Iterative learning control demands the same initial state in each iteration, which is equal to the desired state. But this condition is unattainable in practice. This paper addresses the problem of some fixed initial ...
详细信息
ISBN:
(纸本)9781509054626
Iterative learning control demands the same initial state in each iteration, which is equal to the desired state. But this condition is unattainable in practice. This paper addresses the problem of some fixed initial state in iterative learning control for high-order nonlinear system. It presents a new control algorithm. In the process of tracking, this algorithm can rectify the initial errors through a step-by-step rectifying controller. The controller rectifies the xn at first, then xn-1 after finishing the rectifying actions of xn, and so on. All of these rectifying actions are finished in a small interval. Furthermore, the algorithm has shown effective in the improvement of tracking performance through simulation.
The fabrication and characterization of the first magnetoelectric sensors utilizing arrays of Janus magnetoelectric composite nanowires composed of barium titanate and cobalt ferrite are *** utilizing magnetoelectric ...
详细信息
The fabrication and characterization of the first magnetoelectric sensors utilizing arrays of Janus magnetoelectric composite nanowires composed of barium titanate and cobalt ferrite are *** utilizing magnetoelectric nanowires suspended across electrodes above the substrate,substrate clamping is reduced when compared to layered thin-film architectures;this results in enhanced magnetoelectric *** magnetoelectric nanowires are fabricated by sol–gel electrospinning,and their length is controlled through the electrospinning and calcination *** a directed nanomanufacturing approach,the nanowires are then assembled onto pre-patterned metal electrodes on a silicon substrate using *** this process,functional magnetic field sensors are formed by connecting many nanowires in *** observed magnetic field sensitivity from the parallel array of nanowires is 0.514±.027mV Oe^(−1) at 1 kHz,which translates to a magnetoelectric coefficient of 514±27mV cm^(−1) Oe^(−1).
In this paper,we study the problem,of calculating the minimum collision distance between two planar convex polygons when one of them moves to another along a given ***,several novel concepts and properties are explore...
详细信息
In this paper,we study the problem,of calculating the minimum collision distance between two planar convex polygons when one of them moves to another along a given ***,several novel concepts and properties are explored,then an optimal algorithm OPFIV with time complexity O(log(n+m))is developed and its correctness and optimization are proved rigorously.
Cloud computing opens the door of a new paradigm where it is possible to provide service using Internet thus removing the barrier of limited hardware configuration(i.e., processing and storage) of the mobile device. E...
详细信息
ISBN:
(纸本)9781450352895
Cloud computing opens the door of a new paradigm where it is possible to provide service using Internet thus removing the barrier of limited hardware configuration(i.e., processing and storage) of the mobile device. Edge cloud computing is an emerging field within the Cloud computing paradigm where the server is situated at the edge of the network instead of a distant centralized data center to reduce latency. In this paper, the processing time of the face recognition system in the edge server has been measured and compared with the smartphone. The experimental results demonstrate that face recognition at the edge server performs comparably faster and it scales up better as the number of faces increases in the test image data set.
In this paper,we propose a floorplan-driven highlevel synthesis algorithm utilizing both volatile and non-volatile registers for hybrid energy-harvesting *** our algorithm,we firstly introduce an idea of safety line *...
详细信息
ISBN:
(纸本)9781509066261;9781509066254
In this paper,we propose a floorplan-driven highlevel synthesis algorithm utilizing both volatile and non-volatile registers for hybrid energy-harvesting *** our algorithm,we firstly introduce an idea of safety line *** on them,we perform safety-line(SL) scheduling so that every operation does not cross the safety line candidates and then perform volatile/non-volatile register binding so that all the data crossing the safety line candidates are stored into non-violate *** can safely restore all the data and re-start the circuit operation from every safety line candidate,even if the power shut-off occurs while running the *** results show that our algorithm reduces average latency by 30.76%and the average energy consumption by 24.94% compared to the naive algorithm when sufficient energy is given(normal mode).Experimental results also show that our algorithm reduces average latency by 30.58% compared to the naive algorithm by reducing rollback execution if a small amount of energy is given(energy-harvesting mode).
Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information *** paper describes an information leakage detection system( ILDS) to detect sensitive informat...
详细信息
Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information *** paper describes an information leakage detection system( ILDS) to detect sensitive information leakage caused by *** particular,the principles of the system are based on the analysis of net-flows in four perspectives: heartbeat behavior analysis,DNS abnormal analysis,uploaddownload ratio and content *** behavior analysis and DNS abnormal analysis are used to detect the existence of Trojans while upload-download ratio and content analysis can quickly detect when the information leakage *** indicate that the system is reliable and efficient in detecting information *** system can also help to collect and preserve digital evidence when information leakage incident occurs.
As per Indian medical survey reports, MNC employees spend more than 1000 kilocalories of energy stored in their body. This is due to the different official timings and heavy working hours. So, it leads to various heal...
详细信息
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple...
详细信息
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users,and even return the top-k most relevant search results when *** refer to a model that satisfies all of the conditions a 3-multi ranked search ***,SE schemes that have been proposed to date use fully trusted trapdoor generation centers,and several methods assume a secure connection between the data users and a trapdoor generation *** is,they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords,but it will never attempt to use it in any other manner than that requested,which is impractical in real *** this study,to enhance the security,we propose a new 3-multi ranked SE scheme that satisfies all conditions without these security *** proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center,thereby preventing attackers from determining whether two different queries include the same ***,we develop a method for managing multiple encrypted keywords from every data owner,each encrypted with a different *** evaluation demonstrates that,despite the trade-off overhead that results from the weaker security assumption,the proposed scheme achieves reasonable performance compared to extant schemes,which implies that our scheme is practical and closest to real life.
The research of micro-forces between micro-parts forms the base for micro-machine (MEMS) development. According to the characteristics of the interactions between micro-parts in MEMS, three models were simplified. Bas...
详细信息
The research of micro-forces between micro-parts forms the base for micro-machine (MEMS) development. According to the characteristics of the interactions between micro-parts in MEMS, three models were simplified. Based on these models, micro-forces between micro-parts were analyzed, and the analytical formulas were formulated. Factors which may affect the micro-forces, such as surface condition, media and constitutive material of micro-parts were discussed. A coefficient of surface roughness on micro-forces was introduced, which facilitated the analysis of the influence of surface roughness.
To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and u...
详细信息
To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and user behaviors. The method extracts information from the log analysis of submitted packets using the algorithm which depends on the definition of the intrusion. Large itemsets were extracted to represent the super facts to build the association analysis for the intrusion. Network data files were analysed for experiments. The analysis and experimental results are encouraging with better performance as packet frequency number increases.
暂无评论