Skip to main content

Page of 74
and
  1. No Access

    Chapter and Conference Paper

    Predicting the Impact of Restaurant Automation and Food Safety in China: Identifying Key Factors for Smart Dining Experience

    The food service industry in China is rapidly growing, but food safety remains a concern, with over 200,000 cases of food poisoning reported from 2003 to 2017. As the industry modernises, it is important to ma...

    Ying Tuan Lo, Wenbo Ma, Andrew Huey ** Tan in Advances in Intelligent Manufacturing and … (2024)

  2. No Access

    Chapter and Conference Paper

    Topology Design of High-Frequency DC Auxiliary Converter for Electric Multiple Units

    With the rapid development of power electronic technology and the commercialization of high-voltage and high-power semiconductor materials, rail transit field has experienced significant advancements. Auxiliar...

    Kan Dong, Yingtao Ma, Long Cheng, Chao Wang in Proceedings of the 6th International Confe… (2024)

  3. No Access

    Chapter and Conference Paper

    Design of Environmental Monitoring System for Subway Machine Room

    In order to ensure the stable and reliable operation of the electronic computer system in the subway machine room and maintain a good working environment for the staff, strict control of the machine room envir...

    Yanhua Qiao, Huijuan Ma, Jianna Li in Proceedings of the 6th International Confe… (2024)

  4. No Access

    Chapter and Conference Paper

    Joint Task and Path Planning for Unmanned Surface Vehicle Surveillance Based on Beetle Antenna Search and Minimal Construct Visibility Graph

    Task and path planning are critical to unmanned surface vehicles before sending off to commit surveillance tasks. In this paper, a hierarchical framework is proposed to resolve the problem where the lower-leve...

    Zhenqiang Zhang, Sile Ma, **angyuan Jiang in Proceedings of 3rd 2023 International Conf… (2024)

  5. No Access

    Chapter and Conference Paper

    Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle

    In the scenario of a 4G man-in-the-middle attack, the analysis of encrypted traffic is a highly complex problem. The attack based on 4G man-in-the-middle only occurs at the protocol level based on DNS protocol...

    Menglin Ma, Baojiang Cui in Advances in Internet, Data & Web Technologies (2024)

  6. No Access

    Chapter and Conference Paper

    Alleviating Local Optima and Enhancing Path Planning: A Deep Reinforcement Learning Approach for Autonomous Exploration

    In recent years, there have been significant breakthroughs in the development of navigation technologies. Reinforcement learning’s ability to enable autonomous learning for unmanned systems in complex environm...

    Guo Du, Yuanhao Wang, Yi Liu, **ang Wu in Proceedings of 3rd 2023 International Conf… (2024)

  7. No Access

    Chapter and Conference Paper

    Research on Generation Method of Load Transfer Strategy for Intelligent Distribution Network Based on Prediction

    This paper presents a load transfer strategy generation method for intelligent distribution network based on prediction.Obtain section data of system operation from power distribution monitoring system. Accord...

    **anwei Li, Yan Li, Zhanye Ma, Yunpeng Du in Proceedings of the 2nd International Confe… (2024)

  8. No Access

    Chapter and Conference Paper

    Improved Remote Sensing Image Rotating Target Detection Algorithm Based on Transformer

    As satellite remote sensing and aerial photography technologies continue to advance in recent years, there has been a noticeable increase in both the resolution and image quality of remote sensing images. Furt...

    Shujun Hui, Pengcheng Wang, Bin Luan in Proceedings of the 2nd International Confe… (2024)

  9. No Access

    Chapter and Conference Paper

    Proposed Handle Height for Infantry Assault Bridge’s Stretcher Adapter

    With the current floodings that have been happening, an Infantry Assault Bridge (IAB) has been designed to reach the affected people and retrieve them. Practically, food and medical supplies shall be transport...

    T. H. Yong, M. I. N. Ma’arof in Human Factors and Ergonomics Toward an Inc… (2024)

  10. No Access

    Chapter and Conference Paper

    Multi-device Collaborative Anomaly Diagnosis Method for Electric Mining Dump Trucks

    Electric mining dump trucks (EMDTs) play an essential role in open pit mining. EMDTs are complex electromechanical equipment characterized by messy status information and numerous failure modes. For other devi...

