Abstract: Satellite communication offers the prospect of service continuity over uncovered and under-covered areas, service ubiquity, and service scalability. However, several challenges must first be ...
Abstract: Infrared small target detection (ISTD) boasts extensive applications across civil and military domains, owing to its exceptional all-day performance. Neural network innovations have led to ...
Abstract: The author was led to the study given in this paper from a consideration of large scale computing machines in which a large number of operations must be ...
Book Abstract: This comprehensive guide offers a detailed treatment of the analysis, design, simulation and testing of the full range of today's leading delta-sigma data converters. Written by ...
Book Abstract: * The first single volume resource for researchers in the field who previously had to depend on separate papers and conference records to attain a working knowledge of the subject.
Abstract: Maxwell's equations are replaced by a set of finite difference equations. It is shown that if one chooses the field points appropriately, the set of finite difference equations is applicable ...
Abstract: The penetration of distributed energy resources in electrical grids has been steadily increasing in an effort to reduce greenhouse gas emissions. Inverters, as interfaces between distributed ...
Abstract: This review examines the ethical, social, and technical challenges posed by AI-generated text tools, focusing on their rapid advancement and widespread adoption. An exhaustive literature ...
Abstract: Although the problem of determining the minimum cost path through a graph arises naturally in a number of interesting applications, there has been no underlying theory to guide the ...
Abstract: Local and global spectral and spatial information is crucial for hyperspectral image (HSI) classification. However, modeling the global context has been challenging due to the limitations of ...
Abstract: Generative tasks, such as text generation and question answering, are essential for mobile applications. Given their inherent privacy sensitivity, executing them on devices is demanded.