Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Investigation of autonomous multi-UAV systems for target detection in distributed environment: Current developments and open challenges
Uncrewed aerial vehicles (UAVs), also known as drones, are ubiquitous and their use cases
extend today from governmental applications to civil applications such as the agricultural …
extend today from governmental applications to civil applications such as the agricultural …
Omni-swarm: A decentralized omnidirectional visual–inertial–uwb state estimation system for aerial swarms
Decentralized state estimation is one of the most fundamental components of autonomous
aerial swarm systems in GPS-denied areas; yet, it remains a highly challenging research …
aerial swarm systems in GPS-denied areas; yet, it remains a highly challenging research …
Energy conservation of content routing through wireless broadcast control in NDN based MANET: A review
Abstract Research in Named Data Networking-based Mobile Ad hoc Network (NDN based
MANET) experienced a lot of momentum and development in recent years. Such robust …
MANET) experienced a lot of momentum and development in recent years. Such robust …
The role of unmanned aerial vehicles in military communications: application scenarios, current trends, and beyond
M Gargalakos - The Journal of Defense Modeling and …, 2024 - journals.sagepub.com
The role of unmanned aerial vehicles (UAVs) is becoming increasingly important for military
conflicts. UAVs are more and more strongly considered as a force multiplier that could play a …
conflicts. UAVs are more and more strongly considered as a force multiplier that could play a …
Flexible supervised autonomy for exploration in subterranean environments
While the capabilities of autonomous systems have been steadily improving in recent years,
these systems still struggle to rapidly explore previously unknown environments without the …
these systems still struggle to rapidly explore previously unknown environments without the …
Chinese character-level writer identification using path signature feature, DropStroke and deep CNN
W Yang, L **, M Liu - 2015 13th International Conference on …, 2015 - ieeexplore.ieee.org
Most existing online writer-identification systems require that the text content is supplied in
advance and rely on separately designed features and classifiers. The identifications are …
advance and rely on separately designed features and classifiers. The identifications are …
Blockchain incentivized data forwarding in MANETs: Strategies and challenges
Recently, blockchain trustless properties started to be investigated to design cooperation
enforcement mechanisms in many systems. This paper presents a comprehensive and …
enforcement mechanisms in many systems. This paper presents a comprehensive and …
[HTML][HTML] Drone based wireless mesh network for disaster/military environment
In recent years, researches of disseminating wireless network have been conducted for
areas without network infrastructure such as disaster situation or military disputes. However …
areas without network infrastructure such as disaster situation or military disputes. However …
JOKER: A novel opportunistic routing protocol
R Sanchez-Iborra, MD Cano - IEEE Journal on Selected Areas …, 2016 - ieeexplore.ieee.org
The increase in multimedia services has put energy saving on the top of current demands for
mobile devices. Unfortunately, batteries' lifetime has not been as extended as it would be …
mobile devices. Unfortunately, batteries' lifetime has not been as extended as it would be …
Routing metric and protocol for wireless mesh network based on information entropy theory
In this work, the authors propose a routing algorithm based on information entropy theory for
calculating the metric, considering the probability of packet loss. Information entropy theory …
calculating the metric, considering the probability of packet loss. Information entropy theory …