This paper deals with the fractional-order memristive, memcapacitative, and meminductive systems and their utilization in design of the new circuits with memory. We provide a mathematical description of such systems b...
详细信息
This paper deals with the fractional-order memristive, memcapacitative, and meminductive systems and their utilization in design of the new circuits with memory. We provide a mathematical description of such systems by using a technique of the fractional calculus. Some possible applications of “mem” systems are mentioned in article as well.
This paper presents a model comparison of a fixed speed wind turbine (FSWT) operating on a real wind farm. By relying on real data obtained from a wind farm operating in the Chilean Interconnected System, three differ...
详细信息
ISBN:
(纸本)9781467324199
This paper presents a model comparison of a fixed speed wind turbine (FSWT) operating on a real wind farm. By relying on real data obtained from a wind farm operating in the Chilean Interconnected System, three different models are identified and analyzed. First, a phenomenological model based on physical principles governing the production of electricity from wind power is considered. This model is fine-tuned in accordance with practical considerations, such as wind correction factors. Then, a linear model and a Takagi & Sugeno (T&S) fuzzy model are identified. From the experimental results, the linear model is the simplest one, but also the one that presents the worst performance indexes. The best prediction capability is obtained with the T&S model;however, in terms of interpretability, the phenomenological model outperforms the other two black-box models.
A neuron proportion integration (PI) control strategy for semi-active suspension system of tracked vehicle was proposed based on its unique structure and the multiple and complex environment of the driving traffic. An...
详细信息
A neuron proportion integration (PI) control strategy for semi-active suspension system of tracked vehicle was proposed based on its unique structure and the multiple and complex environment of the driving traffic. An adaptive genetic algorithm is used to optimize the parameters of the neuron PI controller. The simulation result of the neuron PI control for semi-active suspension system of tracked vehicle indicates that the vertical amplitude,pitch angle and vertical acceleration of the vehicle are well controlled. The root mean square (RMS) of the vertical amplitude decreases by 37.2%,and 45.2% for the pitch angle,38.6% for the vertical acceleration. The research of neuron PI control experiment for the semi-active suspension system of the tracked vehicle model mining in benthal indicates that the RMS of the weight acceleration vibrating along the vertical direction decreases by 29.5%,the power spectral density resonance peak of the acceleration of the car body decreases by 23.8%.
How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem—measurement-device-independent quantum key distribution (QKD...
详细信息
How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem—measurement-device-independent quantum key distribution (QKD). It not only removes all detector side channels, but also doubles the secure distance with conventional lasers. Our proposal can be implemented with standard optical components with low detection efficiency and highly lossy channels. In contrast to the previous solution of full device independent QKD, the realization of our idea does not require detectors of near unity detection efficiency in combination with a qubit amplifier (based on teleportation) or a quantum nondemolition measurement of the number of photons in a pulse. Furthermore, its key generation rate is many orders of magnitude higher than that based on full device independent QKD. The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors.
In this work, we propose a recursive local linear estimator (RLLE) for identification of nonlinear autoregressive systems with exogenous inputs, along with an analysis of its strong consistency and asymptotical mean s...
详细信息
In this work, we propose a recursive local linear estimator (RLLE) for identification of nonlinear autoregressive systems with exogenous inputs, along with an analysis of its strong consistency and asymptotical mean square error properties. The performance of the proposed RLLE is verified by a simulation example.
Brain computer interface (BCI) is a widely used system to assist the disabled and paralyzed people by creating a new communication channel. Among the various methods used in BCI area, motor imagery (MI) is the most po...
详细信息
ISBN:
(纸本)9781467311496
Brain computer interface (BCI) is a widely used system to assist the disabled and paralyzed people by creating a new communication channel. Among the various methods used in BCI area, motor imagery (MI) is the most popular and the most common one due to its the most natural way of communication for the subject. Some software applications are used to implement BCI systems, and some toolboxes exist for EEG signal processing. In recent years virtual reality (VR) technology has entered into the BCI research area to simulate the real world situations and enhance the subject performance. In this work, a completely MATLAB-based Mi-based BCI system is proposed and implemented in order to navigate into a virtual environment. In addition, a variety of features types were employed to select the best ones in the proposed system with the use of linear discriminant analysis (LDA) classifier through some interactive graphical user interfaces (GUIs). The results show the feasibility of the proposed BCI system in the subject training with or without feedback and even navigation into a virtual home.
