Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Collaborative Trajectory Planning for Stereoscopic Agricultural Multi-UAVs Driven by the Aquila Optimizer

    Xinyu Liu#, Longfei Wang#, Yuxin Ma, Peng Shao*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1349-1376, 2025, DOI:10.32604/cmc.2024.058294 - 03 January 2025

    Abstract Stereoscopic agriculture, as an advanced method of agricultural production, poses new challenges for multi-task trajectory planning of unmanned aerial vehicles (UAVs). To address the need for UAVs to perform multi-task trajectory planning in stereoscopic agriculture, a multi-task trajectory planning model and algorithm (IEP-AO) that synthesizes flight safety and flight efficiency is proposed. Based on the requirements of stereoscopic agricultural geomorphological features and operational characteristics, the multi-task trajectory planning model is ensured by constructing targeted constraints at five aspects, including the path, slope, altitude, corner, energy and obstacle threat, to improve the effectiveness of the trajectory… More >

  • Open Access

    ARTICLE

    Information Flow Security Models for Cloud Computing

    Congdong Lv1, *, Ji Zhang2, Zhoubao Sun1, Gang Qian1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2687-2705, 2020, DOI:10.32604/cmc.2020.011232 - 16 September 2020

    Abstract Cloud computing provides services to users through Internet. This open mode not only facilitates the access by users, but also brings potential security risks. In cloud computing, the risk of data leakage exists between users and virtual machines. Whether direct or indirect data leakage, it can be regarded as illegal information flow. Methods, such as access control models can control the information flow, but not the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture. Typical noninterference models are not suitable… More >

Displaying 1-10 on page 1 of 2. Per Page