Showing 261 - 280 results of 944 for search 'play information algorithm', query time: 0.13s Refine Results
  1. 261

    Detour-Straddle 3D-like path planning of unmanned mining truck in open pit mines based on optimized ant colony algorithm by Mingyu GAO, Jiusheng BAO, Yan YIN, Deping HU, Kekun ZHANG, Chenzhong ZHU, Maosen WANG, Kai WANG

    Published 2025-06-01
    “…Therefore, the proposed parallel 3D path planning method based on optimized ant colony algorithm can effectively shorten the path length, improve the search efficiency and path quality, and give full play to the characteristics of wide body and high underbody of unmanned mining trucks under the premise of ensuring safety. …”
    Get full text
    Article
  2. 262
  3. 263
  4. 264

    MVTC-Sec: Lightweight Timestamp Correlation for Securing RPL Against DIO Replay Attacks by Tahar Guerbouz, Akram Zine Eddine Boukhamla, Djalila Belkebir, Sahraoui Dhelim

    Published 2025-01-01
    “…Of all the protocols for such networks, the Routing Protocol for Low-Power and Lossy Networks (RPL) plays a central role in enabling effective routing in 6LoWPAN-based IoT systems. …”
    Get full text
    Article
  5. 265
  6. 266
  7. 267
  8. 268
  9. 269

    A Fused Multiscale Pictorial Sequence Learning Mechanism Applied to Pavement Detection by Zhang Jiazhen, Wang Xiulai, Zhao Shuxu

    Published 2025-01-01
    “…Considering that most pavement anomaly detection algorithms are difficult to play a stable role in data related to different distributions of pavement anomalies, this paper proposes a pavement anomaly detection algorithm based on multi-scale fusion time series information. …”
    Get full text
    Article
  10. 270
  11. 271
  12. 272
  13. 273
  14. 274
  15. 275
  16. 276
  17. 277
  18. 278

    Enhancing cybersecurity through autonomous knowledge graph construction by integrating heterogeneous data sources by Hatoon Alharbi, Ali Hur, Hasan Alkahtani, Hafiz Farooq Ahmad

    Published 2025-04-01
    “…Cybersecurity plays a critical role in today’s modern human society, and leveraging knowledge graphs can enhance cybersecurity and privacy in the cyberspace. …”
    Get full text
    Article
  19. 279
  20. 280

    (Re)thinking Body-Technology Relations with Michel Serres by Ian Tucker

    Published 2021-09-01
    “…His notion of appropriation through pollution encompasses notions of information and data as forms of algorithmic appropriation, as much if not more, than physical pollution. …”
    Get full text
    Article