Proceedings of the Future Technologies Conference (FTC) 2024, Volume 4
portes grátis
Proceedings of the Future Technologies Conference (FTC) 2024, Volume 4
Arai, Kohei
Springer International Publishing AG
11/2024
659
Mole
9783031731273
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
Aerial Manipulator Control Based on Linear Algebra and Lyapunov Theories.- Aerial Manipulator Robot Trajectory Tracking for Rhythmic Entertainment Applications.- The Automated Guitarist: A Programmed-Based Musical Robot.- Challenges of Robotic Milli-G Operations for Asteroid Mining.- A Holistic Security Approach to Protect Cloud-Native Applications.- Exploring Latent Fingerprint Synthesis with Diffusion Probabilistic Models.- Overcoming the Fear of Missing Out on Data.- Strengthening Industrial IoT Security with Integrated PUF Token.- Graph-Powered Mining and Analysis of SELinux Security Policies.- The Comparison of Random Forest and XGBoost in Malicious Browser Extensions Detection in Google Chrome Based on the Feature Importance.- Performance Evaluation of Response Based Cryptography Versus Fuzzy Extractors Based on Error Correction Codes.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Computing;Electronics;Intelligent Systems;Robotics;Machine Vision;Security and Communications;FTC 2024;FTC
Aerial Manipulator Control Based on Linear Algebra and Lyapunov Theories.- Aerial Manipulator Robot Trajectory Tracking for Rhythmic Entertainment Applications.- The Automated Guitarist: A Programmed-Based Musical Robot.- Challenges of Robotic Milli-G Operations for Asteroid Mining.- A Holistic Security Approach to Protect Cloud-Native Applications.- Exploring Latent Fingerprint Synthesis with Diffusion Probabilistic Models.- Overcoming the Fear of Missing Out on Data.- Strengthening Industrial IoT Security with Integrated PUF Token.- Graph-Powered Mining and Analysis of SELinux Security Policies.- The Comparison of Random Forest and XGBoost in Malicious Browser Extensions Detection in Google Chrome Based on the Feature Importance.- Performance Evaluation of Response Based Cryptography Versus Fuzzy Extractors Based on Error Correction Codes.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.