-
1201
-
1202
BT-YOLO11: Automatic Driving Road Target Detection in Complex Scenarios
Published 2025-01-01Get full text
Article -
1203
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…With the rapid development of the Internet of things (IoT) technology and cloud computing technology, the search engine for Internet of things become a hot research topic. …”
Get full text
Article -
1204
Sonar-Based Simultaneous Localization and Mapping Using the Semi-Direct Method
Published 2024-12-01“…To obtain better feature extraction results in specific directions, we propose a method that accelerates the computation of the two-dimensional SO-CFAR algorithm, with the time cost being only a very slight increase compared to the one-dimensional SO-CFAR. …”
Get full text
Article -
1205
A privacy-preserving scheme supporting efficient task assignment in spatial crowdsourcing
Published 2024-03-01Get full text
Article -
1206
An improved electrocardiogram arrhythmia classification performance with feature optimization
Published 2024-12-01Get full text
Article -
1207
Combined encryption method for CAN bus data based on periodic coupled processing
Published 2023-01-01“…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
Get full text
Article -
1208
2DUMAP: Two-Dimensional Uniform Manifold Approximation and Projection for Fault Diagnosis
Published 2025-01-01Get full text
Article -
1209
Improved Private Data Protection Scheme for Blockchain Smart Contracts
Published 2023-01-01“…Data security and privacy protection are critical challenges that constrain the advancement of edge computing. Similarly, blockchain technology faces constraints in addressing security issues linked with edge computing due to its scalability limitations. …”
Get full text
Article -
1210
Classification of Phishing Email Using Random Forest Machine Learning Technique
Published 2014-01-01Get full text
Article -
1211
A chemical autonomous robotic platform for end-to-end synthesis of nanoparticles
Published 2025-08-01Get full text
Article -
1212
Research on Collaborative Delivery Path Planning for Trucks and Drones in Parcel Delivery
Published 2025-05-01Get full text
Article -
1213
Scheduling a Fleet of Dynamic EV Chargers for Maximal Profile
Published 2024-11-01Get full text
Article -
1214
A 3-D Parallel Method of PSTD-Based Reverse Time Migration of GPR Data
Published 2025-01-01“…However, the three-dimensional (3-D) RTM of GPR data still faces big challenge due to its expensive computation cost. …”
Get full text
Article -
1215
Study on the Strategy of Playing Doudizhu Game Based on Multirole Modeling
Published 2020-01-01“…Experimental results showed that this card-playing framework makes playing decisions like human beings, and it can to some extent learn, collaborate, and reason when facing an incomplete information game problem. This framework won the runner-up in the 2018 China Computer Game Competition.…”
Get full text
Article -
1216
-
1217
DEALER: Distributed Clustering with Local Direction Centrality and Density Measure
Published 2025-04-01“…Although CDC has shown promising results, it still faces challenges in terms of both effectiveness and efficiency. …”
Get full text
Article -
1218
Enhancing Crowd Safety at Hajj: Real-Time Detection of Abnormal Behavior Using YOLOv9
Published 2025-01-01Get full text
Article -
1219
The Eyes: A Source of Information for Detecting Deepfakes
Published 2025-04-01Get full text
Article -
1220
A Registration Method for Historical Maps Based on Self-Supervised Feature Matching
Published 2025-01-01“…Image registration techniques in the field of computer vision can be applied to this task. However, historical map registration faces unique challenges, including insufficient training data, variations in image sizes, and unavailable texture features. …”
Get full text
Article