|
|
|
Yuchen Dong, Heng Zhou, Chengyang Li, Junjie Xie, Yongqiang Xie and Zhongbo Li
Camouflaged object detection (COD) is an arduous challenge due to the striking resemblance of camouflaged objects to their surroundings. The abundance of similar background information can significantly impede the efficiency of camouflaged object detecti...
ver más
|
|
|
|
|
|
|
Xiaotian Zhang, Ruiqing Wang, Xiaogang Li, Chengyang Lu, Zhengkang Wang and Wenlong Wang
Bolted flange joints are widely used in engineering structures. Sunk screw connection structures commonly used in small rockets and missiles exhibit significant nonlinear characteristics when subjected to forces. In this article, a study of the dynamic c...
ver más
|
|
|
|
|
|
|
Juan Wang, Yang Yu, Yi Li, Chengyang Fan and Shirong Hao
Network function virtualization (NFV) provides flexible and scalable network function for the emerging platform, such as the cloud computing, edge computing, and IoT platforms, while it faces more security challenges, such as tampering with network polic...
ver más
|
|
|
|