In radar communication integration (RADCOM) systems based on orthogonal frequency division multiplexing (OFDM) technology, high peak to average power ratio (PAPR) is one of the main factors affecting system performanc...
详细信息
Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distorti...
详细信息
Degradation under challenging conditions such as rain, haze, and low light not only diminishes content visibility, but also results in additional degradation side effects, including detail occlusion and color distortion. However, current technologies have barely explored the correlation between perturbation removal and background restoration, consequently struggling to generate high-naturalness content in challenging scenarios. In this paper, we rethink the image enhancement task from the perspective of joint optimization: Perturbation removal and texture reconstruction. To this end, we advise an efficient yet effective image enhancement model, termed the perturbation-guided texture reconstruction network(PerTeRNet). It contains two subnetworks designed for the perturbation elimination and texture reconstruction tasks, respectively. To facilitate texture recovery,we develop a novel perturbation-guided texture enhancement module(PerTEM) to connect these two tasks, where informative background features are extracted from the input with the guidance of predicted perturbation priors. To alleviate the learning burden and computational cost, we suggest performing perturbation removal in a sub-space and exploiting super-resolution to infer high-frequency background details. Our PerTeRNet has demonstrated significant superiority over typical methods in both quantitative and qualitative measures, as evidenced by extensive experimental results on popular image enhancement and joint detection tasks. The source code is available at https://***/kuijiang94/PerTeRNet.
Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been establi...
详细信息
Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been established by applying isogenies and pairings on elliptic *** this line,we first employ Richelot isogenies and non-degenerate pairings from hyperelliptic curves for a new verifiable delay function,such that no auxiliary proof and interaction are needed for the ***,we demonstrate that our scheme satisfies all security requirements,in particular,our VDF can resist several attacks,including the latest attacks for ***,resorting to the same techniques,a secure delay encryption from hyperelliptic curves is constructed by modifying Boneh and Frankiln's IBE scheme,which shares the identical setup with our VDF *** far as we know,these schemes are the first cryptographic applications from high-genus isogenies apart from basic protocols,i.e.,hash functions and key exchange protocols.
Fine-grained visual parsing, including fine-grained part segmentation and fine-grained object recognition, has attracted considerable critical attention due to its importance in many real-world applications, e.g., agr...
详细信息
Fine-grained visual parsing, including fine-grained part segmentation and fine-grained object recognition, has attracted considerable critical attention due to its importance in many real-world applications, e.g., agriculture, remote sensing, and space technologies. Predominant research efforts tackle these fine-grained sub-tasks following different paradigms, while the inherent relations between these tasks are neglected. Moreover, given most of the research remains fragmented, we conduct an in-depth study of the advanced work from a new perspective of learning the part relationship. In this perspective, we first consolidate recent research and benchmark syntheses with new taxonomies. Based on this consolidation, we revisit the universal challenges in fine-grained part segmentation and recognition tasks and propose new solutions by part relationship learning for these important challenges. Furthermore, we conclude several promising lines of research in fine-grained visual parsing for future research.
CMOS-compatible RF/microwave devices,such as filters and amplifiers,have been widely used in wireless communication ***,secondary-electron emission phenomena often occur in RF/microwave devices based on silicon(Si)waf...
详细信息
CMOS-compatible RF/microwave devices,such as filters and amplifiers,have been widely used in wireless communication ***,secondary-electron emission phenomena often occur in RF/microwave devices based on silicon(Si)wafers,especially in the high-frequency *** this paper,we have studied the major factors that influence the secondary-electron yield(SEY)in commercial Si wafers with different doping *** show that the SEY is suppressed as the doping concentration increases,corresponding to a relatively short effective escape depthλ.Meanwhile,the reduced narrow band gap is beneficial in suppressing the SEY,in which the absence of a shallow energy band below the conduction band will easily capture electrons,as revealed by first-principles ***,the new physical mechanism combined with the effective escape depth and band gap can provide useful guidance for the design of integrated RF/microwave devices based on Si wafers.
The formulae for parameters of a negative electron affinity semiconductor(NEAS)with large mean escape depth of secondary electrons A(NEASLD)are *** methods for obtaining parameters such asλ,B,E_(pom)and the maximumδ...
