While monotone operator theory is often studied on Hilbert spaces, many interesting problems in machine learning and optimization arise naturally in finite-dimensional vector spaces endowed with non-Euclidean norms, s...
详细信息
While monotone operator theory is often studied on Hilbert spaces, many interesting problems in machine learning and optimization arise naturally in finite-dimensional vector spaces endowed with non-Euclidean norms, such as diagonally-weighted ℓ1 or ℓ1 norms. This paper provides a natural generalization of monotone operator theory to finitedimensional non-Euclidean spaces. The key tools are weak pairings and logarithmic norms. We show that the resolvent and reected resolvent operators of non-Euclidean monotone mappings exhibit similar properties to their counterparts in Hilbert spaces. Furthermore, classical iterative methods and splitting methods for finding zeros of monotone operators are shown to converge in the non-Euclidean case. We apply our theory to equilibrium computation and Lipschitz constant estimation of recurrent neural networks, obtaining novel iterations and tighter upper bounds via forward-backward splitting.
Software-Defined Networking (SDN) represents a significant shift in network architecture, providing exceptional programmability, flexibility, and simplified management. However, this paradigm shift introduces a unique...
详细信息
ISBN:
(数字)9798331540388
ISBN:
(纸本)9798331540395
Software-Defined Networking (SDN) represents a significant shift in network architecture, providing exceptional programmability, flexibility, and simplified management. However, this paradigm shift introduces a unique set of security challenges that must be addressed to fully realize the potential of SDN. This paper examines the security issues in SDN environments, detailing the threats and vulnerabilities at various layers of the SDN architecture, including the control plane, data plane, and application plane. Through an extensive review of current literature, critical security challenges such as controller attacks, data plane breaches, and vulnerabilities in inter-plane communications are identified. Existing security solutions and mitigation strategies, such as authentication and authorization mechanisms, encryption techniques, and intrusion detection systems, are also explored. Furthermore, the paper discusses recent advances and emerging trends in SDN security, offering insights into ongoing research and future directions. The findings underscore the importance of robust security measures in ensuring the reliability and integrity of SDN deployments, providing a foundation for future innovation and development in this dynamic field.
In traditional research approaches, sensory perception and emotion classification have traditionally been considered separate domains. Yet, the significant influence of sensory experiences on emotional responses is un...
详细信息
It has become evident that pneumatic muscle-based robots are the most compliant of all soft and semi-soft robotic testbeds under investigation, despite the fact that the artificial muscle-based robot is the most chall...
详细信息
This article investigates the I-V hysteresis (IVH) phenomenon in MOSFETs and the factors affecting it. The study focuses on the effects of oxide traps, interface traps, and “border traps” on metal-oxide-semiconducto...
This article investigates the I-V hysteresis (IVH) phenomenon in MOSFETs and the factors affecting it. The study focuses on the effects of oxide traps, interface traps, and “border traps” on metal-oxide-semiconductor devices. The current paper also discusses a comprehensive method for separating the effects of interface traps and trapped oxide charge in metal-oxide-semiconductor transistors. According to the study border traps and bias-temperature instabilities in MOS devices are significant factors affecting IVH. The findings of this study can be useful in the MOSFET design and optimization of for various applications.
The connection of large-scale RES (renewable energy source) to the grid and the increase in the efficiency of energy production also causes different power quality problems. It has become mandatory for these inverter-...
详细信息
ISBN:
(数字)9798331532611
ISBN:
(纸本)9798331532628
The connection of large-scale RES (renewable energy source) to the grid and the increase in the efficiency of energy production also causes different power quality problems. It has become mandatory for these inverter-based systems to participate in load frequency control. For this purpose, the design and simulation of a virtual synchronous generator (VSG), which enables RES to operate like synchronous generators, has been carried out in Matlab/Simulink environment. It is observed that the VSG keeps the load frequency stable according to different load conditions.
The paper deals with the diagnosis of soft faults in linear electronic circuits. Circuits containing operational amplifiers operating at low frequencies are considered. A method for identifying single and double fault...
详细信息
Multi-agent systems(MASs)are typically composed of multiple smart entities with independent sensing,communication,computing,and decision-making ***,MASs have a wide range of applications in smart grids,smart manufactu...
详细信息
Multi-agent systems(MASs)are typically composed of multiple smart entities with independent sensing,communication,computing,and decision-making ***,MASs have a wide range of applications in smart grids,smart manufacturing,sensor networks,and intelligent transportation *** of the MASs are often coordinated through information interaction among agents,which is one of the most important factors affecting coordination and cooperation ***,unexpected physical faults and cyber attacks on a single agent may spread to other agents via information interaction very quickly,and thus could lead to severe degradation of the whole system performance and even destruction of *** paper is concerned with the safety/security analysis and synthesis of MASs arising from physical faults and cyber attacks,and our goal is to present a comprehensive survey on recent results on fault estimation,detection,diagnosis and fault-tolerant control of MASs,and cyber attack detection and secure control of MASs subject to two typical cyber ***,the paper concludes with some potential future research topics on the security issues of MASs.
The electrically evoked compound action potential (ECAP) has been used in various clinical studies and has become a key physiological signal for cochlear implants (CI). This study used four sensing electrodes to recor...
详细信息
ISBN:
(数字)9798350348958
ISBN:
(纸本)9798350348965
The electrically evoked compound action potential (ECAP) has been used in various clinical studies and has become a key physiological signal for cochlear implants (CI). This study used four sensing electrodes to record ECAP signals based on the alternating polarity approach. An electrical field imaging (EFI) result based on the finite element method was used to obtain the interface impedance, then ECAP simulation results were computed and compared with a patient's clinical ECAP measurements. Preliminary modeling results show that the interface impedance obtained by this EFI-based technique can improve the simulation accuracy of the ECAP model. The ECAP modeling result will be compared with clinical ECAP measurements to validate the model in the full paper.
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer an...
详细信息
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer and process trillions and zillions of bytes using the current cloud-device architecture.
暂无评论