The cooperative output regulation problem has been extensively studied on the basis of the distributed observer approach. However, the majority of the existing research assumes that the dynamics is known previously. T...
The cooperative output regulation problem has been extensively studied on the basis of the distributed observer approach. However, the majority of the existing research assumes that the dynamics is known previously. To remove this condition, the cooperative output regulation problem is further solved via the data-driven framework where the dynamics of the plant is unknown. First, a data-driven distributed observer is established to estimate the state of the leader with unknown dynamics subject to external inputs. Second, the unknown regulator equations are solved using the iterative recurrent neural network approach. Third, the state-based data-driven distributed control law is synthesized to solve the problem. The optimal gains are derived by solving convex optimization problems using input and state data. Finally, a numerical example is presented to verify the feasibility of the proposed framework.
The authors investigate the potential of pulsed power technology in recycling of E-waste. Applying the pulsed discharge can separate composite materials into plastic and metal. In this study, pulsed discharge was appl...
详细信息
ISBN:
(数字)9789038661353
ISBN:
(纸本)9798350352733
The authors investigate the potential of pulsed power technology in recycling of E-waste. Applying the pulsed discharge can separate composite materials into plastic and metal. In this study, pulsed discharge was applied to indium tin oxide (ITO) coated plastic films. We used two electrode types: rod-to-rod electrode and a pair of flat plate electrodes to investigate the effect of electrode structure on the metal removal area in detail. A series of single pulse discharges were applied at various electrode distances. As a result, it was revealed that metal can be removed over a wide range by the pulsed discharge using a pair of flat plate electrodes. When the gap between the electrodes was 30 mm, the removal area by the flat plate electrodes was approximately 3.4 times that by the rod electrodes. Analysis of the current density also revealed that the metal removal area was greatly affected by the current density.
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection systems (IDS) in recognizing and impeding...
详细信息
ISBN:
(数字)9798331518097
ISBN:
(纸本)9798331518103
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection systems (IDS) in recognizing and impeding novel threats and intricate methodologies has its limits. This study introduces a new method for improving network security by using deep learning techniques in the design and development of an intrusion detection system (IDS). The suggested Intrusion Detection System uses deep learning techniques, specifically Long Short Term Memory (LSTM) and Convolutional Neural Networks (CNNs), to identify and react to known and new security threats. Data can be taught to be encoded into a lower-dimensional representation and then decoded back into its original form using autoencoders (AEs). Autoencoders are a cutting-edge intrusion detection system that can lower false positives and raise overall detection accuracy because of their capacity to automatically learn from and adjust to the ever-changing threat landscape. They enhance computer networks capacity to spot irregularities and possible security threats. With the deep learning model obtaining a high accuracy of 99% in real-world threat detection, the results show that deep learning is effective in developing intrusion detection systems.
In this paper, we study the problem of consensus-based distributed Nash equilibrium (NE) seeking where a network of players, abstracted as a directed graph, aim to minimize their own local cost functions non-cooperati...
详细信息
Cervical cancer, which is ranked fourth among cancers affecting women, is highly treatable when detected early through the pap smear test. Deep Learning (DL) models, particularly Convolutional Neural Networks (CNNs), ...
详细信息
ISBN:
(数字)9798350375688
ISBN:
(纸本)9798350375695
Cervical cancer, which is ranked fourth among cancers affecting women, is highly treatable when detected early through the pap smear test. Deep Learning (DL) models, particularly Convolutional Neural Networks (CNNs), analyze pap smear images, yet their "Black-Box" nature raises transparency concerns in medical diagnostics. This paper introduces a solution named EnsembleCAM to enhance interpretability by unifying visual explanations through the combination of diverse Class Activation Maps (CAMs). Using the Herlev Dataset, we employ data pre-processing, data augmentation techniques, develop an XceptionNet based binary classification model with an accuracy of 89% and apply GradCAM, GradCAM++, Score-CAM, Eigen-CAM and LayerCAM on this classifier. Then, the novel EnsembleCAM is constructed taking the median of activation maps from the five individual CAM methods. The analysis of activation maps of each CAM method and EnsembleCAM confirmed that in activation maps of EnsembleCAM, higher activation values were more concentrated around the nucleus which is the most important region in indicating cervical malignancy. The evaluation using pixel flipping performance metric also proved that the EnsembleCAM effectively recognises regions vital to the model's decision-making through its steepest drop in the mean prediction score when the pixels in the region contributing most to the model's decision were flipped.
The Tamazight civilization stands as a significant cultural entity, marked by its linguistic diversity, historical legacy, and scriptural traditions, which collectively enrich the cultural tapestry of North Africa. Am...
详细信息
Blockchain technology gained much traction in the last few years. These decentralized databases offer security, immutability, and scalability across various applications. Decentralized applications generate vast amoun...
Blockchain technology gained much traction in the last few years. These decentralized databases offer security, immutability, and scalability across various applications. Decentralized applications generate vast amounts of data, known as events, that are recorded on the blockchain and are public to anyone. Some people may see opportunities for financial gains in these events and would like to know when they occur. This paper proposes a solution to process and deliver those events as real-time alerts to the users. It uses existing technologies such as message queues, multithreading, and asynchronous processing and integrates them into a scalable architecture. The results we achieved in this paper show that for an evenly distributed network traffic, which does not entirely consists of transaction bursts, the proposed solution offers reliability, efficiency, and a suitable delivery time to those wishing to integrate it into their projects. With time, this solution, or improved architectures, may form the basis of the following big-data architectures for processing blockchain events.
Suicide is a major cause of death. It is also a complex public health issue and often preventable with timely intervention. Overall, the rate of suicide is increasing for various reasons. In our study, we use an assoc...
详细信息
Suicide is a major cause of death. It is also a complex public health issue and often preventable with timely intervention. Overall, the rate of suicide is increasing for various reasons. In our study, we use an association rule analysis to find the most important rules to predict suicidal behavior from an available data set. One of the most powerful machine learning algorithms available for identifying associations within databases is the Apriori algorithm. We used this algorithm to analyze association rules of suicidal behavior using a dataset of 1250 instances and 27 impactful features. These include daily activities, family background, and answers to mental questionnaires and have been analyzed to find combinations that are associated with suicidal behavior. The study has resulted in some key rules for human suicidal behavior. The Apriori method has been used to identify the eight most significant rules with the support of 0.25 and the confidence of 0.90.
作者:
Feng, YiGuo, ZizhanChen, QijunFan, RuiThe Department of Control Science & Engineering
The College of Electronics & Information Engineering Shanghai Research Institute for Intelligent Autonomous Systems Shanghai Institute of Intelligent Science and Technology The State Key Laboratory of Intelligent Autonomous Systems Frontiers Science Center for Intelligent Autonomous Systems Tongji University Shanghai201804 China
Unsupervised monocular depth estimation frameworks have shown promising performance in autonomous driving. However, existing solutions primarily rely on a simple convolutional neural network for ego-motion recovery, w...
详细信息
In future demand response scenarios, a multitude of different types of resources are potentially to be used, e.g., electric vehicles, flexible residential loads, and battery storage systems. To solve the problem of re...
详细信息
暂无评论