The rapid evolution of cloud computing and the increasing reliance on Software -Defined Networking (SDN) have introduced new challenges in ensuring the security and availability of cloud based services. Distributed De...
详细信息
In order to suppress the torque pulsation of linear switched reluctance motor, a method based on fuzzy PI control is proposed in this paper based on traditional PI control. The simulation results show that compared wi...
详细信息
Under conditions of muscle fatigue, the efficacy of using electromyographic signals for decoding joint angles significantly deteriorates, highlighting the importance of optimizing decoding under fatigue. In this conte...
详细信息
This paper presents a robust, real-time, and highly accurate robot loop closure Visual-Inertial-GNSS navigation system (LC-GVINS) that fully utilizes GNSS raw measurements in loop closure constraints calculation and p...
详细信息
This work proposes a covert communication scheme in a cognitive radio network where a secondary transmitter (ST) transmits confidential information to a secondary receiver under the protection of a jammer. Specificall...
详细信息
Most data structures use hash tables. A key method in computer science for effectively storing, accessing, and searching for data is hashing. It involves converting a key into a hash value and using this value to acce...
详细信息
Timely and effective fault diagnosis for aviation secondary power supplies to minimize the failure rate and ensure the power supply of the load is critical. In this paper, in order to realize the fault diagnosis of av...
详细信息
In this paper, a model-free reinforcement learning(RL) method of training a nonlinear attitude controller of a quadrotor is proposed. For the problem that the attitude controller is uncontrolled when trained by RL dir...
详细信息
Skin cancer is a prevalent and potentially lifethreatening disease that requires early detection and timely treatment for improved patient outcomes. In this paper, we address the limitations of traditional approaches ...
详细信息
Intelligent cluster networks are crucial infrastructures with a high susceptibility to cyber threats, necessitating the optimization of existing security protocols and resource allocation schemes to dynamically mitiga...
详细信息
暂无评论