    Yichao Ma, Lei Wang, Benchao Zhu, Qubo **e in Proceedings of the 6th International Confe… (2024)

  11. No Access

    Chapter and Conference Paper

    Design of Indoor Navigation Scheme Based on Bluetooth Low Energy

    Navigation based on mobile devices has developed rapidly in recent years, but GPS positioning technology cannot work effectively in indoor environments, so a variety of indoor wireless positioning technologies...

    Zhaotian Wu, ** Ma, Jiayin Li in Proceedings of the 6th International Confe… (2024)

  12. No Access

    Chapter and Conference Paper

    Research on Fault Diagnosis of Control System Based on Multi-sensor Data Fusion Algorithm

    With the progress of science and technology nowadays and the enhancements in control system optimization field, system fault diagnosis has become a hot topic in the industry, and many models of fault diagnosis...

    Ziyi Li, Xuhua Zhai, Liyao Ma in Proceedings of the 13th International Conf… (2024)

  13. No Access

    Chapter and Conference Paper

    Initial Rotor Position Detection Based on Peak Dc-Link Current Comparison for SPMSM

    Initial rotor position detection is important for the control of PMSM (Permanent Magnet Synchronous Motor) in rail transit. One method is proposed to detect initial rotor position at standstill based on peak d...

    Peng Chen, Ruiqing Ma in Proceedings of the 6th International Confe… (2024)

  14. No Access

    Chapter and Conference Paper

    Evaluating First-Train-Timetable-Network Performance in Urban Rail Transit with Percolation Theory

    As modern large cities heavily rely on urban rail transit (URT) systems as their most crucial transportation infrastructure to meet daily commuting demands, the irrational design of the first train timetable a...

    Tianlei Zhu, Zhiao Ma, **n Yang in Proceedings of the 6th International Confe… (2024)

  15. No Access

    Chapter and Conference Paper

    Polarization Aberration Analysis of Free Space Quantum Communication Optical Systems and Applications

    Free space quantum key distribution systems apply polarization coding or polarization multiplexing frequently to realize free space channel transmission. In order to ensure the correct detection and decoding o...

    Huagui Li, Shaobo Li, Jiaxu Wen, Xuchao Liu in Proceedings of the 2nd International Confe… (2024)

  16. No Access

    Chapter and Conference Paper

    Fuzzing IoT Devices via Android App Interfaces with Large Language Model

    Most of the current automated testing methods for IoT devices rely on firmware analysis and firmware emulation. However, due to the diverse architectures and structures of firmware across different vendors, th...

    Wenxing Ma, Baojiang Cui in Advances in Internet, Data & Web Technologies (2024)

  17. No Access

    Chapter and Conference Paper

    Research on the Application of Computer Graphics Image Processing Technology

    The application of image processing technology is critical in intelligent computer graphics images; however, it has an issue with erroneous performance positioning. The typical Grid algorithm is unable to addr...

    Qiuxian Ma in Proceedings of Innovative Computing 2024, Vol. 3 (2024)

  18. No Access

    Chapter and Conference Paper

    Urban Landscape Design Optimization System Based on Improved Particle Swarm Optimization Algorithm

    We proposed an improved particle swarm optimization algorithm for urban landscape planning. The introduction of uncertainty dynamic inertia weight coefficients compensates for global search performance and loc...

    Jun Zheng, Yue Ma, Mengyao Yu, Changhua He in Proceedings of the 3rd International Confe… (2024)

  19. No Access

    Chapter and Conference Paper

    Attack Detecting for the Multi-robots Systems: An Integrated Cyber-Physical Approach

    To address security issues and effectively detect cyber-attack behaviors in multi-robot systems, this paper proposes a cyber-attack detection method that combines information-physical features. The method invo...

    Chunyu Yang, Shanguang Xu, Lei Ma, Tihao Wu in Proceedings of 2023 7th Chinese Conference… (2024)

  20. No Access

    Chapter and Conference Paper

    InstaFace: Single-View 3D Face Reconstruction with Hair Try-On

    This study presents InstaFace, an innovative system designed for the reconstruction of 3D human heads from single images, enabling the distinct reconstruction of both the 3D head model and the 3D hair model. In c...

    Hieu Dao-Quang, Anh-Duc Lo, Chau Ma-Thi in Advances in Information and Communication … (2024)

Page of 74