Recent Articles

Open access

ISSN: 1674-862X
CN: 51-1724/TN
e-ISSN: 2666-223X

Numerical design of an efficient Ho3+-doped InF3 fiber laser at ∼3.2 ​μm

In this work, we theoretically unlock the potential of Ho3+-doped InF3 fiber for efficient ∼3.2 ​μm laser generation (from the 5F4,5S2→5F5 transition), by employing a novel dual-wavelength pumping scheme...

Share article

An approach to estimate tree height using PolInSAR data constructed by the Sentinel-1 dual-pol SAR data and RVoG model

We estimate tree heights using polarimetric interferometric synthetic aperture radar (PolInSAR) data constructed by the dual-polarization (dual-pol) SAR data and random volume over the ground (RVoG)...

Share article

Source localization based on field signatures: Laboratory ultrasonic validation

Location awareness in wireless networks is essential for emergency services, navigation, gaming and many other applications. This article presents a method for source localization based on measuring...

Share article

Electromagnetic scattering and imaging simulation of extremely large-scale sea-ship scene based on GPU parallel technology

Aiming to solve the bottleneck problem of electromagnetic scattering simulation in the scenes of extremely large-scale seas and ships, a high-frequency method by using graphics processing unit (GPU)...

Share article

Enhancing personalized exercise recommendation with student and exercise portraits

The exercise recommendation system is emerging as a promising application in online learning scenarios, providing personalized recommendations to assist students with explicit learning directions. Existing...

Share article

Data augmentation method for insulators based on Cycle GAN

Data augmentation is an important task of using existing data to expand data sets. Using generative countermeasure network technology to realize data augmentation has the advantages of high-quality...

Share article

Miniaturized power detection module operating in millimeter wave band

The miniaturized broadband detection module can be embedded into the microwave application system such as the front end of the transmitter to detect the power or other parameters in real time. It is...

Share article

CNN-LSTM based incremental attention mechanism enabled phase-space reconstruction for chaotic time series prediction

To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network, we propose a convolutional neural network (CNN)-long short-term...

Share article

Machine learning algorithm partially reconfigured on FPGA for an image edge detection system

Unmanned aerial vehicles (UAVs) have been widely used in military, medical, wireless communications, aerial surveillance, etc. One key topic involving UAVs is pose estimation in autonomous navigation....

Share article

Efficient ECG classification based on Chi-square distance for arrhythmia detection

This study introduces a new classifier tailored to address the limitations inherent in conventional classifiers such as K-nearest neighbor (KNN), random forest (RF), decision tree (DT), and support...

Share article

Low profile cavity-embedded ultra-wideband UHF array antenna with end-fire beams

A low profile, vertically polarized, ultra-wideband array antenna with end-fire beams operating in an ultra-high frequency (UHF) band is developed in this paper. The array antenna consists of 1×16 log-periodic...

Share article

Effective approach for conformal subarray design based on maximum entropy of planar mappings

In this paper, an effective algorithm for optimizing the subarray of conformal arrays is proposed. The method first divides the conformal array into several first-level subarrays. It uses the X algorithm...

Share article

Global-Local combined features to detect pain intensity from facial expression images with attention mechanism1

The estimation of pain intensity is critical for medical diagnosis and treatment of patients. With the development of image monitoring technology and artificial intelligence, automatic pain assessment...

Share article

Evaluation of a software positioning tool to support SMEs in adoption of big data analytics

Big data analytics has been widely adopted by large companies to achieve measurable benefits including increased profitability, customer demand forecasting, cheaper development of products, and improved...

Share article

Big data challenge for monitoring quality in higher education institutions using business intelligence dashboards

As big data becomes an apparent challenge to handle when building a business intelligence (BI) system, there is a motivation to handle this challenging issue in higher education institutions (HEIs)....

Share article

Iterative physical optics method based on efficient occlusion judgment with bounding volume hierarchy technology

This paper builds a binary tree for the target based on the bounding volume hierarchy technology, thereby achieving strict acceleration of the shadow judgment process and reducing the computational...

Share article

Benchmarking YOLOv5 models for improved human detection in search and rescue missions

Drone or unmanned aerial vehicle (UAV) technology has undergone significant changes. The technology allows UAV to carry out a wide range of tasks with an increasing level of sophistication, since drones...

Share article

Multi-scale persistent spatiotemporal transformer for long-term urban traffic flow prediction

Long-term urban traffic flow prediction is an important task in the field of intelligent transportation, as it can help optimize traffic management and improve travel efficiency. To improve prediction...

Share article

Fine-grained grid computing model for Wi-Fi indoor localization in complex environments

The fingerprinting-based approach using the wireless local area network (WLAN) is widely used for indoor localization. However, the construction of the fingerprint database is quite time-consuming....

Share article

Machine learning model based on non-convex penalized huberized-SVM

The support vector machine (SVM) is a classical machine learning method. Both the hinge loss and least absolute shrinkage and selection operator (LASSO) penalty are usually used in traditional SVMs....

Share article

High-sensitivity phase imaging eddy current magneto-optical system for carbon fiber reinforced polymers detection

This paper proposed a high-sensitivity phase imaging eddy current magneto-optical (PI-ECMO) system for carbon fiber reinforced polymer (CFRP) defect detection. In contrast to other eddy current-based...

Share article

Characteristics of sub-synchronous oscillation in grid-connected wind farm system

With the rapid development of wind power, wind turbines are accompanied by a large quantity of power electronic converters connected to the grid, causing changes in the characteristics of the power...

Share article

Low working loss Si/4H–SiC heterojunction MOSFET with analysis of the gate-controlled tunneling effect

A silicon (Si)/silicon carbide (4H–SiC) heterojunction double-trench metal-oxide-semiconductor field effect transistor (MOSFET) (HDT-MOS) with the gate-controlled tunneling effect is proposed for the...

Share article

Life-cycle assessment of batteries for peak demand reduction

At present, a life-cycle assessment of energy storage systems (ESSs) is not widely available in the literature. Such an assessment is increasingly vital nowadays as ESS is recognized as one of the important...

Share article

Boundedness and liveness enforcement for labeled Petri nets using transition priority

This paper deals with the supervisory control problem of discrete event systems modeled by labeled Petri nets. The system is originally unbounded. First, the solvability of the problem is confirmed....

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.