Spiking neural networks (SNNs) are powerful models of spatiotemporal computation and are well suited for deployment on resource-constrained edge devices and neuromorphic hardware due to their low power consumption. Le...
详细信息
Controlling an active distribution network(ADN)from a single PCC has been advantageous for improving the performance of coordinated Intermittent RESs(IRESs).Recent studies have proposed a constant PQ regulation approa...
详细信息
Controlling an active distribution network(ADN)from a single PCC has been advantageous for improving the performance of coordinated Intermittent RESs(IRESs).Recent studies have proposed a constant PQ regulation approach at the PCC of ADNs using coordination of non-MPPT based ***,due to the intermittent nature of DGs coupled with PCC through uni-directional broadcast communication,the PCC becomes vulnerable to transient *** address this challenge,this study first presents a detailed mathematical model of an ADN from the perspective of PCC regulation to realize rigidness of PCC against ***,an H_(∞)controller is formulated and employed to achieve optimal performance against disturbances,consequently,ensuring the least oscillations during transients at ***,an eigenvalue analysis is presented to analyze convergence speed limitations of the newly derived system ***,simulation results show the proposed method offers superior performance as compared to the state-of-the-art methods.
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
Millimeter-wave (mmWave) communication systems utilize narrow beamforming to ensure adequate signal power. However, beam alignment requires significant training overhead, especially in high mobility scenarios. Previou...
详细信息
Solar radiation plays a critical role in the carbon sequestration processes of terrestrial ecosystems, making it a key factor in environmental sustainability among various renewable energy sources. This study integrat...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption *** findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective *** encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit *** planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant *** subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance *** auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted *** results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical *** a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted ***,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,***,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach.
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
Coverage holes pose critical challenges to reliability of wireless networks and their quality of service (QoS) and therefore should be avoided in the coverage design. In this paper, we address this issue through the d...
详细信息
Deep learning has significantly advanced image processing in the medical domain, including the analysis of ultrasound (US) fetal images for prediction of fetal growth retardation. Before analysis of fetal images there...
详细信息
Gaining accurate channel state information (CSI) through a low-cost scheme has always been difficult in wireless communication systems. One of the current research directions is to obtain the CSI from the channel know...
详细信息
暂无评论