Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up t...
详细信息
Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up to ***,it improves the array gain and directivity,increasing the detection range and angular resolution of radar *** study proposes two highly efficient SLL reduction *** techniques are based on the hybridization between either the single convolution or the double convolution algorithms and the genetic algorithm(GA)to develop the Conv/GA andDConv/GA,*** convolution process determines the element’s excitations while the GA optimizes the element *** M elements linear antenna array(LAA),the convolution of the excitation coefficients vector by itself provides a new vector of excitations of length N=(2M−1).This new vector is divided into three different sets of excitations including the odd excitations,even excitations,and middle excitations of lengths M,M−1,andM,*** the same element spacing as the original LAA is used,it is noticed that the odd and even excitations provide a much lower SLL than that of the LAA but with amuch wider half-power beamwidth(HPBW).While the middle excitations give the same HPBWas the original LAA with a relatively higher *** the increased HPBWof the odd and even excitations,the element spacing is optimized using the ***,the synthesized arrays have the same HPBW as the original LAA with a two-fold reduction in the ***,for extreme SLL reduction,the DConv/GA is *** this technique,the same procedure of the aforementioned Conv/GA technique is performed on the resultant even and odd excitation *** provides a relatively wider HPBWthan the original LAA with about quad-fold reduction in the SLL.
Given the severity of waste pollution as a major environmental concern, intelligent and sustainable waste management is becoming increasingly crucial in both developed and developing countries. The material compositio...
详细信息
Leakage of private information in machine learning models can lead to breaches of confidentiality, identity theft, and unauthorized access to personal data. Ensuring the safe and trustworthy deployment of AI systems n...
详细信息
As the world rapidly embraces quantum technologies, the need for robust quantum security protocols becomes increasingly paramount. Quantum Key Distribution (QKD) has been at the forefront of secure key exchange, but e...
详细信息
The constrained design, remote deployment, and sensitive data generated by Internet of Things (IoT) devices make them susceptible to various cyberattacks. One such attack is profiling IoT devices by tracking their pac...
详细信息
The advent of smart manufacturing in Industry 4.0 signifies the era of connections. As a communication protocol, object linking and embedding for process control unified architecture (OPC UA) can address most semantic...
详细信息
Due to advancements in the deep learning technology, object detection has become significantly important for lane detection and vehicle detection. In recent times, lane detection has become more popular as it plays a ...
详细信息
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us...
详细信息
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes used in *** the security models are continuously upgraded to prevent cyberattacks,hackers find innovative ways to target the *** this background,there is a drastic increase observed in the number of phishing emails sent to potential *** scenario necessitates the importance of designing an effective classification *** numerous conventional models are available in the literature for proficient classification of phishing emails,the Machine Learning(ML)techniques and the Deep Learning(DL)models have been employed in the *** current study presents an Intelligent Cuckoo Search(CS)Optimization Algorithm with a Deep Learning-based Phishing Email Detection and Classification(ICSOA-DLPEC)*** aim of the proposed ICSOA-DLPEC model is to effectually distinguish the emails as either legitimate or phishing *** the initial stage,the pre-processing is performed through three stages such as email cleaning,tokenization and stop-word ***,the N-gram approach is;moreover,the CS algorithm is applied to extract the useful feature ***,the CS algorithm is employed with the Gated Recurrent Unit(GRU)model to detect and classify phishing ***,the CS algorithm is used to fine-tune the parameters involved in the GRU *** performance of the proposed ICSOA-DLPEC model was experimentally validated using a benchmark dataset,and the results were assessed under several *** comparative studies were conducted,and the results confirmed the superior performance of the proposed ICSOA-DLPEC model over other existing *** proposed model achieved a maximum accuracy of 99.72%.
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
The heuristics in mixed- integer linear programming (MILP) solvers are mostly general-purpose, which can only recognize some common structures. It sometimes may be challenging for them to obtain a high-quality feasibl...
详细信息
暂无评论