Zobrazeno 1 - 10
of 697
pro vyhledávání: '"NI Qiang"'
Publikováno v:
Gong-kuang zidonghua, Vol 50, Iss 8, Pp 84-90 (2024)
Currently, most research on coal quantity detection focuses on the coal quantity detection and recognition of underground belt conveyors in coal mines. The coal quantity detection of scraper conveyors in fully mechanized working (caving) faces only s
Externí odkaz:
https://doaj.org/article/ff96c3c67fad4072adfa1b317dc9377a
Autor:
Chen, Xianfu, Wu, Celimuge, Shen, Yi, Ji, Yusheng, Yoshinaga, Tsutomu, Ni, Qiang, Zarakovitis, Charilaos C., Zhang, Honggang
This article investigates a control system within the context of six-generation wireless networks. The control performance optimization confronts the technical challenges that arise from the intricate interactions between communication and control su
Externí odkaz:
http://arxiv.org/abs/2407.06227
Measurements cause quantum wave functions to collapse. In tackling this elusive issue, we embark on the exploration of entropy exhibited by single-qubit quantum systems. Our findings surprisingly challenge the conventional law of entropy never dimini
Externí odkaz:
http://arxiv.org/abs/2406.19158
Autor:
Bozorgchenani, Arash, Zarakovitis, Charilaos C., Chien, Su Fong, Ni, Qiang, Gouglidis, Antonios, Mallouli, Wissam, Lim, Heng Siong
Network connectivity exposes the network infrastructure and assets to vulnerabilities that attackers can exploit. Protecting network assets against attacks requires the application of security countermeasures. Nevertheless, employing countermeasures
Externí odkaz:
http://arxiv.org/abs/2303.08544
Cooperative multi-agent reinforcement learning (c-MARL) is widely applied in safety-critical scenarios, thus the analysis of robustness for c-MARL models is profoundly important. However, robustness certification for c-MARLs has not yet been explored
Externí odkaz:
http://arxiv.org/abs/2212.11746
3D point cloud models are widely applied in safety-critical scenes, which delivers an urgent need to obtain more solid proofs to verify the robustness of models. Existing verification method for point cloud model is time-expensive and computationally
Externí odkaz:
http://arxiv.org/abs/2207.07539
In recent years, a significant amount of research efforts concentrated on adversarial attacks on images, while adversarial video attacks have seldom been explored. We propose an adversarial attack strategy on videos, called DeepSAVA. Our model includ
Externí odkaz:
http://arxiv.org/abs/2111.05468
Publikováno v:
In Case Studies in Thermal Engineering July 2024 59
Publikováno v:
In Chemical Engineering Journal 15 June 2024 490
Publikováno v:
In Measurement 15 March 2024 227