In this paper, the mechanical displacement and the resulting resonance shift of the nonlinear metamaterial unit (meta-atom), due to the induced electromagnetic attraction force within the meta-atom which is placed in ...
详细信息
In this paper, the mechanical displacement and the resulting resonance shift of the nonlinear metamaterial unit (meta-atom), due to the induced electromagnetic attraction force within the meta-atom which is placed in the liquid-phase environment filled with polydimethylsiloxane (PDMS), is experimentally demonstrated with enhancement of incident electromagnetic field intensity.
A miniaturized wideband CPW-fed V-shape patch with a folded surrounding slot structure is discussed in this work. The presented antenna, fabricated on a 30 × 20 × 1.6 mm 3 FR4 dielectric, exhibits a measure...
详细信息
A miniaturized wideband CPW-fed V-shape patch with a folded surrounding slot structure is discussed in this work. The presented antenna, fabricated on a 30 × 20 × 1.6 mm 3 FR4 dielectric, exhibits a measured S 11 ≤-10 dB bandwidth from 2.39 GHz to 3.56 GHz; within this bandwidth, a gain larger than 0.6 dBi is found. Compactness and wideband characteristics yield this antenna a valid choice for Wireless LAN 2.4-2.7 GHz and Wi-MAX 2.5/3.5 GHz.
In this paper, the dynamic process of Split Resonant Rings (SRRs) muminated by electromagnetic wave with different intensities in liquid media is experimentally demonstrated for the first time, and the intrinsic energ...
详细信息
In this paper, the dynamic process of Split Resonant Rings (SRRs) muminated by electromagnetic wave with different intensities in liquid media is experimentally demonstrated for the first time, and the intrinsic energy coupling mechanism and state changing conditions are analyzed theoretically.
In this paper a new approach for the optimization of a double truncated corner microstrip square patch antenna is proposed by exploiting method-of-moments (MoM) calculator of Matlab Antenna Toolbox. A problem solution...
详细信息
In this paper a new approach for the optimization of a double truncated corner microstrip square patch antenna is proposed by exploiting method-of-moments (MoM) calculator of Matlab Antenna Toolbox. A problem solution is iteratively updated according to the optimization criteria, i.e., find the minimum axial ratio (AR) at the target frequency within the impedance bandwidth S11≤-10 dB. An update mechanism for the optimization variable domains is implemented to refine the solution step-by-step. In the proposed example it is found that this approach converges to a feasible solution in few steps (less than an hour).
Community detection plays an important role in social networks, since it can help to naturally divide the network into smaller parts so as to simplify network analysis. However, on the other hand, it arises the concer...
详细信息
Network traffic flow can be represented as time series. Outliers of these time series is important for the computer network security. The existing methods for the time series anomaly detection mainly operate on the en...
详细信息
ISBN:
(数字)9781728160924
ISBN:
(纸本)9781728160931
Network traffic flow can be represented as time series. Outliers of these time series is important for the computer network security. The existing methods for the time series anomaly detection mainly operate on the entire time series to detect the abnormal series, seldom find out the position of the abnormal point. To solve this defect, we propose a method to discover the location of the outliers in time series based on a full convolutional network. We first map the time series into two-dimensional grayscale images by sliding window approach, and then feed them into the full convolutional network. In the classified stage, the feature maps of the last convolution layer are restored to the same size as the input image by up-sampling. Finally, we predict the class for each pixel and calculate the loss on a pixel-by-pixel basis. We tested the model on Yahoo Webscope S5 anomaly benchmark dataset, and the results show that our proposed method can achieve a mean pixel accuracy of 99.4% and mean IOU of 97% on the test dataset.
Sequences with low auto-correlation property have been applied in code-division multiple access communication systems, radar and cryptography. Using the inverse Gray mapping, a quaternary sequence of even length N can...
详细信息
Sequences with low auto-correlation property have been applied in code-division multiple access communication systems, radar and cryptography. Using the inverse Gray mapping, a quaternary sequence of even length N can be obtained from two binary sequences of the same length, which are called component sequences. In this paper, using interleaving method, we present several classes of component sequences from twin-prime sequences pairs or GMW sequences pairs given by Tang and Ding in 2010; or two, three or four binary sequences defined by cyclotomic classes of order 4. Hence we can obtain new classes of quaternary sequences, which are different from known ones, since known component sequences are constructed from a pair of binary sequences with optimal auto-correlation or Sidel'nikov sequences.
The digitalization of the maritime sector is continuously growing, leading to increased automation, such as, the development of autonomous vessels. The Autonomous Passenger Ship (APS) is a characteristic instantiation...
The digitalization of the maritime sector is continuously growing, leading to increased automation, such as, the development of autonomous vessels. The Autonomous Passenger Ship (APS) is a characteristic instantiation of this development, aiming to transport people on urban waterways. Although emerging technologies deployed in such APS aim to facilitate the functions and operations of the navigation and communication systems, various safety and security risks are inherent to the communication infrastructure due to their interconnectivity. The aim of this work is to study the safety and cyber security of the communication system of an APS, namely the MilliAmpere2 APS. The six step model (SSM) is utilized to facilitate the joint analysis. The application of the SSM enables, among others, the capturing of relationships between cyber attacks and component failures, the assessment of safety and cyber security countermeasures, as well as, the synergies between them. It has been found that most countermeasures in both categories are reinforcing or are conditionally dependent on each other, while few antagonize each another. These findings will allow for improved design and implementation of integrated safety and security management solutions.
With the development of society, Face Recognition technology has become one of the hottest topics, and is widely used. In this paper, we design and develop a face recognition system that can be used as a check-in syst...
详细信息
With the development of society, Face Recognition technology has become one of the hottest topics, and is widely used. In this paper, we design and develop a face recognition system that can be used as a check-in system. Traditional check-in systems have several disadvantages including inefficiency and being difficult to analyse statistics. Thus, in order to solve these problems, we propose a new way of check-in: an identification system based on face recognition. Our system includes three main processes. Firstly, the image of each individual is captured via computer cameras. Secondly, after image preprocessing, feature information is extracted from the images through an efficient face recognition algorithm based on Principle Component Analysis. Thirdly, a database including the basic information of participants is created, and each image is associated with corresponding information in the database. After system development, comprehensive experiments are performed to examine the identification accuracy of the system.
In order to improve the accuracy of vehicle detection, a Multitask Cascaded Convolutional Neural Network (MC-CNN) based on Full Frame Histogram Equalization (FFHE) algorithm is proposed. FFHE is used to enhance the im...
详细信息
In order to improve the accuracy of vehicle detection, a Multitask Cascaded Convolutional Neural Network (MC-CNN) based on Full Frame Histogram Equalization (FFHE) algorithm is proposed. FFHE is used to enhance the image, which can solve the problem of unclear image, low contrast, low overall gray value and uneven illumination when the imaging condition is not ideal. MC-CNN locates and classifies the object in the image. The algorithm first performs FFHE operation on the test datasets. Then the region image containing a single vehicle is obtained by the object location algorithm based on Faster R-CNN. Next, the six classification (bus, microbus, minivan, sedan, SUV, and truck) results of each vehicle are obtained through the object classification algorithm based on CNN. To verify the performance of the algorithm, MC-CNN was trained on BIT-Vehicle and tested on SYIT2018-Vehicle. Compared with Faster R-CNN, the average classification accuracy of our algorithm was improved by 11.5% on SYIT2018-Vehicle dataset.
暂无评论