This paper presents an encoder-decoder neural network based solution for both subtasks of the CoNLL–SIGMORPHON 2018 Shared Task: Universal Morphological Reinflection. All of our models are sequence-to-sequence neural...
详细信息
In this paper CRNs containing linear reaction chains with multiple joint complexes were considered in order to obtain an equivalent reduced order delayed CRN model with distributed time delays. For this purpose, our e...
详细信息
In this paper CRNs containing linear reaction chains with multiple joint complexes were considered in order to obtain an equivalent reduced order delayed CRN model with distributed time delays. For this purpose, our earlier method (Lipták and Hangos (2018)) for decomposing the chains of linear reactions with multiple joint complexes was used together with the "linear chain trick". An analytical expression for the kernel function of the distributed delay was also derived from the reaction rate coefficients of the linear reaction chains. Our approach was demonstrated using the example of the well known McKeithan’s network model of kinetic proofreading.
In this paper, we consider a secure distributed filtering problem for linear time-invariant systems with bounded noises and unstable dynamics under compromised observations. A malicious attacker is able to compromise ...
详细信息
ISBN:
(数字)9781728113982
ISBN:
(纸本)9781728113999
In this paper, we consider a secure distributed filtering problem for linear time-invariant systems with bounded noises and unstable dynamics under compromised observations. A malicious attacker is able to compromise a subset of the agents and manipulate the observations arbitrarily. We first propose a recursive distributed filter consisting of two parts at each time. The first part employs a saturation-like scheme, which gives a small gain if the innovation is too large. The second part is a consensus operation of state estimates among neighboring agents. A sufficient condition is then established for the boundedness of estimation error, which is with respect to network topology, system structure, and the maximal compromised agent subset. We further provide an equivalent statement, which connects to 2s-sparse observability in the centralized framework in certain scenarios, such that the sufficient condition is feasible. Numerical simulations are finally provided to illustrate the developed results.
—Internet of things (IoT) is powering up smart cities by connecting all kinds of electronic devices. The power supply problem of IoT devices constitutes a major challenge in current IoT development, due to the poor b...
详细信息
The distributed nonconvex optimization problem of minimizing a global cost function formed by a sum of n local cost functions by using local information exchange is considered. This problem is an important component o...
详细信息
This paper presents a control solution for the optimal network selection problem in 5G heterogeneous networks. The control logic proposed is based on multi-agent Friend-or-Foe Q-Learning, allowing the design of a dist...
ISBN:
(数字)9781728151786
ISBN:
(纸本)9781728151793
This paper presents a control solution for the optimal network selection problem in 5G heterogeneous networks. The control logic proposed is based on multi-agent Friend-or-Foe Q-Learning, allowing the design of a distributed control architecture that sees the various access points compete for the allocation of the connection requests. Numerical simulations validate conceptually the approach, developed in the scope of the EU-Korea project 5G-ALLSTAR.
Tablet manufacturing in the pharmaceutical industry involves batch fluidized bed drying for particle moisture removal. This paper introduces five approaches for moisture content monitoring, relying either on a complex...
详细信息
Tablet manufacturing in the pharmaceutical industry involves batch fluidized bed drying for particle moisture removal. This paper introduces five approaches for moisture content monitoring, relying either on a complex phenomenological model or its simplified version. The first two soft sensors consist of open-loop estimators, i.e. they simply simulate the models fed by the manipulated variables. Three closed-loop moving horizon estimators based on the simplified model are also proposed for improved robustness. In the first one, the measurements of the inlet gas and particle temperatures feed back the soft sensor. The last two closed-loop observers additionally can take into account infrequent delayed moisture content measurements, such as at-line loss on drying analysis. A validation of the soft sensors is performed with experimental data collected on a pilot scale fluidized bed dryer. Results show that the closed-loop observer with the delayed moisture content measurements still has an accuracy that is equivalent (and sometimes better) than the complex phenomenological model.
The semantic segmentation of point clouds is an important part of the environment perception for robots. However, it is difficult to directly adopt the traditional 3D convolution kernel to extract features from raw 3D...
详细信息
This paper investigates all kinds of access entrance guard control systems at home and abroad and analyzes their advantages and disadvantages. COVID-19 epidemic has a serious impact on life, travel must wear a mask, s...
This paper investigates all kinds of access entrance guard control systems at home and abroad and analyzes their advantages and disadvantages. COVID-19 epidemic has a serious impact on life, travel must wear a mask, so that the access entrance guard control system can not carry out face recognition under the mask. In view of this kind of situation, an embedded face recognition access entrance guard control system with mask based on EAIDK-310 development board is designed. The system can complete face recognition and body temperature measurement without contact, and drive the motor to open the gate. After testing, the system is suitable for deployment in companies, communities, campuses and other small application scenarios. It is convenient to travel and can reduce the impact of the epidemic.
Using Maximum Likelihood (or Prediction Error) methods to identify linear state space model is a prime technique. The likelihood function is a nonconvex function and care must be exercised in the numerical maximizatio...
详细信息
暂无评论