Results 1 to 10 of about 70,576 (258)
A Novel VSS-LMS Algorithm Based on Modified Versoria Function for Anti-Jamming [PDF]
In the sensor array signal reception system, improving the accuracy of weak-signal detection is crucial. Traditional fixed-step algorithms struggle to balance the convergence rate (CR) and low steady-state error (SSE) owing to their inherent trade-off ...
Binghe Tian +4 more
doaj +2 more sources
Linear approximate segmentation and data compression of moving target spatio-temporal trajectory can reduce data storage pressure and improve the efficiency of target motion pattern mining.
Zhihong Ouyang +3 more
doaj +1 more source
Ground Calibration Method of Magnetic Compensation Parameters forMagnetometer Towfish
Magnetometer towfish can be utilized for underwater and aerial towed magnetic field measurements. Although they lack propulsion systems, significant magnetic interference persists, necessitating magnetic interference compensation.
Qi HAN +5 more
doaj +1 more source
IN-ME Position Error Compensation Algorithm for the Near-Field Beamforming of UAVs
The target of an unmanned aerial vehicle swarm will present near-field characteristics when it is integrated as an array, and the existence of the unmanned aerial vehicle swarm motion error will greatly deteriorate the beam pattern formed by the array ...
Yinan Zhang +4 more
doaj +1 more source
Recognition of Noisy Radar Emitter Signals Using a One-Dimensional Deep Residual Shrinkage Network
Signal features can be obscured in noisy environments, resulting in low accuracy of radar emitter signal recognition based on traditional methods. To improve the ability of learning features from noisy signals, a new radar emitter signal recognition ...
Shengli Zhang +3 more
doaj +1 more source
Universal Adversarial Attack via Conditional Sampling for Text Classification
Despite deep neural networks (DNNs) having achieved impressive performance in various domains, it has been revealed that DNNs are vulnerable in the face of adversarial examples, which are maliciously crafted by adding human-imperceptible perturbations to
Yu Zhang, Kun Shao, Junan Yang, Hui Liu
doaj +1 more source
Textual Backdoor Defense via Poisoned Sample Recognition
Deep learning models are vulnerable to backdoor attacks. The success rate of textual backdoor attacks based on data poisoning in existing research is as high as 100%.
Kun Shao, Yu Zhang, Junan Yang, Hui Liu
doaj +1 more source
“Oil-soluble” reversed lipid nanoparticles for oral insulin delivery
Background In this study, we aimed to design a novel oral insulin delivery system, named “oil-soluble” reversed lipid nanoparticles (ORLN), in which a hydrophilic insulin molecule is encapsulated by a phospholipid (PC) shell and dissolved in oil to ...
Tao Wang +5 more
doaj +1 more source
NC-OFDM Satellite Communication Based on Compressed Spectrum Sensing
With the fast development of giant LEO constellations, the effective spectrum utilization has been regarded as one of the key orientations for satellite communications.
Yong Wang +5 more
doaj +1 more source
In the underlay cognitive radio networks, the power spectrum maps (PSMs) estimation is the main challenge in sensing the idle wireless radio resources. Traditional deep learning-based algorithms achieve good estimation performance, under the hypothesis ...
Xu Han, Lei Xue, Ying Xu, Zunyang Liu
doaj +1 more source

