2022
DOI: 10.1007/978-981-19-4687-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Obstacle Collision Prediction Model for Path Planning Using Obstacle Trajectory Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…To sort and stop cyber risks, these studies use machine learning algorithms and behavioral analysis methods. Using Bayesian networks for breach detection has also shown promise in making detections more accurate through statistical reasoning [8]. Bayesian networks make danger assessment and decision-making more complex by describing how network events depend on each other.…”
Section: Related Workmentioning
confidence: 99%
“…To sort and stop cyber risks, these studies use machine learning algorithms and behavioral analysis methods. Using Bayesian networks for breach detection has also shown promise in making detections more accurate through statistical reasoning [8]. Bayesian networks make danger assessment and decision-making more complex by describing how network events depend on each other.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, hydro-optical communication makes use of the characteristics of light and water to produce effective data transfer via optical signals. For some light wavelengths, water has relatively low absorption and scattering coefficients, enabling larger data rates and further communication ranges than with conventional techniques [17]. Numerous research investigations have demonstrated the potential of hydro-optical communication, with applications ranging from underwater sensor networks to underwater robots.…”
Section: Introductionmentioning
confidence: 99%
“…This may be thought of as looking for anything that deviates from the norm. A method known as anomaly-based detection [4] is a vital tool that must be used in order to identify zero-based attacks. In order to properly detect new threats, a huge amount of data has to be collected in order to develop a model that specifies what constitutes normal behaviour and what constitutes an aberration.…”
mentioning
confidence: 99%