Articles with "trajectory based" as a keyword



Photo from wikipedia

Trajectory based vehicle counting and anomalous event visualization in smart cities

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0885-5

Abstract: Motion pattern analysis can be performed automatically on the basis of object trajectories by means of tracking videos; an effective approach to analyse and to model the traffic behaviour; is important to describe motion by… read more here.

Keywords: trajectory; based vehicle; vehicle; vehicle counting ... See more keywords
Photo by possessedphotography from unsplash

A trajectory-based method for mixed integer nonlinear programming problems

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Global Optimization"

DOI: 10.1007/s10898-017-0570-5

Abstract: A local trajectory-based method for solving mixed integer nonlinear programming problems is proposed. The method is based on the trajectory-based method for continuous optimization problems. The method has three phases, each of which performs continuous… read more here.

Keywords: integer nonlinear; based method; mixed integer; trajectory based ... See more keywords
Photo from wikipedia

Hybrid-Trajectory Based Terminal Sliding Mode Control of a Flexible Space Manipulator with an Elastic Base

Sign Up to like & get
recommendations!
Published in 2019 at "Robotica"

DOI: 10.1017/s0263574719000857

Abstract: Summary A hybrid-trajectory based terminal sliding mode controller (TSMC) is addressed for a free-flying two-flexible-link space manipulator with an elastic base. In this system, there are unknown but bounded external disturbances and parameters. First, the… read more here.

Keywords: trajectory based; based terminal; manipulator; trajectory ... See more keywords
Photo by hudsoncrafted from unsplash

Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3215688

Abstract: In Internet of Things (IoT), cryptography-based security services are widely used to mitigate security threats. However, establishing cryptographic keys between entities in dynamic IoTs is a challenging issue, due to the high mobility of these… read more here.

Keywords: authenticated key; key establishment; based authenticated; trajectory based ... See more keywords
Photo from wikipedia

Trajectory-based training enables protein simulations with accurate folding and Boltzmann ensembles in cpu-hours

Sign Up to like & get
recommendations!
Published in 2018 at "PLoS Computational Biology"

DOI: 10.1371/journal.pcbi.1006578

Abstract: An ongoing challenge in protein chemistry is to identify the underlying interaction energies that capture protein dynamics. The traditional trade-off in biomolecular simulation between accuracy and computational efficiency is predicated on the assumption that detailed… read more here.

Keywords: training enables; model; based training; boltzmann ... See more keywords