In this study a cascade controller is proposed to maintain the Automatic Voltage Regulator (AVR) system, its comprises from two stage the first one is a conventional Proportional and Derivative (PD) controller and the...
详细信息
In this paper we focus on the target capturing problem for a swarm of agents modelled as double integrators in any finite space *** agent knows the relative position of the target and has only an estimation of its vel...
详细信息
In this paper we focus on the target capturing problem for a swarm of agents modelled as double integrators in any finite space *** agent knows the relative position of the target and has only an estimation of its velocity and *** that the estimation errors are bounded by some known values,it is possible to design a control law that ensures that agents enter a user-defined ellipsoidal ring around the moving *** know the relative position of the other members whose distance is smaller than a common detection ***,in the case of no uncertainty about target data and homogeneous agents,we show how the swarm can reach a static configuration around the moving *** simulations are reported to show the effectiveness of the proposed strategy.
Proximate analysis of coal indicates the moisture, ash, volatile content, and calorific value, which has been widely utilized as the basis for coal characterization. It involves heating the coal under various conditio...
详细信息
Proximate analysis of coal indicates the moisture, ash, volatile content, and calorific value, which has been widely utilized as the basis for coal characterization. It involves heating the coal under various conditions until a constant weight is obtained. Although it is a relatively simple process that does not require expensive analytical equipment, determining these characteristics is time consuming. An alternative way for proximate analysis is spectral analysis in combination with various machine learning methods. However, most previous works analyze individual characteristics and fail to explore the relationship among them. In this study, we propose a method for proximate analysis based on near-infrared spectroscopy and a multioutput attention Unet (MOA-Unet), which can predict multiple characteristics simultaneously. First, an attention-based Unet is designed as the shared feature extraction subnetwork, including an encoder, a decoder, convolutional block attention modules, and multiscale feature fusion modules, which can improve the representation power of the U-shape network through aggregating features of shallower layers and concatenating features of deeper layers. Second, four individual subnetworks with fully connected layers, designed for four outputs, are utilized for regressing those four characteristics. We employ the gradient normalization algorithm to alleviate the gradient magnitude masking effect caused by training imbalance among different tasks. The proposedMOA-Unet is compared with classical chemometric methods on 670 coal samples from on-site *** experimental results demonstrate that the proposedmodel achieves state-of-the-art performance with correlation coefficients of 0.9015, 0.9538, 0.8986, and 0.8884, corresponding to moisture, ash, volatile content, and calorific value, respectively. Impact Statement-The proximate analysis of coal has been widely utilized as the basis for determining the rank of coal which is in connection with coa
Emerging technologies of today are altering the way we think about the built environment. In the meantime, many technologies have undergone revolutionary changes, and India, an expanding nation, offers opportunities f...
详细信息
Erasable itemset mining is one of the most well-known methods in data mining for optimizing limited materials. After mining erasable itemsets, the manager can rearrange the production plan effectively. However, in rea...
详细信息
In this paper, we consider a computationally efficient learning-based control mechanism dealing with dense reward processing for a zero-sum game. The problem has been formulated as the online learning of the Nash equi...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix suc...
详细信息
Software is a crucial component in the communication systems,and its security is of paramount ***,it is susceptible to different types of attacks due to potential ***,significant time and effort is required to fix such *** propose an automated program repair method based on controlled text generation ***,we utilize a fine-tuned language model for patch generation and introduce a discriminator to evaluate the generation process,selecting results that contribute most to vulnerability ***,we perform static syntax analysis to expedite the patch verification *** effectiveness of the proposed approach is validated using QuixBugs and Defects4J datasets,demonstrating significant improvements in generating correct patches compared to other existing methods.
Presently, advanced humanoid robotic arms have the ability to work independently, and although most current research can make the robotic arm react appropriately and autonomously to the changing environment, it cannot...
详细信息
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blo...
详细信息
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blockchain-enabled manufacturing collaboration framework is proposed, with a focus on the production capacity matching problem for blockchainbased peer-to-peer(P2P) collaboration. First, a digital model of production capacity description is built for trustworthy and transparent sharing over the blockchain. Second, an optimization problem is formulated for P2P production capacity matching with objectives to maximize both social welfare and individual benefits of all participants. Third, a feasible solution based on an iterative double auction mechanism is designed to determine the optimal price and quantity for production capacity matching with a lack of personal information. It facilitates automation of the matching process while protecting users' privacy via blockchainbased smart contracts. Finally, simulation results from the Hyperledger Fabric-based prototype show that the proposed approach increases social welfare by 1.4% compared to the Bayesian game-based approach, makes all participants profitable,and achieves 90% fairness of enterprises.
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
暂无评论