Results 21 to 30 of about 346,892 (270)

Human Head Tracking Based on Particle Swarm Optimization and Genetic Algorithm [PDF]

open access: yes, 2007
This paper compares particle swarm optimization and a genetic algorithm for perception by a partner robot. The robot requires visual perception to interact with human beings.
Kubota, Naoyuki, Sulistijono, Indra Adji
core   +1 more source

Updip Fluid Flow in the Crust of the Northeastern Noto Peninsula, Japan, Triggered the 2023 Mw 6.2 Suzu Earthquake During Swarm Activity

open access: yesGeophysical Research Letters, 2023
An Mw 6.2 earthquake occurred in Suzu, northeastern Noto Peninsula, Japan, on 5 May 2023, followed by many aftershocks. Before this mainshock‐aftershock sequence, an intense earthquake swarm lasted in the vicinity for 2.5 years.
Keisuke Yoshida   +7 more
doaj   +1 more source

An Investigation into the Merger of Stochastic Diffusion Search and Particle Swarm Optimisation [PDF]

open access: yes, 2011
This study reports early research aimed at applying the powerful resource allocation mechanism deployed in Stochastic Diffusion Search (SDS) to the Particle Swarm Optimiser (PSO) metaheuristic, effectively merging the two swarm intelligence algorithms ...
al-Rifaie, Mohammad Majid   +2 more
core   +2 more sources

Elongating, entwining, and dragging: mechanism for adaptive locomotion of tubificine worm blobs in a confined environment

open access: yesFrontiers in Neurorobotics, 2023
Worms often aggregate through physical connections and exhibit remarkable functions such as efficient migration, survival under environmental changes, and defense against predators. In particular, entangled blobs demonstrate versatile behaviors for their
Taishi Mikami   +5 more
doaj   +1 more source

A Proposal for Honeyword Generation via Meerkat Clan Algorithm

open access: yesCybernetics and Information Technologies, 2022
An effective password cracking detection system is the honeyword system. The Honeyword method attempts to increase the security of hashed passwords by making password cracking easier to detect.
Yasser Yasser A.   +2 more
doaj   +1 more source

A Review of: “Bitskrieg: The New Challenge of Cyberwarfare” by John Arquilla

open access: yesJournal of Central and Eastern European African Studies, 2023
Arquilla, John, Bitskrieg: The New Challenge of Cyberwarfare. Polity Press, Medford-Cambridge, 2021. ISBN-13: 978-1-5095-4362-5 (hc); ISBN-13: 978-1-5095-4363-2 (pb).
Attila Gulyás
doaj   +1 more source

Connectivity-Preserving Swarm Teleoperation With A Tree Network

open access: yes, 2019
During swarm teleoperation, the human operator may threaten the distance-dependent inter-robot communications and, with them, the connectivity of the slave swarm. To prevent the harmful component of the human command from disconnecting the swarm network,
Constantinescu, Daniela   +2 more
core   +1 more source

Enhancing UAV Search Under Occlusion Using Next Best View Planning

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
Search and rescue missions are often critical following sudden natural disasters or in high-risk environmental situations. The most challenging search and rescue missions involve difficult-to-access terrains, such as dense forests with high occlusion ...
Sigrid Helene Strand   +3 more
doaj   +1 more source

Efficiency Analysis of Swarm Intelligence and Randomization Techniques [PDF]

open access: yes, 2012
Swarm intelligence has becoming a powerful technique in solving design and scheduling tasks. Metaheuristic algorithms are an integrated part of this paradigm, and particle swarm optimization is often viewed as an important landmark.
Yang, Xin-She
core   +1 more source

Evolutionary optimization for risk-aware heterogeneous multi-agent path planning in uncertain environments

open access: yesFrontiers in Robotics and AI
Cooperative multi-agent systems make it possible to employ miniature robots in order to perform different experiments for data collection in wide open areas to physical interactions with test subjects in confined environments such as a hive.
Fatemeh Rekabi Bana   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy