outer packaging...
详细信息
This paper presents a system for hardware-in-the-loop (HiL) simulation of unmanned aerial vehicle (UAV) control algorithms implemented on a heterogeneous SoC FPGA computing platforms. The AirSim simulator running on a...
详细信息
This research addresses the challenge of assessing equipment decision-making effectiveness in environments characterized by uncertainty and multiple influencing factors. We propose a novel approach involving the creat...
详细信息
ISBN:
(数字)9798331527624
ISBN:
(纸本)9798331527631
This research addresses the challenge of assessing equipment decision-making effectiveness in environments characterized by uncertainty and multiple influencing factors. We propose a novel approach involving the creation and optimization of a dynamic Bayesian network-based model tailored for equipment decision-making processes. The model facilitates a systematic evaluation of decision-making effectiveness by incorporating various factors, including equipment performance, environmental conditions, and enemy defensive capabilities. A comprehensive assessment system has been developed to simulate the penetration capabilities of different equipment through enemy defenses. Moreover, this study identifies potential errors in the effectiveness evaluation model by analyzing its performance in typical scenarios, pinpointing areas for enhancement.
This paper tackles the challenge of autonomous target search using unmanned aerial vehicles (UAVs) in complex unknown environments. To fill the gap in systematic approaches for this task, we introduce Star-Searcher, a...
详细信息
As an essential aerial platform in Internet of Things (IoT) applications, UAV swarms require high-precision attitude estimation in GPS-limited and dynamic environments, which supports higher-level IoT functions such a...
详细信息
Deep neural networks virtually dominate the domain of most modern vision systems, providing high performance at a cost of increased computational complexity. Since for those systems it is often required to operate bot...
详细信息
暂无评论