Visual-based robot grasping detection is a significant challenge in the field of robotics. With the widespread application of convolutional neural networks, significant progress has been made in this field in recent y...
详细信息
System security is becoming an increasingly essential feature of modern computing systems, particularly programmable hardware such as Field Programmable Gate arrays (FPGA), employed in various applications such as aut...
详细信息
With more people taking online courses and earning certifications, there are great new opportunities to improve skills. But, this digital trend has also led to a problem with fake certificates. To address this problem...
详细信息
This paper presents the operation, analysis, design, and experimental results of a dual-transformer LCL-type dual active bridge converter with a hybrid modulation strategy. The proposed modulation strategy can effecti...
详细信息
This article addresses the finite-time tracking control of stochastic systems with time-varying input and measurement powers. Compared to the existing results with known input powers, the input powers of the system st...
详细信息
Effective and efficient cyber incident handling is crucial for maintaining the security of information systems and organizational data. This research aims to develop a priority-based cyber incident handling method by ...
详细信息
This paper investigates an ultra-wideband polarization converter based on an electromagnetic metasurface and delves into its polarization conversion mechanism. By leveraging the unique design flexibility of electromag...
详细信息
The Domain Name System (DNS) plays a critical role in network security, yet faces numerous attacks, particularly from malicious domains. In this research, we propose a novel method to reduce the attacks by combining a...
详细信息
Traffic volume surveying is a crucial activity to get traffic statistics for road management and traffic congestion control. In recent years, the target environment of traffic volume surveying has become more complex,...
详细信息
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based...
详细信息
暂无评论