A compact broadband absorptive band rejection filter (ABSF) based on microstrip line is proposed. The filter consists of a pair of coupled wires and is loaded with a resistor. The coupling line of the filter has an op...
详细信息
This paper is dedicated to the numerical solution of a fourth-order singular perturbation problem using the interior penalty virtual element method (IPVEM) proposed in [42]. The study introduces modifications to the j...
详细信息
A novel method of designing a penta-band omnidirectional low-profile antenna with independent band control is proposed. Single-band, dual-band, tri-band, quad-band, and penta-band antennas are investigated, respective...
详细信息
In this paper, Q-value theory of conventional antennas is used to analyze reasons of low radiation performance of acoustics promoted antennas, where we modify the radiating structure of existing acoustics promoting an...
In this paper, Q-value theory of conventional antennas is used to analyze reasons of low radiation performance of acoustics promoted antennas, where we modify the radiating structure of existing acoustics promoting antenna using the simulations to get the required improvement on radiation performance. The simulation experiments are carried out in the finite element simulation software Comsol Multiphysics to analyze the radiating performance.
The local community detection (LCD) method can discover the local community structure in which the seed node is located. Compared with global community detection, local community detection is characterized by its low ...
详细信息
In the era of big data, traditional relational databases face challenges in massive data storage. HBase is a non-relational database based on column storage which is used widely for big data storage. The writing perfo...
详细信息
An X-band CMOS low noise amplifier (LNA) with flat gain and noise Figure (NF) is proposed in this paper. To achieve sufficient gain, the LNA adopts two-stage topology. A feed-back transformer is used at the input term...
详细信息
ISBN:
(纸本)9781665409889
An X-band CMOS low noise amplifier (LNA) with flat gain and noise Figure (NF) is proposed in this paper. To achieve sufficient gain, the LNA adopts two-stage topology. A feed-back transformer is used at the input terminal to implement noise and wideband input matching. Transformer-based inter-stage and output matching networks are adopted to achieve well isolation and compact size. By introducing inductive peaking technique, the proposed LNA obtain lower NF and extend the bandwidth. Post simulation results show that the LNA achieves a gain of 14.6± 2dB and NF of 2. 5-3.3dB across a bandwidth from 8.5 GHz to 12.5 GHz. With the supply voltage of 1 V at the first stage and 1.8 V at the second stage, the dc power dissipation is 20.8 mW. The simulated input 1dB compression point ($\mathrm{P}_{\mathrm{l}\mathrm{d}\mathrm{B}}$) is -27.3dBm. The core chip area is only 0.41× 0.87mm 2 .
Clustering algorithms aim at gathering similar data points from a dataset in an unsupervised manner. Although the batch clustering algorithms have relatively high accuracy, they cannot make use of the dynamic clusteri...
详细信息
While image-to-text models have demonstrated significant advancements in various vision-language tasks, they remain susceptible to adversarial attacks. Existing white-box attacks on image-to-text models require access...
ISBN:
(纸本)9798331314385
While image-to-text models have demonstrated significant advancements in various vision-language tasks, they remain susceptible to adversarial attacks. Existing white-box attacks on image-to-text models require access to the architecture, gradients, and parameters of the target model, resulting in low practicality. Although the recently proposed gray-box attacks have improved practicality, they suffer from semantic loss during the training process, which limits their targeted attack performance. To advance adversarial attacks of image-to-text models, this paper focuses on a challenging scenario: decision-based black-box targeted attacks where the attackers only have access to the final output text and aim to perform targeted attacks. Specifically, we formulate the decision-based black-box targeted attack as a large-scale optimization problem. To efficiently solve the optimization problem, a three-stage process Ask, Attend, Attack, called AAA, is proposed to coordinate with the solver. Ask guides attackers to create target texts that satisfy the specific semantics. Attend identifies the crucial regions of the image for attacking, thus reducing the search space for the subsequent Attack. Attack uses an evolutionary algorithm to attack the crucial regions, where the attacks are semantically related to the target texts of Ask, thus achieving targeted attacks without semantic loss. Experimental results on transformer-based and CNN+RNN-based image-to-text models confirmed the effectiveness of our proposed AAA.
In this paper, applying the Newton method, we transform the complex continuous-time algebraic Riccati matrix equation into a Lyapunov equation. Then, we introduce an efficient general alternating-direction implicit (G...
详细信息
暂无评论