Results 1 to 10 of about 59,207 (133)
A countermeasure development pipeline [PDF]
We have developed an integrated pipeline for countermeasure discovery that, under the auspices of the National Institutes of Health Countermeasures Against Chemical Threats network, is one of the few efforts within academia that by design spans the spectrum from discovery to phase I.
Calum A Macrae +2 more
exaly +5 more sources
Linear approximate segmentation and data compression of moving target spatio-temporal trajectory can reduce data storage pressure and improve the efficiency of target motion pattern mining.
Zhihong Ouyang +3 more
doaj +1 more source
Ground Calibration Method of Magnetic Compensation Parameters forMagnetometer Towfish
Magnetometer towfish can be utilized for underwater and aerial towed magnetic field measurements. Although they lack propulsion systems, significant magnetic interference persists, necessitating magnetic interference compensation.
Qi HAN +5 more
doaj +1 more source
IN-ME Position Error Compensation Algorithm for the Near-Field Beamforming of UAVs
The target of an unmanned aerial vehicle swarm will present near-field characteristics when it is integrated as an array, and the existence of the unmanned aerial vehicle swarm motion error will greatly deteriorate the beam pattern formed by the array ...
Yinan Zhang +4 more
doaj +1 more source
Recognition of Noisy Radar Emitter Signals Using a One-Dimensional Deep Residual Shrinkage Network
Signal features can be obscured in noisy environments, resulting in low accuracy of radar emitter signal recognition based on traditional methods. To improve the ability of learning features from noisy signals, a new radar emitter signal recognition ...
Shengli Zhang +3 more
doaj +1 more source
Universal Adversarial Attack via Conditional Sampling for Text Classification
Despite deep neural networks (DNNs) having achieved impressive performance in various domains, it has been revealed that DNNs are vulnerable in the face of adversarial examples, which are maliciously crafted by adding human-imperceptible perturbations to
Yu Zhang, Kun Shao, Junan Yang, Hui Liu
doaj +1 more source
Textual Backdoor Defense via Poisoned Sample Recognition
Deep learning models are vulnerable to backdoor attacks. The success rate of textual backdoor attacks based on data poisoning in existing research is as high as 100%.
Kun Shao, Yu Zhang, Junan Yang, Hui Liu
doaj +1 more source
“Oil-soluble” reversed lipid nanoparticles for oral insulin delivery
Background In this study, we aimed to design a novel oral insulin delivery system, named “oil-soluble” reversed lipid nanoparticles (ORLN), in which a hydrophilic insulin molecule is encapsulated by a phospholipid (PC) shell and dissolved in oil to ...
Tao Wang +5 more
doaj +1 more source
NC-OFDM Satellite Communication Based on Compressed Spectrum Sensing
With the fast development of giant LEO constellations, the effective spectrum utilization has been regarded as one of the key orientations for satellite communications.
Yong Wang +5 more
doaj +1 more source
In the underlay cognitive radio networks, the power spectrum maps (PSMs) estimation is the main challenge in sensing the idle wireless radio resources. Traditional deep learning-based algorithms achieve good estimation performance, under the hypothesis ...
Xu Han, Lei Xue, Ying Xu, Zunyang Liu
doaj +1 more source

