Iterative learning control applies to systems that repeatedly execute the same finite duration task. The distinguishing feature of this form of control action is that all data generated on a previous execution of the ...
详细信息
Iterative learning control applies to systems that repeatedly execute the same finite duration task. The distinguishing feature of this form of control action is that all data generated on a previous execution of the task are available to compute the control action for the subsequent execution. This paper uses the linear repetitive process stability analysis and optimization techniques to design a dynamic controller that, in contrast to previous designs in the repetitive process/2D systems setting, does not require measurement of the state dynamics or observer-based estimation. Supporting experimental validation results are also given.
Agile is a method that moves quickly, lightly, and approachable in developing a software process. The primary goal of agile methodology is to produce high-quality software in a quicker time. It is using this methodolo...
Agile is a method that moves quickly, lightly, and approachable in developing a software process. The primary goal of agile methodology is to produce high-quality software in a quicker time. It is using this methodology for developing the Academic Resource in a system provided by software for maintaining academic and financial records of data efficiently and conveniently. The administration of any academic association must make records of students registered and the staff of the university on paper and keep them safe, which is a tedious task due to the increase in manual work that reduced the utilization of the efficiency of staff. This paper describes a systematic approach to developing a user-friendly, flexible, and easy-to-maintain environment for academic resources using agile's extreme programming. The execution of the different tasks to develop the system is used to widen the horizons in Agile Methodologies step by step.
This article addresses the tracking control problem of uncertain fractional-order nonlinear systems in the presence of input quantization and external disturbance by combining with radial basis function(RBF) neural ne...
详细信息
Smartphone authentication is a widely discussed topic of research in the recent time because of the wide range of security sensitive personal applications and the associated private data. Traditional authentication me...
Smartphone authentication is a widely discussed topic of research in the recent time because of the wide range of security sensitive personal applications and the associated private data. Traditional authentication methods like PIN, passwords, graphical pattern can’t identify the actual user , since the one who enters the credentials correctly will get access to the smartphone application and its data. Physiological biometric security mechanisms like fingerprint and face recognition can provide moderate security to sensitive applications and data but are vulnerable to impersonation, spoofing and presentation attacks. Behavioral biometrics on the other hand, where authentication is done using the behavioral pattern, are proved to be an effective authentication mechanism and can be deployed as continuous and transparent which improve the usability and effectiveness of the authentication system. The proposed work in this paper is based on behavioral biometrics and the dataset is collected from 30 subjects, keeping the smartphone in 4 different positions, performing 5 different activities with each activity contributing to 63000 samples. The data collected are applied to a random forest classifier and the results are compared with different number of folds for cross validation, varying maximum depth for the tree and the number of generated sub trees.
This paper investigates the performance of reconfigurable intelligent surface assisted two-way non-orthogonal multiple access (RIS-TW-NOMA) networks, where a pair of users exchange their information through a RIS. The...
详细信息
—To mitigate the radiologist’s workload, computer-aided diagnosis with the capability to review and analyze medical images is gradually deployed. Deep learning-based region of interest segmentation is among the most...
详细信息
We propose a fully passive linear optical quantum key distribution (QKD) source that implements both random decoy-state and encoding choices with postselection only, thus eliminating all side channels in active modula...
详细信息
We propose a fully passive linear optical quantum key distribution (QKD) source that implements both random decoy-state and encoding choices with postselection only, thus eliminating all side channels in active modulators. Our source is general purpose and can be used in, e.g., BB84, the six-state protocol, and reference-frame-independent QKD. It can even potentially be combined with measurement-device-independent QKD to achieve robustness against side channels in both detectors and modulators. We also perform a proof-of-principle experimental source characterization to show its feasibility.
Blood type is a permanent and irreversible innate human being. In general, there are 4 types of blood, A, B, O and AB. According to the nature, blood is the key to the entire human immune system, as well as creating a...
Blood type is a permanent and irreversible innate human being. In general, there are 4 types of blood, A, B, O and AB. According to the nature, blood is the key to the entire human immune system, as well as creating antibodies to ward off various diseases and infections. There is a correlation between a disease with a certain blood type. But the knowledge about causes of diseases by blood type is still rarely known by public. This paper presents an implementation of the forward chaining method in the diagnosis diseases based on blood type in getting early knowledge about disease. The Forward Chaining method is used as an inference engine to work based on the fact and symptoms to get the conclusion or result. By utilizing expert system technology and the inference forward chaining method, an android based mobile application is designed to provide early information about diseases that can be caused by blood type. This method will analyze the diagnosis based-on disease database. Testing system using 20 data samples, the diagnostic results showed 17 samples were successfully diagnosed with a match of 80%, and 3 samples with a match of 85%. Based on the test results, the percentage of success reached 81%. Finally, it can be concluded that the disease detection application based on blood type can be used to help user to diagnose diseases earlier and know how to make the prevention against these diseases without meet medical experts. It is more efficient with time, cost, and energy.
In order to create outstanding quality, reliable software, the software business has many problems. The reliability of software is important for the reliability of the system. The quality of the software is impressive...
In order to create outstanding quality, reliable software, the software business has many problems. The reliability of software is important for the reliability of the system. The quality of the software is impressive. It compares with the reliability of hardware by reflecting the perfection of architecture and the reliability of hardware. This paper examines emerging literature focused on machine learning approaches of software reliability models. We can divide the reliability analysis of software into three components: modelling, measuring and improvement. Following the analysis of full applicable articles concerning defects that occur during the elimination of fault, we have proposed a method focusing on the most relevant software reliability parameters using machine learning methods.
In recent work, Akers et al. proved that the entanglement of purification Ep(A : B) is bounded below by half of the q-Rényi reflected entropy SR(q)(A : B) for all q ≥ 2, showing that Ep(A : B) = 1/2 SR(q)(A : B)...
详细信息
暂无评论