Results 51 to 60 of about 162,677 (314)
An Efficient Index for Visual Search in Appearance-based SLAM [PDF]
Vector-quantization can be a computationally expensive step in visual bag-of-words (BoW) search when the vocabulary is large. A BoW-based appearance SLAM needs to tackle this problem for an efficient real-time operation. We propose an effective method to
Hajebi, Kiana, Zhang, Hong
core +1 more source
LCDNet: Deep Loop Closure Detection and Point Cloud Registration for LiDAR SLAM [PDF]
Loop closure detection is an essential component of simultaneous localization and mapping (SLAM) systems, which reduces the drift accumulated over time.
Daniele Cattaneo +2 more
semanticscholar +1 more source
In order to attain precise and robust transformation estimation in simultaneous localization and mapping (SLAM) tasks, the integration of multiple sensors has demonstrated effectiveness and significant potential in robotics applications. Our work emerges
Changhao Yu +4 more
doaj +1 more source
LDSO: Direct Sparse Odometry with Loop Closure
In this paper we present an extension of Direct Sparse Odometry (DSO) to a monocular visual SLAM system with loop closure detection and pose-graph optimization (LDSO).
Cremers, Daniel +3 more
core +1 more source
Simultaneous localization and mapping (SLAM) is crucial for autonomous driving, drone navigation, and robot localization, relying on efficient point cloud registration and loop closure detection.
Yan Ren +3 more
semanticscholar +1 more source
Improved M-ORB based direct-loop closure detection algorithm for visual SLAM
Most kinds of direct methods do not extract image feature points in the front end of SLAM system, resulting in that they cannot use loop closure detection with bag-of-words models to eliminate the cumulative error of the system.To resolve this problem ...
Wei LI +4 more
doaj
Partial Evaluation of String Obfuscations for Java Malware Detection [PDF]
The fact that Java is platform independent gives hackers the opportunity to write exploits that can target users on any platform, which has a JVM implementation. Metasploit is a well-known source of Javaexploits and to circumvent detection by Anti Virus (
Chawdhary, Aziem +2 more
core +1 more source
Fast loop closure detection using probabilistic integration of pose and appearance similarity
Loop closure detection is a key technique for robots to minimize the accumulated localization and mapping errors after long-time explorations of simultaneous localization and mapping.
Qinghua Yu +4 more
doaj +1 more source
Reciprocal control of viral infection and phosphoinositide dynamics
Phosphoinositides, although scarce, regulate key cellular processes, including membrane dynamics and signaling. Viruses exploit these lipids to support their entry, replication, assembly, and egress. The central role of phosphoinositides in infection highlights phosphoinositide metabolism as a promising antiviral target.
Marie Déborah Bancilhon, Bruno Mesmin
wiley +1 more source
Cameras are a crucial exteroceptive sensor for self-driving cars as they are low-cost and small, provide appearance information about the environment, and work in various weather conditions.
Fraundorfer, Friedrich +6 more
core +1 more source

