Results 71 to 80 of about 477 (109)
Human behavior in image-based Road Health Inspection Systems despite the emerging AutoML. [PDF]
Siriborvornratanakul T.
europepmc +1 more source
Real-Time Resonance Detection and Active Damping in Energy Recovery Railways Applications
This article presents a real-time active damping methodology for front-end inverters connected to the railway catenary in energy recovery applications.
Giovanni Marini+4 more
semanticscholar +1 more source
Statistics of vacuum breakdown in the high-gradient and low-rate regime
In an increasing number of high-gradient linear accelerator applications, accelerating structures must operate with both high surface electric fields and low breakdown rates.
W. Wuensch+6 more
semanticscholar +1 more source
Timber structures made of naturally curved oak wood: prototypes and processes
N. M. Larsen+3 more
semanticscholar +1 more source
Quality Control of Geostationary Lightning Mapper Observations for Tropical Cyclone Applications
The Geostationary Lightning Mapper (GLM) has been providing unprecedented observations of total lightning since becoming operational in 2017. The potential for GLM observations to be used for forecasting and analyzing tropical cyclone (TC) structure and
B. E. C. T. Rabing+5 more
semanticscholar +1 more source
Rhizonet: Image Segmentation for Plant Root in Hydroponic Ecosystem
D. Ushizima+4 more
semanticscholar +1 more source
Hybrid Data Visualization Based on Depth Complexity Histogram Analysis
S. Lindholm+5 more
semanticscholar +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
False Data Injection Attacks on CSA-Based State Estimation in Smart Grid
Conference Companion on Genetic and Evolutionary Computation, 2022Measurement devices are placed on the network in order to monitor and operate smart grids. The state of the system is estimated using the network model of the system and the measurement data set obtained from the measuring devices.
Cenk Andic, A. Ozturk, B. Turkay
semanticscholar +1 more source
Topological Analysis of Mixer Activities in the Bitcoin Network
arXiv.orgCryptocurrency users increasingly rely on obfuscation techniques such as mixers, swappers, and decentralised or no-KYC exchanges to protect their anonymity.
Francesco Zola+3 more
semanticscholar +1 more source