50 Reads
·
641 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
50 Reads
·
641 Citations
... From the table, it can be seen that Protocol A provides high efficiency but has a low level of security, Protocol B provides a balance of efficiency and security, and Protocol C has low efficiency but high security. The optimal protocol would depend on the specific needs and trade-offs of the direct learning system for ground robot auto navigation [26,27]. ...