5,841 Result(s)
-
Chapter and Conference Paper
Spacecraft Information Flow Collaborative Design Model and Application
To depict information flow structure of spacecraft system, the paper introduced information flow analysis method and defined tow information flow factors, the entity and the relationship. The relationships amo...
-
Chapter and Conference Paper
Open-Set Fault Diagnosis Method for Industrial Process Based on Semi-supervised Learning
Aiming at the inconsistent distribution of labeled and unlabeled data categories in the actual industrial production process, this paper proposes an open-set semi-supervised process fault diagnosis method base...
-
Chapter and Conference Paper
Digging into Radiance Grid for Real-Time View Synthesis with Detail Preservation
Neural Radiance Fields (NeRF) [31] series are impressive in representing scenes and synthesizing high-quality novel views. However, most previous works fail to preserve texture details and suffer from slow traini...
-
Chapter and Conference Paper
The Calibration of Pre-travel Error and Installation Eccentricity Error for On-Machine Probes
Touch-trigger probes are widely used in modern high-precision CNC machine tools as an on-machine inspection solution. The calibration of the probe pre-travel error is a significantly factor affecting the accur...
-
Chapter and Conference Paper
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks
This paper aims to provide differentiated security protection for infotainment data communication in Internet-of-Vehicle (IoV) networks. The IoV is a network of vehicles that uses various sensors, software, bu...
-
Chapter and Conference Paper
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection
For an organization, insider intrusion generally poses far more detrimental threats than outsider intrusion. Traditionally, insider threat is detected by analyzing logged user behaviours and then establishing ...
-
Chapter and Conference Paper
Batched Fully Dynamic Multi-key FHE from FHEW-Like Cryptosystems
Multi-key fully homomorphic encryption (MKFHE) schemes support arbitrary computations on data encrypted by different keys. Especially, in the fully dynamic setting, any ciphertexts can be computed at any time ...
-
Chapter and Conference Paper
Type Synthesis of Six Degrees of Freedom Parallel Mechanism with Decoupled Translation and Rotation
A type synthesis method of six degrees of freedom (DOFs) parallel mechanism (PM) with decoupled translation and rotation (DTR) is proposed by analyzing the input and output characteristics of partially decoupl...
-
Chapter and Conference Paper
Research on Construction Method of SoS Architecture Knowledge Graph
System of systems (SoS) architecture data is the foundation of SoS architecture design, modeling, and evaluation. Traditional methods of architecture data collection generally need the involvement of modelers....
-
Chapter and Conference Paper
Research on Dynamic Timeslot Reservation Handover Algorithm Based on Remaining Time in Beam Hop** System
Recently, beam hop** (BH) technology has been considered as the key technology of the next generation High Throughput Satellite (HTS) system for its flexibility. In order to ensure the communication continui...
-
Chapter and Conference Paper
KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment
Blockchain is a shared database with excellent characteristics, such as high decentralization and traceability. However, data leakage is still a major problem for blockchain transactions. To address this issue...
-
Chapter and Conference Paper
Trajectory Tracking Control Based on RBF Neural Network Learning Control
In this paper, a radial basis function neural network (RBFNN) learning control scheme is proposed to improve the trajectory tracking performance of a 3-DOF robot manipulator based on deterministic learning the...
-
Chapter and Conference Paper
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption
Searchable encryption is an essential component of cryptography, which allows users to search for keywords and retrieve records from an encrypted database at cloud storage while ensuring the confidentiality of...
-
Chapter and Conference Paper
A Simple Approach to the Multiple Source Identification of Information Diffusion
This paper studies the problem of identifying multiple information sources in networks. Assuming that the information diffusion follows a Susceptible-Infected (SI) model which allowing all nodes in the network...
-
Chapter and Conference Paper
Design and Verification of an Active Lower Limb Exoskeleton for Micro-low Gravity Simulation Training
Exploring the most economic method to achieve micro-low gravity simulation training has been troubling researchers for a long time. Hence, this paper presents an active lower limb exoskeleton to counteract gra...
-
Chapter and Conference Paper
3D Visualization Supporting Situational Awareness of Model-Based System of Systems
Model-based System of Systems Engineering (MBSoSE) enables to improve the efficiency of the architecture design, and the performance analysis and modeling of highly complex system of systems (SoS). Introducing...
-
Chapter and Conference Paper
Design of Envelo** Underwater Soft Gripper Based on the Bionic Structure
The ocean has been an important research site for scientists in recent years. Many marine creatures with soft bodies such as sea cucumbers are fragile and easily deformed, so it is difficult when gras** thes...
-
Chapter and Conference Paper
Gait Time Parameter Analysis-Based Rehabilitation Evaluation System of Lower Limb Motion Function
Aiming at the problems of low accuracy and high time cost of existing motion function rehabilitation evaluation methods, this paper proposes a rehabilitation evaluation method and system of lower limb motion f...
-
Chapter and Conference Paper
Nonlinear Methods on HD-sEMG Signals for Aging Effect Evaluation During Isometric Contractions of the Biceps Brachii
Muscle aging is associated with a loss of muscle mass and strength. Different factors are responsible, which can possibly lead to a modification of the complexity of the neuromuscular system. This may be refle...
-
Chapter and Conference Paper
TuneIn: Framework Design and Implementation for Education Using Dynamic Difficulty Adjustment Based on Deep Reinforcement Learning and Mathematical Approach
Education, personal self-development, and overall learning have vastly changed over the years as a result of historical events, methodologies, and technologies. As students first, and then as educators, we hav...