Abstract: Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches.
Abstract: This article addresses the design issue of fuzzy asynchronous fault detection filter (FAFDF) for a class of nonlinear Markov jump systems by an event-triggered (ET) scheme. The ET scheme can ...
Abstract: Maxwell's equations are replaced by a set of finite difference equations. It is shown that if one chooses the field points appropriately, the set of finite difference equations is applicable ...
Abstract: This letter describes Fields2Cover, a novel open source library for coverage path planning (CPP) for agricultural vehicles. While there are several CPP solutions nowadays, there have been ...
Abstract: The structural similarity image quality paradigm is based on the assumption that the human visual system is highly adapted for extracting structural information from the scene, and therefore ...
Abstract: U-net is an image segmentation technique developed primarily for image segmentation tasks. These traits provide U-net with a high utility within the medical imaging community and have ...
Abstract: The idea of the IoT began back in 1982 when a vending machine was connected to the internet, then to the concept of Mark Weiser in 1992, then RFID, and so on. A detailed evolution of the IoT ...
Abstract: This paper presents a high-efficiency and high-step-up nonisolated interleaved dc-dc converter with a common active-clamp circuit. In the presented converter, the coupled-inductor boost ...
Abstract: Since the publication of the original paper on power system stability definitions in 2004, the dynamic behavior of power systems has gradually changed due to the increasing penetration of ...
Abstract: The regional integration of variable wind power could be restricted by a strong coupling of electric power generation dispatch and heat supply of combined heat-and-power (CHP) units. The ...
Abstract: Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in hospitals, deployed outside to control and report the changes in environment, prevent fires, and ...
Abstract: A novel delay-based spacing policy for the control of vehicle platoons is introduced together with a notion of disturbance string stability. The delay-based spacing policy specifies the ...
当前正在显示可能无法访问的结果。
隐藏无法访问的结果