Unconsciousness is a general phenomenon during epilepsy seizures which might lead to serious accidents and even death if help is not provided on time. Epileptic patients cannot work independently as there is always a ...
详细信息
With global EV sales projected to reach 3.5 million units by 2023 and public charging stations increasing by 40%, effective management and optimization of charging infrastructure have become critical. While current re...
详细信息
This paper presents a systematic design and optimization methodology to enhance the power gain of a given device towards its theoretically maximum stable power gain 4U, U as the Mason's Unilateral power gain, over...
详细信息
ISBN:
(数字)9798350375046
ISBN:
(纸本)9798350375053
This paper presents a systematic design and optimization methodology to enhance the power gain of a given device towards its theoretically maximum stable power gain 4U, U as the Mason's Unilateral power gain, over a wide bandwidth. A device-level Gain-Bandwidth product (GBW) metric is also defined to assess high mm-Wave device gain boosting. The proposed technique exploits a high-order complex neutralization embedding network on a differential power device pair. For proof-of-concept, a D-band 3-stage PA with two-way power combining is implemented in GlobalFoundries 45 nm SOI process. The measurements show a peak power gain of 21.7 dB with a 3-dB BW of 15 GHz (117-132 GHz) in a compact area of 0.116 mm2. The wideband device gain enhancement allows the PA to operate in class-AB biasing, achieving efficient-yet-linear operations at 127.5 GHz with
$\mathrm{P}_{\text{sat}}$
and OP1dB of 11.9 and 11.85 dBm respectively and a peak PAE of 15%.
The coherent ring VCSEL (CR-VCSEL) structure developed at Dallas Quantum Devices is a monolithic, narrow linewidth high power device configuration that can be fabricated using typical VCSEL epitaxy and conventional pr...
详细信息
The 0-1 Knapsack Problem (KP) and Bin Packing Problem (BPP) are NP-hard combinatorial optimization challenges often tackled using metaheuristics. Both problems have prominent utilization in the real world such as in r...
详细信息
The 0-1 Knapsack Problem (KP) and Bin Packing Problem (BPP) are NP-hard combinatorial optimization challenges often tackled using metaheuristics. Both problems have prominent utilization in the real world such as in resource allocation, logistics, decision-making, etc. The binarized variant of metaheuristics available in the literature mostly uses transfer functions for conversion of the domain from continuous to binary. Generally, the conversion functions are computationally expensive which demands more utilization of computational resources. Whereas the boolean functions are performed using bitwise operations which are inherent to the digital computer hardware and are less computationally expensive. This prominent research gap has been addressed in this paper by introducing Logical Social Group Optimization (LSGO), a logic-based binarized variant of Social Group Optimization (SGO) that leverages Boolean logic for improved efficiency. In LSGO, after the binarization by replacing the arithmetic operators with logical operators, one of the variables gets cancelled out. To preserve that variable, two versions of LSGO have been proposed. The first one is LSGO-Reduc where one of the initial operands in the equation is removed or reduced and after reducing it, no variables disappear. The second one is LSGO-Rever, where the boolean operators in the equation are reversed or exchanged and hence, no variables are lost. The three algorithms have been simulated with various datasets of knapsack and its variant problems and bin-packing problem for thorough testing on different problem types and scalability. Experimental results demonstrate that LSGO variants outperform conventional algorithms, achieving an average profit of 970 units on the P07 dataset for single knapsack problems, surpassing SGO (950 units) and Genetic Algorithm (GA) (930 units) with greater stability. In multiple knapsack problems, LSGO variants reach a profit of 1925 units, exceeding Particle Swarm Optimizat
Block chain era can cope with many safety and performance challenges in subsequent technology 6G networks. This summary explores the combination of block chain generation into 6G networks to enhance security and effic...
详细信息
Localization plays an increasingly pivotal role in 5G/6G systems, enabling various applications. This paper focuses on the privacy concerns associated with delay-based localization, where unauthorized base stations at...
详细信息
ISBN:
(数字)9798350351255
ISBN:
(纸本)9798350351262
Localization plays an increasingly pivotal role in 5G/6G systems, enabling various applications. This paper focuses on the privacy concerns associated with delay-based localization, where unauthorized base stations attempt to infer the location of the end user. We propose a method to disrupt localization at unauthorized nodes by injecting artificial components into the pilot signal, exploiting model mismatches inherent in these nodes. Specifically, we investigate the effectiveness of two techniques, namely artificial multipath (AM) and artificial noise (AN), in mitigating location leakage. By leveraging the misspecified Cramer-Rao bound framework, we evaluate the impact of these techniques on unauthorized localization performance. Our results demonstrate that pilot manipulation significantly degrades the accuracy of unauthorized localization while minimally affecting legitimate localization. Moreover, we find that the superiority of AM over AN varies depending on the specific scenario.
In this paper, we design a prescribed time controller to achieve a desired trajectory within a user-defined time, ensuring that the error dynamics converge to the equilibrium point at this time. Subsequently, a propor...
详细信息
Over the years, the emergence of the fourth industrial revolution has brought a much-needed transition within the education sector. COVID-19 has contributed immensely on how teaching and learning is currently evolving...
详细信息
Malware is conventionally written in the C/C++ programming languages. However, a recent trend has been observed where other languages are being used to write malware. One such language is the Rust programming language...
详细信息
暂无评论