This paper proposes a multi-sampling mode capacitor DAC (CDAC) for a 12-bit 200MS/s pipelined-SAR ADC, addressing the issue of overfitting in neural network-based calibrations. By implementing normal, offset, and prop...
详细信息
ISBN:
(数字)9798350361834
ISBN:
(纸本)9798350361841
This paper proposes a multi-sampling mode capacitor DAC (CDAC) for a 12-bit 200MS/s pipelined-SAR ADC, addressing the issue of overfitting in neural network-based calibrations. By implementing normal, offset, and proportional sampling modes, the design ensures the linearity of the ADC's transfer function. The proposed CDAC utilizes a bottom-plate sampling method and a high-linearity bootstrap circuit. Simulation results demonstrate that the proposed ADC achieves an SFDR of around 75dB and an ENOB of approximately 10.8bits across all sampling modes, validating the effectiveness of the design in enhancing ADC performance.
To address the problem of low tracking accuracy caused by unknown excitation and measurement noise in radar systems, a tracking algorithm based on variational Bayes is proposed. This algorithm leverages variational Ba...
详细信息
ISBN:
(数字)9798350368284
ISBN:
(纸本)9798350368291
To address the problem of low tracking accuracy caused by unknown excitation and measurement noise in radar systems, a tracking algorithm based on variational Bayes is proposed. This algorithm leverages variational Bayes theory to treat the unknown excitation and measurement noise as hidden variables, enabling the computation of the likelihood probability of the target motion state. By decoupling these hidden variables under the expected maximum criterion and field theory, an approximate estimation of the hidden variables is obtained. These estimates are then combined with the unscented Kalman filter to achieve target state estimation. Through iterative updates of the target state, excitation, and measurement noise parameters, high-precision target tracking is achieved. Additionally, an evaluation method to terminate the iterative process is proposed. Simulation results demonstrate that the variational Bayes-based target tracking algorithm can effectively suppress tracking divergence issues caused by unknown parameters, leading to stable tracking performance and significant improvements in target state estimation accuracy. The algorithm consistently achieves stable target tracking across various target motion models, measurement errors, noise errors, and iteration termination values. These results indicate that the proposed method holds promising potential for practical applications.
As quantum computing gains popularity, it’s crucial to tackle security and privacy issues upfront. One major concern is the involvement of third-party tools and hardware. With more quantum computing services availabl...
详细信息
ISBN:
(数字)9798350309270
ISBN:
(纸本)9798350309287
As quantum computing gains popularity, it’s crucial to tackle security and privacy issues upfront. One major concern is the involvement of third-party tools and hardware. With more quantum computing services available, even from less reputable sources, users might be drawn in by lower costs and easier access. However, usage of untrusted hardware could present the risk of intellectual property (IP) theft. For instance, popular algorithms like Quantum Approximate Optimization Algorithm (QAOA) encode graph properties in parameterized quantum circuits, opening the door to potential risks. For mission critical applications like power grid optimization, the graph structure can reveal the power grid and their connectivity (an IP that should be protected). To mitigate this risk, we propose an edge pruning obfuscation method for QAOA along with a split iteration methodology. The basic idea is to, (i) create two flavors of QAOA circuit each with few distinct edges eliminated from the problem graph for obfuscation, (ii) iterate the circuits alternately during optimization process to uphold the optimization quality, and (iii) send the circuits to two different untrusted hardware provider so that the adversary has access to partial graph protecting the IP. We demonstrate that combining edge pruning obfuscation with split iteration on two different hardware secures the IP and increases the difficulty of reconstruction while limiting performance degradation to a maximum of 10% ($\approx 5$% on average) and maintaining low overhead costs (less than 0.5X for QAOA with single layer implementation).
Zemu Glacier, a prominent glacier in the eastern Himalayas, remains largely unexplored in various glacier research endeavors. Satellite remote sensing and GIS techniques function as valuable tools for appraising tempo...
