Search alternatives:
constraint » constraints (Expand Search)
Showing 101 - 120 results of 245 for search 'Dynamic constraint detection', query time: 0.11s Refine Results
  1. 101

    WDFS-DETR: A Transformer-based framework with multi-scale attention for small object detection in UAV Engineering Tasks by Jinjiang Liu, Yonghua Xie

    Published 2025-09-01
    “…With the growing adoption of Unmanned Aerial Vehicles (UAVs) in surveillance, emergency response, and environmental monitoring, accurate small object detection under resource constraints remains a critical challenge. …”
    Get full text
    Article
  2. 102

    Short-term calving front dynamics and mass loss at Sálajiegna glacier, northern Sweden, assessed by uncrewed surface and aerial vehicles by Florian Vacek, Clemens Deutsch, Jakob Kuttenkeuler, Nina Kirchner

    Published 2024-01-01
    “…Uncrewed aerial vehicles (UAVs) are frequently used in glaciological applications, among other things, for photogrammetric assessments of calving dynamics at glacier termini. However, UAVs are often limited by battery endurance and weight constraints on the scientific payload that can be added. …”
    Get full text
    Article
  3. 103

    Real-Time Cloth Simulation in Extended Reality: Comparative Study Between Unity Cloth Model and Position-Based Dynamics Model with GPU by Taeheon Kim, Jun Ma, Min Hong

    Published 2025-06-01
    “…The proposed system achieves real-time performance by implementing efficient collision detection and response handling with complex environmental meshes (RoomMesh) and dynamic hand meshes (HandMesh), as well as capsule colliders based on hand skeleton tracking (OVRSkeleton). …”
    Get full text
    Article
  4. 104
  5. 105

    Path Planning for Lunar Rovers in Dynamic Environments: An Autonomous Navigation Framework Enhanced by Digital Twin-Based A*-D3QN by Wei Liu, Gang Wan, Jia Liu, Dianwei Cong

    Published 2025-06-01
    “…In lunar exploration missions, rovers must navigate multiple waypoints within strict time constraints while avoiding dynamic obstacles, demanding real-time, collision-free path planning. …”
    Get full text
    Article
  6. 106
  7. 107

    A Consensus-Driven Distributed Moving Horizon Estimation Approach for Target Detection Within Unmanned Aerial Vehicle Formations in Rescue Operations by Salvatore Rosario Bassolillo, Egidio D’Amato, Immacolata Notaro

    Published 2025-02-01
    “…It provides a fully distributed architecture that enables UAVs to estimate the position and velocity of other fleet members while simultaneously detecting static and dynamic targets. The effectiveness of the technique is proved by several numerical simulation, including an in-depth sensitivity analysis of key algorithm parameters, such as fleet network topology and consensus iterations and the evaluation of the robustness against node faults and information losses.…”
    Get full text
    Article
  8. 108

    STDP-Driven Automated Retinal Circuit With 7-nm FinFET for Motion and Looming Detection: A Hybrid Model With Image Analysis by Rubina Akter Rabeya, Md Turiqul Islam, Shah Muhammad Imtiyaj Uddin, Alaaddin Al-Shidaifat, Hanjung Song, Heung-Kook Choi, Hee-Cheol Kim

    Published 2025-01-01
    “…Because the 7nm FinFET technology improves system efficiency and responsiveness, it can be used in real-time applications where high-precision motion detection is necessary in dynamic conditions. However, potential challenges include scalability for large-scale deployment and hardware constraints associated with real-time processing on FinFET-based circuits. …”
    Get full text
    Article
  9. 109

    Fine-Tuned YOLO Model for Monitoring Children Across Medical Scenes Based on a Large-Scale Real-World Dataset for Children Detection by Samuel Diop, Francois Jouen, Jean Bergounioux, Imen Trabelsi

    Published 2025-01-01
    “…Accurate detection and monitoring of children in medical settings using computer vision systems present unique challenges due to anatomical differences, environmental complexity, and stringent privacy constraints. …”
    Get full text
    Article
  10. 110

    A Robust Seamline Extraction Method for Large-Scale Orthoimages Using an Adaptive Cost A* Algorithm by Zhonghua Hong, Zihao Zhang, Shangcheng Hu, Ruyan Zhou, Haiyan Pan, Shijie Liu, Qing Fu, Xiaohua Tong

    Published 2025-01-01
    “…The method does not require pre-extraction of image features and constructing a cost map; instead, it dynamically detects impassable regions in the overlapping areas during the A* path search process. …”
    Get full text
    Article
  11. 111
  12. 112
  13. 113
  14. 114

    Unmasking stealthy attacks on nonlinear DAE models of power grids by Abdallah Alalem Albustami, Ahmad F. Taha, Elias Bou-Harb

    Published 2025-06-01
    “…We propose novel FDIA strategies that simultaneously evade both dynamic and static intrusion detection systems while respecting the algebraic power flow and operational constraints inherent in NDAE models. …”
    Get full text
    Article
  15. 115

    The MASSIVE Survey. XX. A Triaxial Stellar Dynamical Measurement of the Supermassive Black Hole Mass and Intrinsic Galaxy Shape of Giant Radio Galaxy NGC 315 by Jacob Pilawa, Emily R. Liepold, Chung-Pei Ma, Jonelle L. Walsh, Jenny E. Greene

    Published 2025-01-01
    “…We present a new dynamical measurement of the supermassive black hole mass and intrinsic shape of the stellar halo of the massive radio galaxy NGC 315 as part of the MASSIVE survey. …”
    Get full text
    Article
  16. 116
  17. 117
  18. 118
  19. 119

    Adaptive Energy Management for MATTER-Enabled Smart Homes by Navodit Bhardwaj, Pallavi Joshi

    Published 2025-01-01
    “…This paper proposes a unified machine learning (ML) framework for dynamic energy optimization, integrating advanced prediction, anomaly detection, and reinforcement learning (RL) techniques. …”
    Get full text
    Article
  20. 120

    Automatic exploitation generation method of write-what-where vulnerability by Huafeng HUANG, Purui SU, Yi YANG, Xiangkun JIA

    Published 2022-01-01
    “…To solve the problem that the current vulnerability automatic exploitation generation methods cannot automatically generate control-flow-hijacking exploitation from write-what-where, a method of automatic exploitation generation for write-what-where was proposed.First, the write-what-where vulnerability was detected based on the memory address control strength dynamic taint analysis method.Then, the vulnerability exploitation elements were searched based on the vulnerability exploitation modes, and the exploitation of write-what-where vulnerability was generated automatically by constraint solving.The experimental results show that the proposed method can effectively detect write-what-where vulnerability, search exploitation elements, and automatically generate the control-flow-hijacking exploitation from write-what-where.…”
    Get full text
    Article