Abstract: Driven by the urgent need to displace fossil fuels for carbon emission reduction and climate change mitigation, offshore wind energy has emerged as a highly promising renewable energy source ...
Abstract: Multi-view clustering usually attempts to improve the final performance by integrating graph structure information from different views and methods based on anchor are presented to reduce ...
Abstract: This paper describes a byte-oriented binary transmission code and its implementation. This code is particularly well suited for high-speed local area networks and similar data links, where ...
Abstract: Remote sensing object detection (RSOD) using convolutional neural networks (CNNs) continues to pose challenges in achieving high detection accuracy due to the inherent complexity of remote ...
Abstract: Atmospheric ducting has a significant impact on electromagnetic wave propagation. Radio signals that are trapped and guided by the atmospheric duct can travel a much longer distance over the ...
Abstract: Deep reinforcement learning is the combination of reinforcement learning (RL) and deep learning. This field of research has recently been able to solve a wide range of complex ...
Abstract: The Prompt Gamma Timing (PGT) method provides the assessment of particle range by measuring the time of flight between the primary particle and PG detection. This non-invasive and real-time ...
Abstract: As extensive renewable energy-based distributed generators (DGs) are integrated into the microgrids (MGs), system inertia drops sharply, posing enormous challenges to power quality. Inspired ...
Abstract: Model predictive control (MPC) has established itself as the primary methodology for constrained control, enabling general-purpose robot autonomy in diverse real-world scenarios. However, ...
Abstract: Particle therapy verification using induced prompt gamma radiation is a field of active research. We employ an iterative reconstruction algorithm to reconstruct the spatiotemporal emission ...
Abstract: In the recent past, there has been a significant surge in MAC layer Wi-Fi attacks, leaving Wireless Local Area Networks (WLANs) vulnerable to different types of network intrusion. The ...
Abstract: With the expansion of social robots’ working environments, developing strategies to mitigate their mistakes has become crucial, especially given the difficulty of entirely avoiding errors.