The interest in multi-drone systems flourished in the last decade and their application is promising in many fields. We believe that in order to make drone swarms flying smoothly and reliably in real-world scenarios w...
详细信息
ISBN:
(纸本)9781538692455
The interest in multi-drone systems flourished in the last decade and their application is promising in many fields. We believe that in order to make drone swarms flying smoothly and reliably in real-world scenarios we need a first intermediate step which consists in the analysis of the effects of limited sensing on the behavior of the swarm. In nature, the central sensor modality often used for achieving flocking is vision. In this work, we study how the reduction in the field of view and the orientation of the visual sensors affect the performance of the Reynolds flocking algorithm used to control the swarm. To quantify the impact of limited visual sensing, we introduce different metrics such as (i) order, (ii) safety, (iii) union and (iv) connectivity. As Nature suggests, our results confirm that lateral vision is essential for coordinating the movements of the individuals. Moreover, the analysis we provide will simplify the tuning of the Reynolds flocking algorithm which is crucial for real-world deployment and, especially for aerial swarms, it depends on the envisioned application. We achieve the results presented in this paper through extensive Monte-Carlo simulations and integrate them with the use of genetic algorithm optimization.
When the high occlusion occurs in crowded scene, face detection is a better substitute for detecting pedestrian. In this paper, we present a novel crowd analysis method based on discriminative descriptor of faces and ...
详细信息
This paper will present an obstacle detection approach that relies on the three-dimensional information from stereo vision. Concerning real-time response of the system and high accuracy of the reconstructed points, in...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavio...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavior models to authenticate *** this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is *** architecture is suitable for users using the mobile terminal APP in the daily *** architecture includes data acquisition,data processing,feature extraction,and sub model *** can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
Statistical background subtraction has proved to be a robust and effective approach for segmenting and extracting objects without any prior information of the foreground objects. This paper presents two contributions ...
详细信息
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model...
详细信息
For rate control (RC) of hierarchical structure coding, an independent rate-quantization (R-Q) model was proposed based on mean absolute differences (MADs) in different temporal levels (TLs). In the proposed R-Q model, a novel MAD model was developed according to the hierarchical structure. The experimental results demonstrate that the proposed algorithm provides better performance, in terms of average peak signal-to-noise ratio (PSNR) and quality smoothness, than the H.264 reference model, JM14.2, under various sequences.
At present, most of the work has focused on Web services composition from the QoS side, little work being done on investigating how to implement service selection based on transactional and QoS requirements. In compli...
详细信息
Representation learning on dynamic graphs has drawn much attention due to its ability to learn hidden relationships as well as capture temporal patterns in graphs. It can be applied to represent a broad spectrum of gr...
详细信息
With the explosive growth of data information, the object-oriented storage system has been widely used. This paper proposed a metadata management strategy based on Distributed File system-Ceph in terms of event classi...
详细信息
Hadoop Distributed File system (HDFS) is a reliable and scalable data storage solution. However, it has great weakness in storage of the numerous small files. A merging method of small video files containing traffic i...
详细信息
暂无评论