This paper presents results of a simulation study quantifying the expected importance of cochannel interference (CCI) in a passive radar using Advanced Television systems Committee (ATSC) illuminators. CCI stations br...
详细信息
ISBN:
(纸本)9781479982332
This paper presents results of a simulation study quantifying the expected importance of cochannel interference (CCI) in a passive radar using Advanced Television systems Committee (ATSC) illuminators. CCI stations broadcasting on the same frequency as the illuminator are modeled as additional direct path interference. It is found that spatial nulls alone can be insufficient to suppress CCI in small airborne radars, which might observe up to 10 significant CCIs for each illuminator. A proposed hybrid algorithm uses remodulation to suppress the strongest CCI and nulls only CCI that cannot be decoded. This method improves predicted coverage as compared to nulls alone.
In this paper, we tackle the long-tailed visual recognition problem from the categorical prototype perspective by proposing a prototype-based classifier learning(PCL) method. Specifically, thanks to the generalization...
详细信息
In this paper, we tackle the long-tailed visual recognition problem from the categorical prototype perspective by proposing a prototype-based classifier learning(PCL) method. Specifically, thanks to the generalization ability and robustness, categorical prototypes reveal their advantages of representing the category semantics. Coupled with their class-balance characteristic, categorical prototypes also show potential for handling data imbalance. In our PCL, we propose to generate the categorical classifiers based on the prototypes by performing a learnable mapping function. To further alleviate the impact of imbalance on classifier generation, two kinds of classifier calibration approaches are designed from both prototype-level and example-level aspects. Extensive experiments on five benchmark datasets, including the large-scale iNaturalist, Places-LT,and ImageNet-LT, justify that the proposed PCL can outperform state-of-the-arts. Furthermore, validation experiments can demonstrate the effectiveness of tailored designs in PCL for long-tailed problems.
The emergence of COVID-19 brought unprecedented opportunities to deploy emerging digital technologies such as robotics and drones to provide contactless services. Robots and drones transformed initial approaches to ta...
详细信息
CMT-bone is a proxy-app for simulating compressible multiphase turbulence. The application uses discretization and numerical methods for solving partial differential equations. Hence, the application is compute intens...
详细信息
ISBN:
(纸本)9781538674673
CMT-bone is a proxy-app for simulating compressible multiphase turbulence. The application uses discretization and numerical methods for solving partial differential equations. Hence, the application is compute intensive as well as memory intensive. Intel Knights landing (KNL) is the second generation MIC architecture from Intel. It delivers massive thread parallelism, data parallelism, and memory bandwidth in a CPU form factor. In this paper, we use Intel KNL to get a performance speedup of 1.8x in CMT-bone after applying different optimization techniques for Intel KNL.
Antivirus software is one of the most widely installed software for protecting computer from malicious attacks. However, traditional host-based antivirus needs to store all viruses' pattern or sample, which not on...
详细信息
Antivirus software is one of the most widely installed software for protecting computer from malicious attacks. However, traditional host-based antivirus needs to store all viruses' pattern or sample, which not only needs large local storage, but also fails to detect modern threats in time. The newly come cloud-based antivirus, which needs no extra local storage and compares virus' pattern on provider's cloud servers, has the disadvantages of being more likely to be attacked when offline. This paper advocates P2PAV, a new model for malware detection through P2P network, which takes advantages of traditional ones and cloud antivirus, reduces local storage, and meanwhile, improves the ability of detecting modern virus than traditional ways, and combating virus when offline than cloud-based antivirus.
This paper compares results of a simulation study and experimental measurement campaign designed to evaluate the performance of a DTV-based passive radar. The simulations considered a tower-mounted receiver in Springf...
详细信息
ISBN:
(纸本)9781509008643
This paper compares results of a simulation study and experimental measurement campaign designed to evaluate the performance of a DTV-based passive radar. The simulations considered a tower-mounted receiver in Springfield, Ohio, and predicted the accuracy of localizing airborne targets using the illuminations of regional transmitters. The predicted coverage area was found to vary with the selection of the propagation loss model used by the simulator. Supporting experiments at the site did not favor any particular model, but showed 10 dB variations in both the direct path and clutter over several hours. These results illustrate the need to accurately model tropospheric radio propagation in passive radar performance predictions.
A novel systems theory-based structural reduction method is proposed in this paper that can be applied to chemical reaction networks (CRNs) including subsystems consisting of linear reactions, i.e. a linear sub-CRN. T...
详细信息
A novel systems theory-based structural reduction method is proposed in this paper that can be applied to chemical reaction networks (CRNs) including subsystems consisting of linear reactions, i.e. a linear sub-CRN. The reduced model is a delayed CRN with distributed delays having less complexes (monomials) and reactions than the original model. The reduction is based on the fact that the input/output response of a linear sub-CNR can be seen as a time-delayed input to output relationship, therefore linear sub-CNRs can be interpreted as reactions with distributed delay from their input to their output complexes. The practically important example of a kinetic model describing the spread of the COVID-19 epidemic is used as a case study to illustrate the basic concepts and the computation method.
Topic popularity prediction is an important task on social media, which aims at predicting the ongoing trends of topics according to logged historical text-based records. However, only limited existing approaches appl...
Topic popularity prediction is an important task on social media, which aims at predicting the ongoing trends of topics according to logged historical text-based records. However, only limited existing approaches apply sentiment analysis to facilitate popularity prediction. Public sentiment is worth taking into consideration because the topics with strong sentiment tend to spread faster and broader on social media. In this paper, we propose a novel framework, SENTI2POP, to predict topic popularity utilizing sentiment information. We first adapt a state-of-art popularity quantification method to capture the topic popularity, and then design a novel tree-like network (Tree-Net) combining Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN) for sentiment analysis. In addition, we propose a sentiment-aware time series prediction approach based on Dynamic Time Warping (DTW) and Autoregressive Integrated Moving Average model (ARIMA) to predict topic popularity. We prove by experiments that SENTI2POP outperforms the existing popularity prediction models on a real-world Twitter dataset by reducing the prediction error. Experimental results also show that SENTI2POP could be applied to improve the accuracy of most non-sentiment popularity prediction models.
The problem of driving a formation from an initial to a target configuration while under the effect of external disturbances is studied. Additional restrictions on agent sensing as well as inter-agent communication mu...
详细信息
The problem of driving a formation from an initial to a target configuration while under the effect of external disturbances is studied. Additional restrictions on agent sensing as well as inter-agent communication must be satisfied. We present a leader-follower solution that relies on a simple uncertainty model to trigger surfacing events. These events are then used to update the control signal, for which two different, provably correct, control strategies are proposed. Finally, we show how the surfacing events can be used to characterize the disturbance set. Numerical examples on relevant scenarios are also provided.
Verification of software for embedded systems is crucial for ensuring a product's integrity. Formal approaches like static analysis and model checking are gaining momentum in this context. To make an exhaustive ex...
详细信息
暂无评论