Several methods for adjusting image contrast have been developed in the field of image processing for image enhancement. Illumination is one of the most significant factors affecting the appearance of an image. Improp...
详细信息
ISBN:
(纸本)9781467311496
Several methods for adjusting image contrast have been developed in the field of image processing for image enhancement. Illumination is one of the most significant factors affecting the appearance of an image. Improper illumination causes a variety of problems in practice and thus, it is necessary to compensate for nonuniform illumination. Wireless Capsule Endoscopy (WCE) images suffer from this problem too. We propose an improved Adaptive Gamma Correction Method (AGCM) to compensate for nonuniform illumination in WCE color images. The experiments have shown that the proposed AGCM performs well in improving image quality. The WCE images obtained with AGCM are also better than those obtained with histogram equalization and adaptive histogram equalization in terms of brightness constancy, overall visual rendition and contrast. The Peak Signal to Noise Ratio (PSNR) and Contrast to Noise Ratio (CNR) values are also higher for AGCM than for other correction algorithms. Also, the differences between edge pixels and neighboring pixels in the WCE images are increased. We use a color variant of the canny operator for color edge detection. By using this method, 65% of the borders are detected correctly, while the detection rate is 45% without using this method.
Privacy amplification (PA) is an essential postprocessing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of...
详细信息
Privacy amplification (PA) is an essential postprocessing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.
Quantum mechanics is potentially advantageous for certain information-processing tasks, but its probabilistic nature and requirement of measurement backaction often limit the precision of conventional classical inform...
详细信息
Quantum mechanics is potentially advantageous for certain information-processing tasks, but its probabilistic nature and requirement of measurement backaction often limit the precision of conventional classical information-processing devices, such as sensors and atomic clocks. Here we show that, by engineering the dynamics of coupled quantum systems, it is possible to construct a subsystem that evades the measurement backaction of quantum mechanics, at all times of interest, and obeys any classical dynamics, linear or nonlinear, that we choose. We call such a system a quantum-mechanics-free subsystem (QMFS). All of the observables of a QMFS are quantum-nondemolition (QND) observables; moreover, they are dynamical QND observables, thus demolishing the widely held belief that QND observables are constants of motion. QMFSs point to a new strategy for designing classical information-processing devices in regimes where quantum noise is detrimental, unifying previous approaches that employ QND observables, backaction evasion, and quantum noise cancellation. Potential applications include gravitational-wave detection, optomechanical-force sensing, atomic magnetometry, and classical computing. Demonstrations of dynamical QMFSs include the generation of broadband squeezed light for use in interferometric gravitational-wave detection, experiments using entangled atomic-spin ensembles, and implementations of the quantum Toffoli gate.
We consider the security of continuous-variable quantum key distribution using thermal (or noisy) Gaussian resource states. Specifically, we analyze this against collective Gaussian attacks using direct and reverse re...
详细信息
We consider the security of continuous-variable quantum key distribution using thermal (or noisy) Gaussian resource states. Specifically, we analyze this against collective Gaussian attacks using direct and reverse reconciliation where both protocols use either homodyne or heterodyne detection. We show that in the case of direct reconciliation with heterodyne detection, an improved robustness to channel noise is achieved when large amounts of preparation noise is added, as compared to the case when no preparation noise is added. We also consider the theoretical limit of infinite preparation noise and show a secure key can still be achieved in this limit provided the channel noise is less than the preparation noise. Finally, we consider the security of quantum key distribution at various electromagnetic wavelengths and derive an upper bound related to an entanglement-breaking eavesdropping attack and discuss the feasibility of microwave quantum key distribution.
暂无评论