In this paper, the time-of-arrival (TOA) localization problem in the presence of non-line-of-sight (NLOS) errors is addressed. We propose a robust localization method based on the maximum correntropy criterion with va...
详细信息
Piezoelectric energy (PE) harvesters can harvest vibration energy and convert it into electrical energy, which provides a promising solution to supply sustainable power for wireless sensor networks (WSN) applications....
详细信息
In this paper, we propose a transfer learning-based approach for road sign classification using pre-trained CNN models. We evaluate the performance of our fine-tuned VGG-16, VGG-19, ResNet50 and EfficientNetB0 models ...
详细信息
Uncertain data is widely used in many practical applications, such as data cleaning, location-based services, privacy protection, and so on. With the development of technology, data has a tendency to high-dimensionali...
详细信息
This paper presents the development of a secure data platform designed to enhance operational efficiency and to facilitate cross-company collaboration within the manufacturing supply chain. The platform is designed to...
详细信息
We investigate the statistical behavior of gradient descent iterates with dropout in the linear regression model. In particular, non-asymptotic bounds for the convergence of expectations and covariance matrices of the...
详细信息
We investigate the statistical behavior of gradient descent iterates with dropout in the linear regression model. In particular, non-asymptotic bounds for the convergence of expectations and covariance matrices of the iterates are derived. The results shed more light on the widely cited connection between dropout and ℓ2-regularization in the linear model. We indicate a more subtle relationship, owing to interactions between the gradient descent dynamics and the additional randomness induced by dropout. Further, we study a simplified variant of dropout which does not have a regularizing effect and converges to the least squares estimator.
Harmonic radar systems are used to interrogate, or track a location of, passive nonlinear targets in highly cluttered environments, and they are notorious for their poor power efficiency and low detection ranges. Due ...
详细信息
In this paper, we present an architecture for the deployment of an edge computing system based on Named Data Networking (NDN) as part of a private 5G network. Our proposed architecture integrates IP-based and non-IP-b...
详细信息
A new optimal anti-disturbance sliding mode control approach for manipulators is proposed in this paper. Aiming at the difficulty of parameter selection of sliding mode controller for manipulators, instead of empirica...
详细信息
Cyber-physical power systems' reliance on cyberspace makes them vulnerable to cyber-attacks, particularly false data injection attacks (FDIAs), where the aim is to alter the state estimation (SE) results by changi...
详细信息
暂无评论