This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
Multimodal Sentiment Analysis(SA)is gaining popularity due to its broad application *** existing studies have focused on the SA of single modalities,such as texts or photos,posing challenges in effectively handling so...
详细信息
Multimodal Sentiment Analysis(SA)is gaining popularity due to its broad application *** existing studies have focused on the SA of single modalities,such as texts or photos,posing challenges in effectively handling social media data with multiple ***,most multimodal research has concentrated on merely combining the two modalities rather than exploring their complex correlations,leading to unsatisfactory sentiment classification *** by this,we propose a new visualtextual sentiment classification model named Multi-Model Fusion(MMF),which uses a mixed fusion framework for SA to effectively capture the essential information and the intrinsic relationship between the visual and textual *** proposed model comprises three deep neural *** different neural networks are proposed to extract the most emotionally relevant aspects of image and text ***,more discriminative features are gathered for accurate sentiment ***,a multichannel joint fusion modelwith a self-attention technique is proposed to exploit the intrinsic correlation between visual and textual characteristics and obtain emotionally rich information for joint sentiment ***,the results of the three classifiers are integrated using a decision fusion scheme to improve the robustness and generalizability of the proposed *** interpretable visual-textual sentiment classification model is further developed using the Local Interpretable Model-agnostic Explanation model(LIME)to ensure the model’s explainability and *** proposed MMF model has been tested on four real-world sentiment datasets,achieving(99.78%)accuracy on Binary_Getty(BG),(99.12%)on Binary_iStock(BIS),(95.70%)on Twitter,and(79.06%)on the Multi-View Sentiment Analysis(MVSA)*** results demonstrate the superior performance of our MMF model compared to single-model approaches and current state-of-the-art techniques based on model evaluation cr
This article presents an in-depth exploration of the acoustofluidic capabilities of guided flexural waves(GFWs)generated by a membrane acoustic waveguide actuator(MAWA).By harnessing the potential of GFWs,cavity-agnos...
详细信息
This article presents an in-depth exploration of the acoustofluidic capabilities of guided flexural waves(GFWs)generated by a membrane acoustic waveguide actuator(MAWA).By harnessing the potential of GFWs,cavity-agnostic advanced particle manipulation functions are achieved,unlocking new avenues for microfluidic systems and lab-on-a-chip *** localized acoustofluidic effects of GFWs arising from the evanescent nature of the acoustic fields they induce inside a liquid medium are numerically investigated to highlight their unique and promising *** traditional acoustofluidic technologies,the GFWs propagating on the MAWA’s membrane waveguide allow for cavity-agnostic particle manipulation,irrespective of the resonant properties of the fluidic ***,the acoustofluidic functions enabled by the device depend on the flexural mode populating the active region of the membrane *** demonstrations using two types of particles include in-sessile-droplet particle transport,mixing,and spatial separation based on particle diameter,along with streaming-induced counter-flow virtual channel generation in microfluidic PDMS *** experiments emphasize the versatility and potential applications of the MAWA as a microfluidic platform targeted at lab-on-a-chip development and showcase the MAWA’s compatibility with existing microfluidic systems.
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware *** study provides a new approach for RaaS attack detection which uses an ensemble of deep learning *** this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is *** the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are ***,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested *** proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%*** empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual *** expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
In computer vision applications like surveillance and remote sensing,to mention a few,deep learning has had considerable *** imaging still faces a number of difficulties,including intra-class similarity,a scarcity of ...
详细信息
In computer vision applications like surveillance and remote sensing,to mention a few,deep learning has had considerable *** imaging still faces a number of difficulties,including intra-class similarity,a scarcity of training data,and poor contrast skin lesions,notably in the case of skin *** optimisation-aided deep learningbased system is proposed for accurate multi-class skin lesion *** sequential procedures of the proposed system start with preprocessing and end with *** preprocessing step is where a hybrid contrast enhancement technique is initially proposed for lesion identification with healthy *** of flipping and rotating data,the outputs from the middle phases of the hybrid enhanced technique are employed for data augmentation in the next ***,two pre-trained deep learning models,MobileNetV2 and NasNet Mobile,are trained using deep transfer learning on the upgraded enriched ***,a dual-threshold serial approach is employed to obtain and combine the features of both *** next step was the variance-controlled Marine Predator methodology,which the authors proposed as a superior optimisation *** top features from the fused feature vector are classified using machine learning *** experimental strategy provided enhanced accuracy of 94.4%using the publicly available dataset ***,the proposed framework is evaluated compared to current approaches,with remarkable results.
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
Neural networks have become a leading model in modern machine learning, able to model even the most complex data. For them to be properly trained, however, a lot of computational resources are required. With the carbo...
详细信息
Within the electronic design automation(EDA) domain, artificial intelligence(AI)-driven solutions have emerged as formidable tools, yet they typically augment rather than redefine existing methodologies. These solutio...
详细信息
Within the electronic design automation(EDA) domain, artificial intelligence(AI)-driven solutions have emerged as formidable tools, yet they typically augment rather than redefine existing methodologies. These solutions often repurpose deep learning models from other domains, such as vision, text, and graph analytics, applying them to circuit design without tailoring to the unique complexities of electronic circuits. Such an “AI4EDA” approach falls short of achieving a holistic design synthesis and understanding,overlooking the intricate interplay of electrical, logical, and physical facets of circuit data. This study argues for a paradigm shift from AI4EDA towards AI-rooted EDA from the ground up, integrating AI at the core of the design process. Pivotal to this vision is the development of a multimodal circuit representation learning technique, poised to provide a comprehensive understanding by harmonizing and extracting insights from varied data sources, such as functional specifications, register-transfer level(RTL) designs, circuit netlists,and physical layouts. We champion the creation of large circuit models(LCMs) that are inherently multimodal, crafted to decode and express the rich semantics and structures of circuit data, thus fostering more resilient, efficient, and inventive design methodologies. Embracing this AI-rooted philosophy, we foresee a trajectory that transcends the current innovation plateau in EDA, igniting a profound “shift-left” in electronic design methodology. The envisioned advancements herald not just an evolution of existing EDA tools but a revolution, giving rise to novel instruments of design-tools that promise to radically enhance design productivity and inaugurate a new epoch where the optimization of circuit performance, power, and area(PPA) is achieved not incrementally, but through leaps that redefine the benchmarks of electronic systems' capabilities.
Amidst rising distributed generation and its potential role in grid management, this article presents a new realistic approach to determine the operational space and flexibility potential of an unbalanced active distr...
详细信息
暂无评论