In this work, an attempt is made for the first time to use the measurement pattern generated by morphological transformation quantified by Hausdorff fractal dimension (HFD) and classified with ensemble learning based ...
详细信息
Due to their highly flexible deployment and agility features, unmanned aerial vehicles (UAVs) serving as aerial base stations are increasingly being used in challenging environments, including emergency communication,...
详细信息
Outage work planning has been essential to maintain the power grid system. For the operators, the planning is troublesome. It is caused by too complex process. The past few years, we have been developing Outage Work p...
详细信息
Human Activity Recognition (HAR) systems hold great potential in aiding disabled and elderly individuals to live independently. Various approaches have been suggested for identifying human activities, including sensor...
详细信息
Residual networks play a foremost role in the domain of tracking, specifically in the extraction of features. The residual networks are using a simple technique of skipping connections to overcome the problem of vanis...
详细信息
We consider a perimeter defense problem in a planar conical environment comprising a turret that has a finite range and non-zero startup time. The turret seeks to defend a concentric perimeter against N ≥ 2 intruders...
We consider a perimeter defense problem in a planar conical environment comprising a turret that has a finite range and non-zero startup time. The turret seeks to defend a concentric perimeter against N ≥ 2 intruders. Upon release, each intruder moves radially towards the perimeter with a fixed speed. To capture an intruder, the turret's angle must be aligned with that of the intruder's angle and must spend a specified startup time at that orientation. We address offline and online versions of this optimization problem. Specifically, in the offline version, we establish that in general parameter regimes, this problem is equivalent to solving a Travelling Repairperson Problem with Time Windows (TRP-TW). We then identify specific parameter regimes in which there is a polynomial time algorithm that maximizes the number of intruders captured. In the online version, we present a competitive analysis technique in which we establish a fundamental guarantee on the existence of at best (N – 1)-competitive algorithms. We also design two online algorithms that are provably 1 and 2-competitive in specific parameter regimes.
This paper proposes a novel approach to improving speech recognition performance by combining spectrogram images with extracted formant frequency data within a dual input neural network framework. While spectrograms a...
详细信息
Energy has become an integral part of our life. The fossil fuel present in the environment is very much limited. On the other hand, fossil fuel emits harmful gases such as carbon dioxide, Chlorofluorocarbon (CFC), car...
详细信息
Rehabilitation is essential for individuals with multiple sclerosis (MS) to improve their quality of life and mitigate the progression of the disease. Cognitive deficits, which commonly affect MS patients, significant...
详细信息
暂无评论