Strong noise is one of the biggest challenges in controlled-source electromagnetic (CSEM) exploration, which severely affects the quality of the recorded signal. We develop a novel and effective CSEM noise attenuation...
详细信息
A single-layer, polarization adjustable circular-polarization (CP) antenna with four arc-like slots has been designed for GPS L2 band. The created antenna uses four arc-like slots to tune the phase difference to form ...
详细信息
A single-layer, polarization adjustable circular-polarization (CP) antenna with four arc-like slots has been designed for GPS L2 band. The created antenna uses four arc-like slots to tune the phase difference to form a CP antenna, where the arc-like slots with a specific size relationship are etched on the patch. By adjusting the radius of the arc-like slots, Left-handed -circular-polarization (LHCP) and Right-handed-circular-polarization (RHCP) can be realized easily with simple structure. Simulations and optimizations show that the constructed CP-antenna has a good axial-ratio bandwidth of 10 MHz and impedance-bandwidth of 40 MHz and 30 MHz for LHCP and RHCP application.
In this paper, a novel and comprehensive signal denoising method is proposed by combining Symplectic Geometric Modal Decomposition (SGMD) and Block Thresholding denoising. The proposed approach involves a three-step p...
In this paper, a novel and comprehensive signal denoising method is proposed by combining Symplectic Geometric Modal Decomposition (SGMD) and Block Thresholding denoising. The proposed approach involves a three-step process: first, the signal is decomposed into a set of Symplectic Geometric Components (SGCs) using SGMD. Subsequently, each SGC is subjected to Block-Thresholding denoising. Finally, the denoised SGCs are recombined to obtain the denoised linear frequency modulation (LFM) signal. The experimental verification demonstrates the effectiveness of the SGMD-BT method in denoising LFM signals. This novel approach offers a fresh solution for the processing and analysis of LFM signals, holding significant application potential and research importance.
CNNs(Convolutional Neural Networks) have a good performance on most classification tasks,but they are vulnerable when meeting adversarial *** and design of highly aggressive adversarial examples can help enhance the s...
CNNs(Convolutional Neural Networks) have a good performance on most classification tasks,but they are vulnerable when meeting adversarial *** and design of highly aggressive adversarial examples can help enhance the security and robustness of *** transferability of adversarial examples is still low in black-box ***,an adversarial example method based on probability histogram equalization,namely HE-MI-FGSM(Histogram Equalization Momentum Iterative Fast Gradient Sign Method) is *** each iteration of the adversarial example generation process,the original input image is randomly histogram equalized,and then the gradient is calculated to generate adversarial perturbations to mitigate overfitting in the adversarial *** effectiveness of the method is verified on the ImageNet *** with the advanced method I-FGSM(Iterative Fast Gradient Sign Method) and MI-FGSM(Momentum I-FGSM),the attack success rate in the adversarial training network increased by 27.9% and 7.7% on average,respectively.
Cognitive diagnosis models (CDMs) with high generalization are essential for intelligenteducation systems to reveal students' knowledge states in multiple datasets. However, existing CDMs' architectures are d...
Cognitive diagnosis models (CDMs) with high generalization are essential for intelligenteducation systems to reveal students' knowledge states in multiple datasets. However, existing CDMs' architectures are designed dependent on researcher expertise and experience from observing and summarizing partial students' learning behaviors, which makes handcrafted models not cover all learning behaviors well and thus limits their generalization. To develop generalized CDMs, this paper proposes an evolutionary neural architecture search to design CDMs' architectures effective on multiple datasets automatically. Specifically, we first formulate the search task as a multi-objective optimization problem (MOP), which maximizes model performance on multiple datasets containing learning behaviors as many as possible to ensure model generalization. Then, an expressive search space is devised to contain as many potential architectures as possible, where each architecture is denoted by a unified form, taking three given inputs and integrating them in a linear or no-linear manner for prediction. Finally, an evolutionary algorithm with a tailored deduplication strategy is employed to solve the MOP, where each architecture is further represented by a single-root computation tree for easy optimization. Experiments on multiple datasets demonstrate the generalization and effectiveness of the best architecture searched by the proposed approach, and the searched architecture also holds as good interpretability as handcrafted architectures.
Adding subtle perturbations to an image can cause the classification model to misclassify, and such images are called adversarial examples. Adversarial examples threaten the safe use of deep neural networks, but when ...
Adding subtle perturbations to an image can cause the classification model to misclassify, and such images are called adversarial examples. Adversarial examples threaten the safe use of deep neural networks, but when combined with reversible data hiding(RDH) technology, they can protect images from being correctly identified by unauthorized models and recover the image lossless under authorized models. Based on this, the reversible adversarial example(RAE) is rising. However, existing RAE technology focuses on feasibility, attack success rate and image quality, but ignores transferability and time complexity. In this paper,we optimize the data hiding structure and combine data augmentation technology,which flips the input image in probability to avoid overfitting phenomenon on the dataset. On the premise of maintaining a high success rate of white-box attacks and the image's visual quality, the proposed method improves the transferability of reversible adversarial examples by approximately 16% and reduces the computational cost by approximately 43% compared to the state-of-the-art method. In addition, the appropriate flip probability can be selected for different application scenarios.
A compact Sub-6GHz multiple-input-multiple-output (MIMO) antenna is presented in this paper. The recommended MIMO antenna is electrically small (38mm × 38 mm× 1.6 mm). For good isolation and miniaturized siz...
详细信息
This paper introduces a compact wideband 6 port multiple-input multiple-output (MIMO) antenna for the 5G handset. Each antenna elements uses coupling feed, and I-shaped grounding structure is added to the unit to obta...
详细信息
In order to achieve more efficient and accurate DDoS detection while ensuring data privacy, this paper proposes a DDoS detection method based on FLAD. Firstly, this paper uses the FLAD algorithm to train a global DDoS...
详细信息
A U-shaped-like parasitic strip loading antenna is proposed and designed, which can work in L1 band of GPS with circular polarization (CP) characteristics. The antenna consists of ground plane, dielectric, radiation p...
详细信息
暂无评论