This paper develops distributed algorithms for solving Sylvester *** authors transform solving Sylvester equations into a distributed optimization problem,unifying all eight standard distributed matrix *** the authors...
详细信息
This paper develops distributed algorithms for solving Sylvester *** authors transform solving Sylvester equations into a distributed optimization problem,unifying all eight standard distributed matrix *** the authors propose a distributed algorithm to find the least squares solution and achieve an explicit linear convergence *** results are obtained by carefully choosing the step-size of the algorithm,which requires particular information of data and Laplacian *** avoid these centralized quantities,the authors further develop a distributed scaling technique by using local information *** a result,the proposed distributed algorithm along with the distributed scaling design yields a universal method for solving Sylvester equations over a multi-agent network with the constant step-size freely chosen from configurable ***,the authors provide three examples to illustrate the effectiveness of the proposed algorithms.
Machine Learning and Artificial Intelligence technology accelerates technological progress and promotes social development, but also brings many security problems. Machine learning models may be affected, deceived, co...
Machine Learning and Artificial Intelligence technology accelerates technological progress and promotes social development, but also brings many security problems. Machine learning models may be affected, deceived, controlled or destroyed at different stages, e.g. training and inference, which may lead to serious consequences. In view of the main stages of the life cycle of machine learning, we summarizes the related attack and defense technologies based on threat matrix, makes a comprehensive and systematic analysis on the security issues of machine learning, and puts forward several security protection suggestions for intelligent information systems.
Distributed inference in resource-constrained heterogeneous edge clusters is fundamentally limited by disparities in device capabilities and load imbalance issues. Existing methods predominantly focus on optimizing si...
详细信息
This paper describes the design and demonstration of a hybrid integrated 210260 GHz self-biased frequency tripler based on planar Schottky diodes. Two Schottky diodes are placed in reversed parallel on the circuit. Th...
详细信息
This paper considers the joint design of the antenna position and power allocation in a shared aperture sparse phased array. We introduce a new optimization model relying on the minimization of the Peak Sidelobe Level...
详细信息
In this paper, we propose a fast algorithm based on iterative adaptive approach to address the DOA estimation for the distributed mmWave radar system under the challenging conditions of a single snapshot and coherent ...
详细信息
This paper proposes a two-stage point cloud super resolution framework that combines local interpolation and deep neural network based readjustment. For the first stage, the authors apply a local interpolation method ...
详细信息
This paper proposes a two-stage point cloud super resolution framework that combines local interpolation and deep neural network based readjustment. For the first stage, the authors apply a local interpolation method to increase the density and uniformity of the target point cloud. For the second stage, the authors employ an outer-product neural network to readjust the position of points that are inserted at the first stage. Comparison examples are given to demonstrate that the proposed framework achieves a better accuracy than existing state-of-art approaches, such as PU-Net, Point Net and DGCNN(Source code is available at https://***/qwerty1319/PC-SR).
The length of ships plays an important role in target classification and recognition, but to estimate ships' length in real time is difficult by traditional single radar observation. To solve this problem, the dua...
详细信息
To solve the problem that current dynamic intention recognition methods fail to make full use of time domain variation information between multi-temporal group targets, which leads to low accuracy of intention recogni...
详细信息
The multi-target association algorithm of unmanned aerial vehicles (UAV) clusters in unknown environments is used to solve the problem of multiple UAVs, which can correctly determine whether the data from different pe...
详细信息
暂无评论