Google is dramatically shortening its readiness deadline for the arrival of Q Day, the point at which existing quantum computers can break public-key cryptography algorithms that secure decades’ worth ...
Abstract: Non-rigid point set registration (NRPSR) is a fundamental research area in the domains of robotics and industrial measurement, aiming to estimate the correspondence and spatial ...
Abstract: The grid-connected photovoltaic (GCPV) systems are required to comply with specific grid code standards, including low voltage ride through (LVRT). During voltage drops, particularly ...
Abstract: This paper reconstructs the kernel least mean squares algorithm (KLMS) from the perspective of the fixed-point strategy, thereby introducing the fixed-point kernel least mean squares ...
Artificial intelligence is everywhere. It drafts emails, summarizes meetings, and answers questions in seconds. Used well, it can improve efficiency and clarity. Used poorly, it can create false ...
Abstract: Existing underwater terrain matching localization algorithms face challenges such as limited application scope, poor real-time performance, and low localization accuracy. To address these ...
Abstract: This paper presents an improved Red-tailed Hawk (IRTH) algorithm for maximum power point tracking (MPPT) to overcome the multiple power peaks exhibited in the P-U curves of photovoltaic (PV) ...
Abstract: This paper focuses on the multi-objective resource allocation problem in multi-agent systems, where the objective is to find an optimal allocation policy. To solve this problem, we propose ...
Abstract: In the rapidly evolving field of Web Front-End development, traditional teaching platforms often suffer from rigid content delivery mechanisms that fail to accommodate individual learning ...
Abstract: Aiming at the phenomenon that photovoltaic (PV) arrays may be partially shaded due to external influences, resulting in several power peaks in power-voltage (P-V) graph and making it ...
This repository contains a SystemVerilog implementation of an out-of-order RISC-V processor based on Tomasulo's algorithm. The design implements the RV32I instruction set (excluding FENCE*, ECALL, ...