The accurate prediction of behaviors of surrounding traffic participants is critical for autonomous vehicles (AV). How to fully encode both explicit (e.g., map structure and road geometry) and implicit scene context i...
详细信息
Wireless transmission is vulnerable to malicious jamming attacks due to the openness of wireless channels, posing a severe threat to wireless communications. Current anti-jamming studies primarily focus on either enha...
详细信息
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are ***...
详细信息
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are *** recent advances in experimental and theoretical studies on regime shifts and tipping points,theoretical tools for understanding the extinction chain,which is the sequence of species extinctions resulting from overexploitation,are still lacking,especially for large-scale nonlinear networked *** this study,we developed a mathematical tool to predict regime shifts and extinction chains in ecosystems under multiple exploitation situations and verified it in 26 real-world mutualistic networks of various sizes and *** discovered five phases during the exploitation process:safe,partial extinction,bistable,tristable,and collapse,which enabled the optimal design of restoration strategies for degraded or collapsed *** validated our approach using a 20-year dataset from an eelgrass restoration ***,we also found a specific region in the diagram spanning exploitation rates and competition intensities,where exploiting more species helps increase *** computational tool provides insights into harvesting,fishing,exploitation,or deforestation plans while conserving or restoring the biodiversity of mutualistic ecosystems.
Traditional load shedding schemes can be inadequate in grids with high renewable penetration, leading to unstable events and unnecessary grid islanding. Although for both manual and automatic operating modes load shed...
详细信息
In recent years, power grids have seen a surge in large cryptocurrency mining firms, with individual consumption levels reaching 700MW. This study examines the behavior of these firms in Texas, focusing on how their c...
详细信息
The present paper proposes an optimization design method for the Doherty output matching network(OMN)using impedance–phase hybrid objective function constraints,which possesses the capability of enhancing the efficie...
详细信息
The present paper proposes an optimization design method for the Doherty output matching network(OMN)using impedance–phase hybrid objective function constraints,which possesses the capability of enhancing the efficiency consistency of the Doherty power amplifier(DPA)using integrated enhancing reactance(IER)during the back-off power(BOP)*** calculating the desired reactance for an extended BOP range and combining it with the two-impedance matching method,the S-parameters of the OMN are ***,the impedance and phase constraints of the OMN are proposed to narrow the distribution range of the ***,a fragmenttype structure is employed in the OMN optimization so as to enhance the flexibility of the circuit optimization *** validate the proposed method,a 1.7–2.5 GHz symmetric DPA with a large BOP range was designed and *** results demonstrate that across the entire operating frequency band,the saturated output power is>44 dBm,and the efficiency ranges from 45%to 55%at a 9-dB BOP.
Neural networks with relatively shallow layers and simple structures may have limited ability in accurately identifying pneumonia. In addition, deep neural networks also have a large demand for computing resources, wh...
详细信息
In this paper, we establish simple and efficient approximations for the outage probability of a single-user multi-resource allocation system that consists of a machine learning (ML) based outage predictor whose task i...
详细信息
The dangers of adversarial attacks on Uncrewed Aerial Vehicle (UAV) agents operating in public are increasing. Adopting AI-based techniques and, more specifically, Deep Learning (DL) approaches to control and guide th...
详细信息
The Vehicular Digital Twin Network (VDTN) integrates digital twin (DT) models of connected and autonomous vehicles (CAVs) to facilitate smart sensing, management, and collaboration in the physical realm. VDTN synchron...
详细信息
暂无评论