Purpose: x-separation is an advanced quantitative susceptibility mapping (QSM) method that is designed to generate paramagnetic (xpara) and diamagnetic (|xdia|) susceptibility maps, reflecting the distribution of iron...
详细信息
This paper investigates the problem of maximizing social power for a group of agents, who participate in multiple meetings described by independent Friedkin-Johnsen models. A strategic game is obtained, in which the a...
详细信息
ISBN:
(数字)9783907144107
ISBN:
(纸本)9798331540920
This paper investigates the problem of maximizing social power for a group of agents, who participate in multiple meetings described by independent Friedkin-Johnsen models. A strategic game is obtained, in which the action of each agent (or player) is her stubbornness over all the meetings, and the payoff is her social power on average. It is proved that, for all but some strategy profiles on the boundary of the feasible action set, each agent's best response is the solution of a convex optimization problem. Furthermore, even with the non-convexity on boundary profiles, if the underlying networks are given by a fixed complete graph, the game has a unique Nash equilibrium. For this case, the best response of each agent is analytically characterized, and is achieved in finite time by a proposed algorithm.
In this work, soft actuators made of shape memory polymers (SMPs) are used to actuate and control a solar tracker in response to heat generated by sunlight. To achieve this, a thermo-mechanical design of a solar track...
详细信息
Alternative polyadenylation(APA)is a crucial step in post-transcriptional *** bioinformatic studies have mainly focused on the recognition of polyadenylation sites(PASs)in a given genomic sequence,which is a binary cl...
详细信息
Alternative polyadenylation(APA)is a crucial step in post-transcriptional *** bioinformatic studies have mainly focused on the recognition of polyadenylation sites(PASs)in a given genomic sequence,which is a binary classification ***,computational methods for predicting the usage level of alternative PASs in the same gene have been ***,all of them cast the problem as a non-quantitative pairwise comparison task and do not take the competition among multiple PASs into *** address this,here we propose a deep learning architecture,Deep Regulatory Code and Tools for Alternative Polyadenylation(DeeReCT-APA),to quantitatively predict the usage of all alternative PASs of a given *** accommodate different genes with potentially different numbers of PASs,DeeReCT-APA treats the problem as a regression task with a variable-length *** on a convolutional neural network-long short-term memory(CNN-LSTM)architecture,DeeReCT-APA extracts sequence features with CNN layers,uses bidirectional LSTM to explicitly model the interactions among competing PASs,and outputs percentage scores representing the usage levels of all PASs of a *** addition to the fact that only our method can quantitatively predict the usage of all the PASs within a gene,we show that our method consistently outperforms other existing methods on three different tasks for which they are trained:pairwise comparison task,highest usage prediction task,and ranking ***,we demonstrate that our method can be used to predict the effect of genetic variations on APA patterns and sheds light on future mechanistic understanding in APA *** code and data are available at https://***/lzx325/DeeReCT-APA-repo.
Integrated space-air-ground (ISAG) networks have emerged as a promising technology for next-generation commu-nication networks, which demand higher throughput and wider coverage. However, several challenges must be ad...
Integrated space-air-ground (ISAG) networks have emerged as a promising technology for next-generation commu-nication networks, which demand higher throughput and wider coverage. However, several challenges must be addressed, such as wireless resource and interference management, transmit power control, and optimal deployment of unmanned aerial vehicles (UAV s) to achieve higher throughput. To this end, in this paper, we propose the joint transmit power control and the deployment UAV problem in the ISAG network to maximize the sum-rate of devices while guaranteeing the minimum rate requirement of each device and the wireless backhaul link constraints between UAV s and the satellite. However, solving the resulting problem is challenging since it has a non-convex structure. As a solution, we propose to decompose the problem into two subproblems. We then transform the decomposed subproblems into convex forms and solve them using successive convex approximation (SCA). Finally, we conduct extensive simulations to show the effectiveness of the proposed method, and the numerical results show that the proposed method achieves a performance gain: up to 8.35%, and 4.08% in comparison to FPA and C-UAVs schemes.
Secondary control of voltage magnitude and frequency is essential to the stable and secure operation of microgrids (MGs). Recent years have witnessed an increasing interest in developing secondary controllers based on...
Secondary control of voltage magnitude and frequency is essential to the stable and secure operation of microgrids (MGs). Recent years have witnessed an increasing interest in developing secondary controllers based on multi-agent reinforcement learning (MARL), in order to replace existing model-based controllers. Nonetheless, unlike the vulnerabilities of model-based controllers, the vulnerability of MARLbased MG secondary controllers has so far not been addressed. In this paper, we investigate the vulnerability of MARL controllers to false data injection attacks (FDIAs). Based on a formulation of MG secondary control as a partially observable stochastic game (POSG), we propose to formulate the problem of computing FDIAs as a partially observable Markov decision process (POMDP), and we use state-of-the-art RL algorithms for solving the resulting problem. Based on extensive simulations of a MG with 4 distributed generators (DGs), our results show that MARL-based secondary controllers are more resilient to FDIAs compared to state of the art model-based controllers, both in terms of attack impact and in terms of the effort needed for computing impactful attacks. Our results can serve as additional arguments for employing MARL in future MG control.
In recent years, discontinuous Galerkin time-domain (DGTD) method has found widespread use in computational electromagnetics [1]-[2]. This is due to the fact that it combines the advantages of finite-element and finit...
详细信息
作者:
Chen, RuiBagci, Hakan
Division of Computer Electrical and Mathematical Science and Engineering Thuwal23955-6900 Saudi Arabia
The internal resonance problem pertinent to time domain surface integral equations (SIEs) for analyzing transient acoustic scattering from penetrable objects is investigated. The first equation considered here is cons...
详细信息
Efficient job scheduling and resource management contributes towards system throughput and efficiency maximization in high-performance computing (HPC) systems. In this paper, we introduce a scalable job scheduling and...
详细信息
With the continuous development of social economy, the application market of electric motors has become more and more broad. Based on the principle of modular design, this paper designs the hardware circuit system of ...
详细信息
暂无评论