详细信息
The formulae for parameters of a negative electron affinity semiconductor(NEAS)with large mean escape depth of secondary electrons A(NEASLD)are *** methods for obtaining parameters such asλ,B,E_(pom)and the maximumδandδat 100.0 keV≥E_(po)≥1.0 keV of a NEASLD with the deduced formulae are presented(B is the probability that an internal secondary electron escapes into the vacuum upon reaching the emission surface of the emitter,δis the secondary electron yield,E_(po)is the incident energy of primary electrons and E_(pom)is the E_(po)corresponding to the maximumδ).The parameters obtained here are analyzed,and it can be concluded that several parameters of NEASLDs obtained by the methods presented here agree with those obtained by other *** relation between the secondary electron emission and photoemission from a NEAS with large mean escape depth of excited electrons is investigated,and it is concluded that the presented method of obtaining A is more accurate than that of obtaining the corresponding parameter for a NEAS with largeλ_(ph)(λ_(ph)being the mean escape depth of photoelectrons),and that the presented method of calculating B at E_(po)>10.0 keV is more widely applicable for obtaining the corresponding parameters for a NEAS with largeλ_(ph).
This article addresses the issue of bipartite consensus for Markov jump multi-agent systems subjected to bounded disturbance and input constraints under mode-dependent switching topology. To surmount the challenge of ...
详细信息
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its **...
详细信息
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its *** current WMC solvers work on Conjunctive Normal Form(CNF)***,CNF is not a natural representation for human-being in many *** by the stronger expressive power of Pseudo-Boolean(PB)formulas than CNF,we propose to perform WMC on PB *** on a recent dynamic programming algorithm framework called ADDMC for WMC,we implement a weighted PB counting tool *** compare PBCounter with the state-of-the-art weighted model counters SharpSAT-TD,ExactMC,D4,and ADDMC,where the latter tools work on CNF with encoding methods that convert PB constraints into a CNF *** experiments on three domains of benchmarks show that PBCounter is superior to the model counters on CNF formulas.
As one of the most widely used personal protective equipment(PPE),body armors play an important role in protecting the human body from the high-velocity impact of bullets or *** body torso and critical organs of the w...
详细信息
As one of the most widely used personal protective equipment(PPE),body armors play an important role in protecting the human body from the high-velocity impact of bullets or *** body torso and critical organs of the wear may suffer severe behind-armor blunt trauma(BABT)even though the impactor is stopped by the body armor.A type of novel composite material through incorporating shear stiffening gel(STG)into ethylene-vinyl acetate(EVA)foam is developed and used as buffer layers to reduce *** this paper,the protective performance of body armors composed of fabric bulletproof layers and a buffer layer made of foam material is investigated both experimentally and *** effectiveness of STG-modified EVA in damage relief is verified by ballistic *** parallel with the experimental study,numerical simulations are conducted by LS-DYNA®to investigate the dynamic response of each component and capture the key mechanical parameters,which are hardly obtained from field *** fully describe the material behavior under the transient impact,the selected constitutive models take the failure and strain rate effect into consideration.A good agreement between the experimental observations and numerical results is achieved to prove the validity of the modelling *** tests and simulations show that the impact-induced deformation on the human body is significantly reduced by using STG-modified EVA as the buffering *** improvement of protective performance is attributed to better dynamic properties and more outstanding energy absorption capability of the composite foam.
For mitigating the libration angle fluctuation of the tethered satellite system,this paper discusses how to make the uniform velocity-deceleration separation scheme achieve the best ***,a judgment condition is establi...
详细信息
For mitigating the libration angle fluctuation of the tethered satellite system,this paper discusses how to make the uniform velocity-deceleration separation scheme achieve the best ***,a judgment condition is established to determine the tether state by comparing the tether length and the relative distance of the sub-satellite and the parent *** on the tethered satellite system dynamics equation and Clohessy-Wiltshire equation,dynamic models are given for four cases of tether ***,the influence of the uniform velocity-deceleration separation scheme on the libration angle is analyzed by taking the libration angle at the separation ending time and the mean absolute value of the libration angle as index ***,the optimality problem of the uniform velocity-deceleration separation scheme is formulated as an optimization problem with constraints,and an approximate solution algorithm is given by combining the back propagation neural network and Newton-Raphson method of multiple initial ***,the effectiveness of the proposed method is verified by a numerical simulation.
暂无评论