A dual-polarized phased array for Ku-band satellite communications is proposed. Multilayer radiation patches is excited by aperture-coupled feeding of C-shaped and H-shaped slots for horizontal and vertical polarizati...
详细信息
ISBN:
(数字)9798331520717
ISBN:
(纸本)9798331520724
A dual-polarized phased array for Ku-band satellite communications is proposed. Multilayer radiation patches is excited by aperture-coupled feeding of C-shaped and H-shaped slots for horizontal and vertical polarization. The C-shaped and H-shaped slots T-orthogonal configurations are ingeniously designed with distances, apart to achieve high isolation between ports and full ku-band bandwidth coverage. The proposed dual-polarized antenna element has 36.5% simulated -10 dB impedance bandwidth (BW) in the range of 10.42 GHz to 15.06 GHz for port 1, and 35.3% simulated -10 dB impedance BW in the range of 10.45 GHz to 14.94 GHz for port 2, with port isolation less than -35 dB. For the 1×8 array, the horizontal cross-polarization is less than -21 dB with less than 6.8 dB gain reduction within the ± 60° beam scanning range, and the vertical cross-polarization is less than -26 dB with less than 5.3 dB gain reduction.
The node2vec random walk has proven to be a key tool in network embedding algorithms. These random walks are tuneable, and their transition probabilities depend on the previous visited node and on the triangles contai...
详细信息
This paper introduces a robust watermarking technique for diffusion model-generated images, which effectively balances watermark robustness, image fidelity, and diversity preservation. Unlike traditional post-hoc appr...
详细信息
ISBN:
(数字)9798350356830
ISBN:
(纸本)9798350356847
This paper introduces a robust watermarking technique for diffusion model-generated images, which effectively balances watermark robustness, image fidelity, and diversity preservation. Unlike traditional post-hoc approaches, the proposed method embeds watermark information directly into the latent noise of the diffusion model, ensuring seamless integration into the image generation process. This approach minimizes perceptual impact while maintaining high visual quality and diversity of the generated images. Experimental results demonstrate the method’s resilience to various image distortions, including noise, compression, blurring etc., significantly outperforming existing watermarking techniques. The proposed method supports both watermark detection and bit-level extraction, providing a practical solution for secure content protection and traceability in generative models without compromising the integrity of the image generation process.
Cross-domain recommender systems can effectively address the data sparsity and cold-start problems in traditional recommender systems. However, such systems may inadvertently leak user membership privacy due to their ...
详细信息
ISBN:
(数字)9798331522285
ISBN:
(纸本)9798331522292
Cross-domain recommender systems can effectively address the data sparsity and cold-start problems in traditional recommender systems. However, such systems may inadvertently leak user membership privacy due to their reliance on shared latent representations and behavioral patterns across domains. In this paper, we propose a membership inference attack (MIA) framework tailored for cross-domain recommender systems, termed CDRMIA, to quantify privacy risks. Unlike prior MIA methods designed for single-domain settings, our attack infers a user's membership status in both the source and target domains using only target-domain recommendations and partial behavioral data. We design cross-domain features based on embedding alignment, behavioral consistency, and prediction confidence, and employ a multi-task learning model to jointly infer membership states. Extensive experiments on two real-world datasets (Amazon and Douban) and three representative cross-domain recommendation models (EMCDR, CMF, CLFM) demonstrate the effectiveness of CDRMIA. Our findings reveal significant privacy leakage risks in cross-domain recommender systems, highlighting the urgent need for robust privacy-preserving mechanisms.
The Ultra-Large Scale Software (ULSS) Systems are characterized by their massive size and complexity in various dimensions. Regulating a ULSS system through constraining the design by using the dominance relations hel...
详细信息
The efficiency of businesses is often hindered by the challenges encountered in traditional Supply Chain Manage-ment(SCM),which is characterized by elevated risks due to inadequate accountability and *** address these...
详细信息
The efficiency of businesses is often hindered by the challenges encountered in traditional Supply Chain Manage-ment(SCM),which is characterized by elevated risks due to inadequate accountability and *** address these challenges and improve operations in green manufacturing,optimization algorithms play a crucial role in supporting decision-making *** this study,we propose a solution to the green lot size optimization issue by leveraging bio-inspired algorithms,notably the Stork Optimization Algorithm(SOA).The SOA draws inspiration from the hunting and winter migration strategies employed by storks in *** theoretical framework of SOA is elaborated and mathematically modeled through two distinct phases:exploration,based on migration simulation,and exploitation,based on hunting strategy *** tackle the green lot size optimization issue,our methodology involved gathering real-world data,which was then transformed into a simplified function with multiple constraints aimed at optimizing total costs and minimizing CO_(2) *** function served as input for the SOA ***,the SOA model was applied to identify the optimal lot size that strikes a balance between cost-effectiveness and *** extensive experimentation,we compared the performance of SOA with twelve established metaheuristic algorithms,consistently demonstrating that SOA outperformed the *** study’s contribution lies in providing an effective solution to the sustainable lot-size optimization dilemma,thereby reducing environmental impact and enhancing supply chain *** simulation findings underscore that SOA consistently achieves superior outcomes compared to existing optimization methodologies,making it a promising approach for green manufacturing and sustainable supply chain management.
Current advances in deep learning have brought various breakthroughs in processing medical data. However, dealing with a limited number of medical datasets remains a challenge in deep learning and often leads to overf...
详细信息
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int...
详细信息
We consider the fundamental problem of designing a self-adjusting tree, which efficiently and locally adapts itself towards the demand it serves (namely accesses to the items stored by the tree nodes), striking a bala...
详细信息
Dealing with class imbalance is a significant issue in classification tasks that often leads to lower prediction performance. Many data augmentation methods have been suggested to tackle this problem, but their effect...
详细信息
暂无评论