Brain cancer is classified as a malignant tumours that can spread to other parts of the human body, especially the spine and brain instantaneously. Brain tumour has been considered as the biggest problem for human hea...
详细信息
Multilayer least-square (LS)-based one-class classification networks (MLS-OCNs) have gained great attention for the purpose of identifying anomalies and outliers. However, many MLS-OCNs encounter the issue of loosely ...
This paper presents the design and development of a low-cost and user-friendly Bengali braille embosser for the visually impaired population in Bangladesh. To produce braille text, the embosser employs a shifting mech...
详细信息
In recent years there has been great interest in networks of passive, computationally-weak nodes, whose interactions are controlled by the outside environment;examples include population protocols, chemical reactions ...
详细信息
ISBN:
(纸本)9783959772631
In recent years there has been great interest in networks of passive, computationally-weak nodes, whose interactions are controlled by the outside environment;examples include population protocols, chemical reactions networks (CRNs), DNA computing, and more. Such networks are usually studied under one of two extreme regimes: the schedule of interactions is either assumed to be adversarial, or it is assumed to be chosen uniformly at random. In this paper we study an intermediate regime, where the interaction at each step is chosen from some not-necessarily-uniform distribution: we introduce the definition of a (p, Ε)-scheduler, where the distribution that the scheduler chooses at every round can be arbitrary, but it must have p-distance at most Ε from the uniform distribution. We ask how far from uniform we can get before the dynamics of the model break down. For simplicity, we focus on the 3-majority dynamics, a type of chemical reaction network where the nodes of the network interact in triplets. Each node initially has an opinion of either X or Y, and when a triplet of nodes interact, all three nodes change their opinion to the majority of their three opinions. It is known that under a uniformly random scheduler, if we have an initial gap of Ω(√n log n) in favor of one value, then w.h.p. all nodes converge to the majority value within O(n log n) steps. For the 3-majority dynamics, we prove that among all non-uniform schedulers with a given 1- or ∞-distance to the uniform scheduler, the worst case is a scheduler that creates a partition in the network, disconnecting some nodes from the rest: under any (p, Ε)-close scheduler, if the scheduler's distance from uniform only suffices to disconnect a set of size at most S nodes and we start from a configuration with a gap of Ω(S + √n log n) in favor of one value, then we are guaranteed that all but O(S) nodes will convert to the majority value. We also show that creating a partition is not necessary to cause the system t
Period-doubling bifurcation,as an intermediate state between order and chaos,is ubiquitous in all disciplines of nonlinear ***,previous experimental observations of period doubling in ultrafast fiber lasers are mainly...
详细信息
Period-doubling bifurcation,as an intermediate state between order and chaos,is ubiquitous in all disciplines of nonlinear ***,previous experimental observations of period doubling in ultrafast fiber lasers are mainly restricted to self-sustained steady state,controllable manipulation and dynamic switching between period doubling and other intriguing dynamical states are still largely ***,we propose to expand the vision of dissipative soliton periodic doubling,which we illustrate experimentally by reporting original spontaneous,collisional,and controllable spectral period doubling in a polarization-maintaining ultrafast fiber ***,the spontaneous period doubling can be observed in both single-and *** mechanism of the switchable state and periodic doubling was revealed by numerical ***,state transformation of individual solitons can be resolved during the collision of triple solitons involving stationary,oscillating,and period ***,controllable deterministic switching between period doubling and other dynamical states,as well as exemplifying the application of period-doubling-based digital encoding,is achieved under programmable pump *** results open a new window for unveiling complex Hopf bifurcation in dissipative systems and bring useful insights into nonlinear science and applications.
Within energy systems, collaboration has recently gained increased attention from academia and industry. However, the success of collaboration requires a fair value-sharing method based on the individual contributions...
详细信息
For dual active bridge (DAB) DC/DC converters, DC bias of the inductor current caused by the system parameters variation increases system losses, leads to core saturation, and even jeopardizes the safe and reliable op...
详细信息
A deep learning prototype for a reconstructive spectrometer was developed using an experimentally determined spectrometer response and synthetic data generated from the response matrix. Benchmarking with synthetic and...
详细信息
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end *** numerous security tech-niques,face recognition is considered a high-security *** fuse and carry out face ...
详细信息
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end *** numerous security tech-niques,face recognition is considered a high-security *** fuse and carry out face identification as an access authority into these ***,face identification authentication is sensitive to attacks with a 2-D photo image or captured video to access the system as an authorized *** the existing spoofing detection algorithm,there was some loss in the recreation of *** research proposes an unobtrusive technique to detect face spoofing attacks that apply a single frame of the sequenced set of frames to overcome the above-said *** research offers a novel Edge-Net autoencoder to select convoluted and dominant features of the input diffused ***,this pro-posed method is tested with the Cross-ethnicity Face Anti-spoofing(CASIA),Fetal alcohol spectrum disorders(FASD)*** database has three models of attacks:distorted photographs in printed form,photographs with removed eyes portion,and video *** images are taken with three different quality cameras:low,average,and high-quality real and spoofed *** extensive experimental study was performed with CASIA-FASD,3 Diagnostic Machine Aid-Digital(DMAD)dataset that proved higher results when compared to existing algorithms.
Fault detection in photovoltaic (PV) arrays is of paramount importance, because the output power is maintained at its highest value and the efficiency of the system is prolonged. In the past, there were issues of outp...
详细信息
暂无评论