Abstract: With the continuous development of the power system, in the face of the frequency deviation caused by the randomness and volatility of renewable energy sources such as photovoltaic and wind ...
Abstract: Remote sensing images are usually characterized by complex backgrounds, scale and orientation variations, and large intraclass variance. General semantic segmentation methods usually fail to ...
Abstract: In this article, an integral reinforcement learning (IRL) method is developed for dynamic event-triggered nonzero-sum (NZS) games to achieve the Nash equilibrium of unmanned surface vehicles ...
Abstract: The current optical convolution architectures are facing challenges related to limited scalability, excessive data redundancy and restricted processing bandwidth. In this work, we introduce ...
Abstract: To improve the dynamic performance and disturbance rejection capability of the permanent magnet synchronous motor (PMSM) system, an adaptive super-twisting nonsingular terminal sliding mode ...
Abstract: Federated Learning (FL) is a distributed machine learning framework that allows multiple clients to collaboratively train an intermediate model with keeping data local, however, sensitive ...
Abstract: This paper exploits the networked integrated sensing and communications (ISAC) to support low-altitude economy (LAE), in which a set of networked ground base stations (GBSs) cooperatively ...
Abstract: Next Point-of-interest recommendation involves modeling user interactions with Point-of-interests (PoIs) to analyze user behavior patterns and suggest future scenarios. Data sparsity ...
Abstract: In multimodal multi-objective optimization problems (MMOPs), multiple solutions on different Pareto optimal solution sets (PSs) are mapped to the same point on the Pareto front. Considering ...
Abstract: This brief presents a resolution-reconfigurable successive-approximation-register (SAR) analog-to-digital converter (ADC). The reconfigurable capacitor digital-to-analog converter (CDAC) is ...
Abstract: The rapid development of deepfake technology poses challenges to face-centered data security. Existing methods primarily focus on how to transfer deepfake detectors from the source domain to ...
Abstract: Over the past decades, the number of submitted articles that use numerical approaches for SPICE models or for characterization (extraction) of parameters of existing SPICE models has grown ...