Image steganography algorithms based on deep learning typically train using spatial or frequency domain features. However, features from a single domain often struggle to fully express the content of ...
Disturbance Processes,Interval Estimates,Interval Observer,Stealthy Attacks,Upper Estimate,Upper Interval,Coordinate Transformation,Cyber-physical Systems,Measurement ...
Get article recommendations from ACS based on references in your Mendeley library. Pair your accounts. Export articles to Mendeley Get article recommendations from ACS based on references in your ...
Abstract: Large power fluctuation may cause transient instability in renewable power generations (RPGs) via voltage source converter based high voltage direct current transmission (VSC-HVDC) system.
The National and Local Joint Engineering Research Center for Biomanufacturing of Chiral Chemicals, Zhejiang University of Technology, Hangzhou, Zhejiang 310014, P. R. China Zhejiang Key Laboratory of ...
Pull requests help you collaborate on code with other people. As pull requests are created, they’ll appear here in a searchable and filterable list. To get started, you should create a pull request.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results