In general, ophthalmologists visually grade the state of a patient by counting the cells within the anterior chamber OCT image. The manual cell counting method is highly inaccurate and spends a lot of time to determin...
详细信息
The 18th IEEE International Conference on software Architecture (ICSA 2021) solicited different types of submissions structured into the following tracks: The main Technical Track (included in the ICSA main proceeding...
Vector averaging remains one of the most popular sentence embedding methods in spite of its obvious disregard for syntactic structure. While more complex sequential or convolu-tional networks potentially yield superio...
详细信息
This paper studies the problem of designing robust model predictive control (RMPC) for four-wheel independently driven electric vehicles (FWIDEV) using differential speed steering. The nonlinear dynamic model of the e...
详细信息
ISBN:
(数字)9781728163031
ISBN:
(纸本)9781728163048
This paper studies the problem of designing robust model predictive control (RMPC) for four-wheel independently driven electric vehicles (FWIDEV) using differential speed steering. The nonlinear dynamic model of the electric vehicle is recast as a linear time-varying polytopic uncertain system. An important issue for this controller is the recursive solution for the lateral stabilisation of the uncertain system without the need for conventional steering. Consequently, based on the developed predictive model for the FWIDEV, sufficient conditions for the existence of an RMPC are given in terms of linear matrix inequalities (LMI) constraints, importantly, the stability conditions of the closed loop systems are also explained. Lastly, the proposed RMPC design shows strong disturbance attenuation and robustness for the uncertain system. The simulation results have also supported the proposed design as compared with a custom Matlab solver and other LMI designs.
The high availability of genome sequencing data and advancement in data mining stimulate the progress of biomedical breakthroughs and the hope of personalized medicine. Meanwhile, the popularity of personalized and co...
详细信息
ISBN:
(数字)9781728141213
ISBN:
(纸本)9781728141220
The high availability of genome sequencing data and advancement in data mining stimulate the progress of biomedical breakthroughs and the hope of personalized medicine. Meanwhile, the popularity of personalized and commercialized genome testing brings about increasing privacy concerns. Moreover, personal genomic data is a kind of Big Data, sensitive and highly correlated among relative by blood. Therefore, it is challenging to quantitatively evaluate the risks of kin genomic data privacy. To address this problem, we construct a genome data model to capture the characteristics of kin genomic data. Besides, we develop an inference attack method by operating belief propagation on a factor graph.
Support Vector machine (SVM) is a linear model designed for classification problem and popular due to a number of their attractive features such as high generalization ability and promising performance. However, the h...
详细信息
In recent times, Wireless Sensor Networks (WSNs) are broadly utilized in targeted monitoring applications. Traditional target coverage techniques usually consider that environment is known completely and every target ...
详细信息
In sensitive areas such as battlefields, a Wireless Sensor Network (WSN) is especially in military and civilian applications and it is of utmost importance to develop security in these networks. In various respects, t...
In sensitive areas such as battlefields, a Wireless Sensor Network (WSN) is especially in military and civilian applications and it is of utmost importance to develop security in these networks. In various respects, this can improve the quality of life. But to be used for protection reasons in multiple situations such as implementation. There is a high risk of being exposed to multiple viruses and hacking attacks. Unauthorized APs for information protection needs to be detected. Any malicious attacks against these networks, Like Sybil Attack leads to breach of security by enacting as a node that illegitimately declares several false identities at the same time. This misleads valid nodes, and they presume each of those identifiers as actual independent nodes by accident. Thus we proposed a machine learning model to detect Sybil attack in network where rawtraffic data has been collected and is used identify authorized and unauthorized APs in an integrated wired/wireless environment.
Accurate modeling of boundary conditions is an important aspect in room acoustic simulations. It has been shown that the acoustics of rooms is not only dependent on the frequency characteristic of the complex boundary...
详细信息
software project management has main role in the software industry. It includes different processes and knowledge areas. The triple constraint of the software project like time, cost and scope is directly dependent on...
详细信息
software project management has main role in the software industry. It includes different processes and knowledge areas. The triple constraint of the software project like time, cost and scope is directly dependent on the requirement of the project. Agile methodology is the iterative way for developing the software project for frequent changes, fast delivery and reduce risk. software project management also plays important role in agile based software project. Agile methodology influence software project management at 10 knowledge areas. In this study we carried out survey from different software companies and it shows that almost every software company uses agile development (Scrum) and has a positive impact on the software project management.
暂无评论