This paper presents a multi-axis load-while-track (LWT) device based on a parallel robot to simulate 3-axis feeding resistance for machine tool tests. It performs the LWT function which requires the device to load the...
详细信息
Pre-trained Language Models (PLMs) such as BERT have revolutionized the landscape of natural language processing (NLP). Inspired by their proliferation, tremendous efforts have been devoted to pre-trained graph models...
详细信息
Motivated by current sharing in power networks, we consider a class of output consensus (also called agreement) problems for nonlinear systems, where the consensus value is determined by external disturbances, e.g., p...
详细信息
This paper aims to design the optimal sliding mode and super twisting sliding mode controllers for the nonlinear Shape Memory Alloy (SMA) wire actuators. The parameters of the proposed controllers are optimally tuned ...
This paper aims to design the optimal sliding mode and super twisting sliding mode controllers for the nonlinear Shape Memory Alloy (SMA) wire actuators. The parameters of the proposed controllers are optimally tuned using the metaheuristic Grey Wolf optimizer algorithm and a comparative analysis is carried out. All control structures are validated by simulations using an accurate evolved Takagi-Sugeno-Kang fuzzy model of SMA wire actuators and their control performance is evaluated.
Metauniverse is a future society based on the convergence of the physical and the digital world, which is fully indebted to the sophisticated human-machine interface (HMI) to connect the two worlds. In this study, a m...
详细信息
Edge enabled Industrial Internet of Things (IIoT) platform is of great significance to accelerate the development of smart industry. However, with the dramatic increase in real-time IIoT applications, it is a great ch...
详细信息
Removing quantum hacking attacks is a highly challenging task for quantum key distribution (QKD) since one needs to correctly detect the types of attacks. There is a big gap between the idealized theoretical model and...
详细信息
Removing quantum hacking attacks is a highly challenging task for quantum key distribution (QKD) since one needs to correctly detect the types of attacks. There is a big gap between the idealized theoretical model and the practical physical system, which results in various hacking strategies exploited from security loopholes. To bridge this gap, previous continuous-variable (CV) QKD systems adopted a universal statistical model to represent different dimensional characters of the physical layer. The challenge is to discriminate different attacks from the exposed key physical details. Here we present a semisupervised deep-learning method to detect the known attacks or potential threats that are hard to be captured in previous CVQKD systems. The proof-of-principle experiment result shows that it could break the present limitations that different attacks are relatively independent, and key features computed from previous threshold-based methods are not correlated with each other. We anticipate that our proposal will give insight into how quantum hacking attacks can be detected under the real system modeling constraints, and will enable the present quantum communication systems to reach a higher level of practical security without adding new assumptions.
Diffusion magnetic resonance imaging (dMRI) provides critical insights into the microstructural and connectional organization of the human brain. However, the availability of high-field, open-access datasets that incl...
详细信息
In this paper,the asynchronous controller problem is considered for Markov jump systems(MJSs) subject to actuator *** asynchronous phenomenon between the controller and the plant is addressed by introducing a hidden M...
详细信息
In this paper,the asynchronous controller problem is considered for Markov jump systems(MJSs) subject to actuator *** asynchronous phenomenon between the controller and the plant is addressed by introducing a hidden Markov model and the closed-loop hidden MJSs are *** on the closed-loop hidden MJSs and using convex hull technique and linear matrix inequality technique,a controller design algorithm is derived to ensure that the closed-loop hidden MJSs satisfy the stochastic ***,a numerical example is provided to demonstrate the effectiveness of the proposed asynchronous controller design algorithm.
computer-assisted minimally invasive surgery has great potential in benefiting modern operating theatres. The video data streamed from the endoscope provides rich information to support context-awareness for next-gene...
详细信息
暂无评论