Nowadays security issues concern also mail correspondence, therefore we consider mandatory before open or even get closer to a letter or a postal collet to have information about the type of correspondence, informatio...
详细信息
Fitting a polynomial to observed data is an ubiquitous task in many signal processing and machine learning tasks, such as interpolation and prediction. In that context, input and output pairs are available and the goa...
详细信息
This article presents a method for indirectly measuring the moisture content of paddy using a cylindrical capacitive sensor combined with Charge Integrator Circuits. The moisture measurement device operates based on t...
详细信息
This study classifies the actions of football players using sensing data acquired from wearable sensors attached to players and the ball. More than 800 sensing data with the labels of five types of player actions were...
详细信息
This study employed a l0-fold cross-validation approach to train and validate neural networks to predict the RSSI (received signal strength indicator) in LoRaWAN communication. The model's performance was accurate...
详细信息
This paper introduces a recently proposed end-fire leaky wave antenna (LWA) with high radiation gain and efficiency under vertical polarization. By periodically loading a series of shorting-pins in the double-sided-pa...
详细信息
In the current context of increasing electricity consumption and at the same time reducing CO2 emissions, distributed renewable energy sources have gradually become a new trend in distribution network development. The...
详细信息
The inductance matching between the pickup coil and the input coil in a Superconducting Quantum Interference Device (SQUID) gradiometer is one of the important factors affecting its noise and sensitivity. In this pape...
详细信息
This paper presents the design and simulation of a plasmonic refractive index (RI) sensor and a temperature sensor. The suggested design comprises a MIM waveguide integrated with a grill-shaped rectangular cavity. Sim...
详细信息
To solve the large resource overhead and risk problems of traditional encryption and decryption technologies. This paper presents a secure computing scheme of 8T1C structure based on charge accumulation and dissipatio...
详细信息
暂无评论