Abstract: This paper presents the first discrete-time distributed algorithm to track the tightest ellipsoids that outer approximates the global dynamic intersection of ellipsoids. Given an undirected ...
Abstract: Deep reinforcement learning is the combination of reinforcement learning (RL) and deep learning. This field of research has recently been able to solve a wide range of complex ...
Abstract: The trajectory planning of multiple unmanned aerial vehicles (UAVs) is the core of efficient UAV mission execution. Existing studies have mainly transformed this problem into a ...
Abstract: Modern day cellular mobile networks use Massive MIMO technology to extend range and service multiple devices within a cell. This has brought tremendous improvements in the high peak data ...
Abstract: In the field of multisource remote sensing image classification, remarkable progress has been made by using the convolutional neural network (CNN) and Transformer. While CNNs are constrained ...
Abstract: In Artificial Intelligence, there is an increasing demand for adaptive models capable of dealing with a diverse spectrum of learning tasks, surpassing the limitations of systems devised to ...
Abstract: Regarding the current problems of false alarms and missed detections in fire detection, we propose a high-precision fire detection algorithm, YOLOV9-CBM (C3-SE, BiFPN, MPDIoU), by optimizing ...
Abstract: Nivedita Arora: Collecting real-time, granular environmental data is essential for urban health, agriculture, and disaster prevention. However, it must be done sustainably, with minimal ...
Persistent Link: https://ieeexplore.ieee.org/servlet/opac?punumber=9944983 ...
Abstract: In hyperspectral images (HSIs), different land cover (LC) classes have distinct reflective characteristics at various wavelengths. Therefore, relying on only a few bands to distinguish all ...
Abstract: Deep hashing has been widely used in image retrieval tasks, while deep hashing networks are vulnerable to adversarial example attacks. To improve the deep hashing networks’ robustness, it is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results