详细信息
ISBN:
(数字)9798350358582
ISBN:
(纸本)9798350358599
Zemu Glacier, a prominent glacier in the eastern Himalayas, remains largely unexplored in various glacier research endeavors. Satellite remote sensing and GIS techniques function as valuable tools for appraising temporal changes in remote glacial terrains that are challenging to reach. The scope of this study explores the distinguished prospective routes of automated mapping of glacial land cover using visible and thermal-infrared (TIR) bands of Landsat series along with the Mono-Window algorithm to calculate Glacial surface temperature (GST) for the spatial distribution of debris cover and Shuttle Radar Topographic Mission (SRTM) Digital Elevation Model (DEM) for slope and aspect. The temporal change analysis of debris-cover portrays more than 50% of the approximate change from the year 1989 to 2022.
We study the Whittle index learning algorithm with Q-Iearning for restless multi-armed bandits. We first discuss Q-learning algorithm with exploration policies-E-greedy, softmax, e-softmax with constant stepsizes. We ...
详细信息
ISBN:
(数字)9798331531539
ISBN:
(纸本)9798331531546
We study the Whittle index learning algorithm with Q-Iearning for restless multi-armed bandits. We first discuss Q-learning algorithm with exploration policies-E-greedy, softmax, e-softmax with constant stepsizes. We extend the study of Q-learning to index learning for single-armed restless bandit. The algorithm of index learning is two-timescale variant of stochastic approximations. On slower timescales, we update index and on faster timescales, we update Q-Iearning by assuming fixed index value. Here, Q-Iearning updates are in asynchronous manner. We study constant stepsizes two timescale stochastic approximations algorithm. Further, we study on index learning with deep Q-networks (DQN) learning and linear function approximations using state-aggregations method. We describe the performance of our algorithms using numerical examples and it illustrates that index learning with Q learning DQN and function approximations learns the Whittle index.
We introduce a new notion of neighboring databases for coverage problems such as Max Cover and Set Cover under differential privacy. In contrast to the standard privacy notion for these problems, which is analogous to...
详细信息
We consider the problem of counting the copies of a length-k pattern σ in a sequence f: [n] → R, where a copy is a subset of indices i1 k ∈ [n] such that f(ij) ) if and only if σ(j) Ω(k/ log k) [Berendsohn, Kozma,...
详细信息
Connectivity augmentation problems are among the most elementary questions in Network Design. Many of these problems admit natural 2-approximation algorithms, often through various classic techniques, whereas it remai...
详细信息
Caching can be leveraged to significantly improve network performance and mitigate congestion. However, characterizing the optimal tradeoff between routing cost and cache deployment cost remains an open problem. In th...
详细信息
ISBN:
(数字)9798350383508
ISBN:
(纸本)9798350383515
Caching can be leveraged to significantly improve network performance and mitigate congestion. However, characterizing the optimal tradeoff between routing cost and cache deployment cost remains an open problem. In this paper, for a network with arbitrary topology and congestion-dependent nonlinear cost functions, we aim to jointly determine the cache deployment, content placement, and hop-by-hop routing strategies, so that the sum of routing cost and cache deployment cost is minimized. We tackle this mixed-integer nonlinear problem starting with a fixed-routing setting, and then generalize to a dynamic-routing setting. For the fixed-routing setting, a Gradient-combining Frank-Wolfe algorithm with $\left( {\frac{1}{2},1} \right)$-approximation is presented. For the general dynamic-routing setting, we obtain a set of KKT conditions, and devise a distributed and adaptive online algorithm based on these conditions. We demonstrate via extensive simulation that our algorithms significantly outperform a number of baselines.
This paper focuses on the inverse optimal control problem for discrete-time systems with unknown cost functions using linear matrix inequalities (LMIs). Based on Pontryagin's minimum principle, a novel model-based...
详细信息
ISBN:
(数字)9798331529505
ISBN:
(纸本)9798331529512
This paper focuses on the inverse optimal control problem for discrete-time systems with unknown cost functions using linear matrix inequalities (LMIs). Based on Pontryagin's minimum principle, a novel model-based algorithm is proposed to reconstruct the weight matrices of an unknown quadratic cost function. This algorithm is formulated using LMIs to find a solution to the algebraic Riccati equation, which is then used to determine the weight matrices. We prove that the solution obtained from LMIs belongs to the set of solutions for the inverse optimal control problem. On this basis, a noniterative model-free algorithm is presented to solve the problem without requiring system matrices. The collected data is used to estimate the unknown weight matrices, and we prove that our algorithm can obtain an approximate optimal solution. Finally, an example illustrates the effectiveness of our algorithms, and comparisons show that our algorithms outperform others.
暂无评论