Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
autonomous aerial vehicles
biblio
Detection of LSSUAV using hash fingerprint based SVDD
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
IEEE 802.11n Standard
Unmanned Aerial Vehicles
UAV detection
SVDD recognition
Signal to noise ratio
Resiliency
radar detection
pubcrawl
Protocols
novel distance-based support vector data description algorithm
LSSUAV
Acoustic Fingerprints
Human behavior
hash fingerprint based SVDD
hash fingerprint
fingerprint identification
feature extraction
computation complexity
composability
autonomous aerial vehicles
Ad hoc networks
biblio
Blind image quality evaluation metrics design for UAV photographic application
Submitted by grigby1 on Wed, 03/08/2017 - 2:03pm
Image Processing
unmanned aerial vehicle
UAV photographic application
uav
telerobotics
robot vision
pubcrawl170111
photography
outdoor application
mobile robots
Measurement
imaging quality
image texture intensity level
image texture
image quality metric
Image quality
autonomous aerial vehicles
image noise level
image jitter level
image flicker level
image enhancement
Image edge detection
image edge blur level
image contrast level
image brightness level
HVS based IQEM
human visual system
Cameras
calamity resuce
blind IQEM
blind image quality evaluation metrics design
biblio
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications
Submitted by BrandonB on Thu, 04/30/2015 - 11:58am
malicious unmanned air vehicles
Weapons
unmanned air vehicles (UAVs)
uav
sensors
security of data
security
reckless attacker behaviors
random attacker behaviors
Pricing
opportunistic attacker behaviors
multiagent system
multi-agent systems
Monitoring
actuators
malicious attacks
Intrusion Detection
IDS
Gears
distributed system
BRUIDS
behavior rule specifications
autonomous aerial vehicles
ant-colony clustering model
ant colony optimisation
airborne system
adaptive intrusion detection
« first
‹ previous
1
2
3
4
5