|
|
|
Jie Li, Di Shen, Fuping Yu and Renmeng Zhang
With the rapid advancement of unmanned aerial vehicle (UAV) technology, the widespread utilization of UAVs poses significant challenges to urban low-altitude safety and airspace management. In the coming future, the quantity of drones is expected to expe...
ver más
|
|
|
|
|
|
|
Anirudh Warrier, Saba Al-Rubaye, Gokhan Inalhan and Antonios Tsourdos
Integrating autonomous unmanned aerial vehicles (UAVs) with fifth-generation (5G) networks presents a significant challenge due to network interference. UAVs? high altitude and propagation conditions increase vulnerability to interference from neighbouri...
ver más
|
|
|
|
|
|
|
Minh Tran, Duc Pham-Hi and Marc Bui
In this paper, we propose a novel approach to optimize parameters for strategies in automated trading systems. Based on the framework of Reinforcement learning, our work includes the development of a learning environment, state representation, reward fun...
ver más
|
|
|
|
|
|
|
Dongdong Yao and Qunli Xia
In an effort to address the problem of hypersonic morphing vehicles reaching the target while avoiding no-fly zones, an improved predictor?corrector guidance method is proposed. Firstly, the aircraft motion model and the constraint model are established....
ver más
|
|
|
|
|
|
|
Siyu Gao, Yuchen Wang, Nan Feng, Zhongcheng Wei and Jijun Zhao
With the proliferation of video surveillance system deployment and related applications, real-time video analysis is very critical to achieving intelligent monitoring, autonomous driving, etc. Analyzing video stream with high accuracy and low latency thr...
ver más
|
|
|
|
|
|
|
Sergi Mas-Pujol, Esther Salamí and Enric Pastor
Air traffic flow management (ATFM) is of crucial importance to the European Air Traffic Control System due to two factors: first, the impact of ATFM, including safety implications on ATC operations; second, the possible consequences of ATFM measures on b...
ver más
|
|
|
|
|
|
|
Ahmad Zendebudi and Salimur Choudhury
Even though small portable devices are becoming increasingly more powerful in terms of processing power and power efficiency, there are still workloads that require more computational capacity than these devices offer. Examples of such workloads are real...
ver más
|
|
|
|
|
|
|
Khuong Tran, Maxwell Standen, Junae Kim, David Bowman, Toby Richer, Ashlesha Akella and Chin-Teng Lin
Organised attacks on a computer system to test existing defences, i.e., penetration testing, have been used extensively to evaluate network security. However, penetration testing is a time-consuming process. Additionally, establishing a strategy that res...
ver más
|
|
|
|
|
|
|
Zheng Guan, Yuyang Wang and Min He
With the rapid development of global automotive industry intelligence and networking, the Internet of Vehicles (IoV) service, as a key communication technology, has been faced with an increasing spectrum of resources shortage. In this paper, we consider ...
ver más
|
|
|
|
|
|
|
Bin Yang, Muhammad Haseeb Arshad and Qing Zhao
Powered by advances in information and internet technologies, network-based applications have developed rapidly, and cybersecurity has grown more critical. Inspired by Reinforcement Learning (RL) success in many domains, this paper proposes an Intrusion ...
ver más
|
|
|
|