This study addresses the fixed-time-synchronized control problem of perturbed multi-input multioutput(MIMO) systems. In the task of fixed-time-synchronized control, different dimensions of the output signal in MIMO sy...
详细信息
This study addresses the fixed-time-synchronized control problem of perturbed multi-input multioutput(MIMO) systems. In the task of fixed-time-synchronized control, different dimensions of the output signal in MIMO systems are required to reach the desired value simultaneously within a fixed time *** MIMO system is categorized into two cases: the input-dimension-dominant and the state-dimensiondominant cases. The classification is defined according to the dimension of system signals and, more importantly, the capability of converging at the same time. For each kind of MIMO system, sufficient Lyapunov conditions for fixed-time-synchronized convergence are explored, and the corresponding robust sliding mode controllers are designed. Moreover, perturbations are compensated using the super-twisting technique. The brake control of the vertical takeoff and landing aircraft is considered to verify the proposed method for the input-dimension-dominant case, which shows the essential advantages of decreasing the energy consumption and the output trajectory length. Furthermore, comparative numerical simulations are performed to show the semi-time-synchronized property for the state-dimension-dominant case.
Tool condition monitoring is vital for enhancing productivity, reducing costs, and improving product quality in manufacturing industries. Existing approaches, such as threshold-based methods, sensor-based methods, and...
详细信息
This paper examines the Uber data breach of September 2022, where the Lapsus$ group exploited multi-factor authentication (MFA) fatigue to compromise contractor credentials. The attackers gained access to internal sys...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix suc...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix such *** propose an automated program repair method based on controlled text generation ***,we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process,selecting results that contribute most to vulnerability ***,we perform static syntax analysis to expedite the patch verification *** effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets,demonstrating significant improvements in generating correct patches compared to other existing methods.
With the rapid development of Large Language Model (LLM) technology, it has become an indispensable force in biomedical data analysis research. However, biomedical researchers currently have limited knowledge about LL...
详细信息
The purpose of this article is to tackle with the problem of data-driven robust control of multi-input multi-output discrete-time nonlinear plants under tracking error constraints and output perturbations. Thereby, ba...
详细信息
This article presents an innovative approach that leverages interpretable machine learning models and cloud computing to accelerate the detection of septic shock by analyzing electronic health *** traditional methods,...
详细信息
This article presents an innovative approach that leverages interpretable machine learning models and cloud computing to accelerate the detection of septic shock by analyzing electronic health *** traditional methods,which often lack transparency in decision-making,our approach focuses on early detection,offering a proactive strategy to mitigate the risks of *** integrating advanced machine learning algorithms with interpretability techniques,our method not only provides accurate predictions but also offers clear insights into the factors influencing the model’s ***,we introduce a preference-based matching algorithm to evaluate disease severity,enabling timely interventions guided by the analysis *** innovative integration significantly enhances the effectiveness of our *** leverage a clinical health dataset comprising 1,552,210 Electronic Health Records(EHR)to train our interpretable machine learning models within a cloud computing *** techniques like feature importance analysis and model-agnostic interpretability tools,we aim to clarify the crucial indicators contributing to septic shock *** transparency not only assists healthcare professionals in comprehending the model’s predictions but also facilitates the integration of our system into existing clinical *** validate the effectiveness of our interpretable models using the same dataset,achieving an impressive accuracy rate exceeding 98%through the application of oversampling *** findings of this study hold significant implications for the advancement of more effective and transparent diagnostic tools in the critical domain of sepsis management.
Erasable itemset mining is one of the most well-known methods in data mining for optimizing limited materials. After mining erasable itemsets, the manager can rearrange the production plan effectively. However, in rea...
详细信息
Human activities represent a major source of information for smart home automation. While performing their daily activities, humans trigger sensors producing measurements that flow into a sensor log. Vast majority of ...
详细信息
Pneumonia is one of the top causes of death in Romania and early detection of this disease improves the recovery chances and shortens the length of hospitalization. In this work, we develop a solution for automatic pn...
详细信息
暂无评论