A kernel Weibull M-transform maximum-versoria-criterion (KWMMVC) algorithm is constructed, which is to use for nonlinear system identification. the KWMMVC algorithm ingeniously integrates the Weibull M-transform schem...
详细信息
To achieve high precision direction-of-arrival estimation of MIMO arrays in highly coupled environments, based on the difference and cooperative array principles, the uniform array fitted with 5 base layer array and t...
详细信息
this paper aims to investigate the ability of reconfigurable intelligent surfaces (RIS) damaged in multi-user environments to eliminate interference. Our research found that even if the RIS is damaged, interference ca...
详细信息
—this research delves into the classic Apriori algorithm, comprehensively analyzing its concepts, properties, and existing limitations, and provides a detailed demonstration of the algorithm's execution flow thro...
详细信息
the article discusses image processing algorithms for creating a full-fledged fire detection system based on UAV collections. the wildfire detection issue is solved using artificial intelligence: YOLOv8 model. the fir...
详细信息
Withthe increasing prosperity of the shipping industry, the vessel monitoring system has become increasingly important for improving the safety and operational efficiency of vessels. AIS (Automatic Identification Sys...
详细信息
through computer vision and image processing techniques, a set of images from a scene can be reconstructed in 3D to recover a 3D model of the scene, in which dense reconstruction is a crucial part, and most existing a...
详细信息
this paper explores the core position of Data Structure in information-related education and the teaching challenges it faces. By adopting the hybrid teaching education concept of"gradual progress, truth-seeking ...
详细信息
Generative Artificial Intelligence (GenAI) is revolutionizing the field of higher education by leveraging deep learning models to generate human-like content. However, the use of GenAI in education raises ethical conc...
详细信息
this article firstly analyses the situation and technology trends of security system, then proposes the conception and structure of the Cloud-based Security System for Critical Site (CSSCS), finally provide an outlook...
详细信息
ISBN:
(纸本)9798400708305
this article firstly analyses the situation and technology trends of security system, then proposes the conception and structure of the Cloud-based Security System for Critical Site (CSSCS), finally provide an outlook of CSSCS building approach, which is top-down mapping and bottom-up founding. CSSCS virtualized multiple sensors, weapons, facilities and equipment, break the fixed relations between each other, combine them with network, and build up flexible information resources network. the information resources network can recompose dynamically according to the battle situation, which can be combined into an operational structure with a subordinate relationship at any time. the aim of CSSCS is to achieve command-flattening, disposal-quickening, evaluation-automation and perception-precision.
暂无评论