-
101
WDFS-DETR: A Transformer-based framework with multi-scale attention for small object detection in UAV Engineering Tasks
Published 2025-09-01“…With the growing adoption of Unmanned Aerial Vehicles (UAVs) in surveillance, emergency response, and environmental monitoring, accurate small object detection under resource constraints remains a critical challenge. …”
Get full text
Article -
102
Short-term calving front dynamics and mass loss at Sálajiegna glacier, northern Sweden, assessed by uncrewed surface and aerial vehicles
Published 2024-01-01“…Uncrewed aerial vehicles (UAVs) are frequently used in glaciological applications, among other things, for photogrammetric assessments of calving dynamics at glacier termini. However, UAVs are often limited by battery endurance and weight constraints on the scientific payload that can be added. …”
Get full text
Article -
103
Real-Time Cloth Simulation in Extended Reality: Comparative Study Between Unity Cloth Model and Position-Based Dynamics Model with GPU
Published 2025-06-01“…The proposed system achieves real-time performance by implementing efficient collision detection and response handling with complex environmental meshes (RoomMesh) and dynamic hand meshes (HandMesh), as well as capsule colliders based on hand skeleton tracking (OVRSkeleton). …”
Get full text
Article -
104
-
105
Path Planning for Lunar Rovers in Dynamic Environments: An Autonomous Navigation Framework Enhanced by Digital Twin-Based A*-D3QN
Published 2025-06-01“…In lunar exploration missions, rovers must navigate multiple waypoints within strict time constraints while avoiding dynamic obstacles, demanding real-time, collision-free path planning. …”
Get full text
Article -
106
-
107
A Consensus-Driven Distributed Moving Horizon Estimation Approach for Target Detection Within Unmanned Aerial Vehicle Formations in Rescue Operations
Published 2025-02-01“…It provides a fully distributed architecture that enables UAVs to estimate the position and velocity of other fleet members while simultaneously detecting static and dynamic targets. The effectiveness of the technique is proved by several numerical simulation, including an in-depth sensitivity analysis of key algorithm parameters, such as fleet network topology and consensus iterations and the evaluation of the robustness against node faults and information losses.…”
Get full text
Article -
108
STDP-Driven Automated Retinal Circuit With 7-nm FinFET for Motion and Looming Detection: A Hybrid Model With Image Analysis
Published 2025-01-01“…Because the 7nm FinFET technology improves system efficiency and responsiveness, it can be used in real-time applications where high-precision motion detection is necessary in dynamic conditions. However, potential challenges include scalability for large-scale deployment and hardware constraints associated with real-time processing on FinFET-based circuits. …”
Get full text
Article -
109
Fine-Tuned YOLO Model for Monitoring Children Across Medical Scenes Based on a Large-Scale Real-World Dataset for Children Detection
Published 2025-01-01“…Accurate detection and monitoring of children in medical settings using computer vision systems present unique challenges due to anatomical differences, environmental complexity, and stringent privacy constraints. …”
Get full text
Article -
110
A Robust Seamline Extraction Method for Large-Scale Orthoimages Using an Adaptive Cost A* Algorithm
Published 2025-01-01“…The method does not require pre-extraction of image features and constructing a cost map; instead, it dynamically detects impassable regions in the overlapping areas during the A* path search process. …”
Get full text
Article -
111
Signature of Vertical Mixing in Hydrogen-dominated Exoplanet Atmospheres
Published 2024-01-01Get full text
Article -
112
-
113
-
114
Unmasking stealthy attacks on nonlinear DAE models of power grids
Published 2025-06-01“…We propose novel FDIA strategies that simultaneously evade both dynamic and static intrusion detection systems while respecting the algebraic power flow and operational constraints inherent in NDAE models. …”
Get full text
Article -
115
The MASSIVE Survey. XX. A Triaxial Stellar Dynamical Measurement of the Supermassive Black Hole Mass and Intrinsic Galaxy Shape of Giant Radio Galaxy NGC 315
Published 2025-01-01“…We present a new dynamical measurement of the supermassive black hole mass and intrinsic shape of the stellar halo of the massive radio galaxy NGC 315 as part of the MASSIVE survey. …”
Get full text
Article -
116
ALMA Detection of [O iii] 88 μm at z = 12.33: Exploring the Nature and Evolution of GHZ2 as a Massive Compact Stellar System
Published 2024-01-01“…Additionally, these observations provide new constraints on the oxygen electron density (100 ≲ n _e [cm ^−3 ] ≲ 4,000) and dynamical mass ( M _dyn ≈ 3–8 × 10 ^8 M _⊙ ). …”
Get full text
Article -
117
Optimizing UAV performance with IoT and fuzzy linear fractional transportation models
Published 2024-12-01Get full text
Article -
118
Astrometric Accelerations of Provisional Targets for the Habitable Worlds Observatory
Published 2025-01-01Get full text
Article -
119
Adaptive Energy Management for MATTER-Enabled Smart Homes
Published 2025-01-01“…This paper proposes a unified machine learning (ML) framework for dynamic energy optimization, integrating advanced prediction, anomaly detection, and reinforcement learning (RL) techniques. …”
Get full text
Article -
120
Automatic exploitation generation method of write-what-where vulnerability
Published 2022-01-01“…To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where, a method of automatic exploitation generation for write-what-where was proposed.First, the write-what-where vulnerability was detected based on the memory address control strength dynamic taint analysis method.Then, the vulnerability exploitation elements were searched based on the vulnerability exploitation modes, and the exploitation of write-what-where vulnerability was generated automatically by constraint solving.The experimental results show that the proposed method can effectively detect write-what-where vulnerability, search exploitation elements, and automatically generate the control-flow-hijacking exploitation from write-what-where.…”
Get full text
Article