This paper studies the global asymptotic stabilization of passive nonlinear systems with finite, countable control actions. We show that for nonlinear passive systems that are large-time norm observable and admit a fi...
详细信息
ISBN:
(数字)9783907144107
ISBN:
(纸本)9798331540920
This paper studies the global asymptotic stabilization of passive nonlinear systems with finite, countable control actions. We show that for nonlinear passive systems that are large-time norm observable and admit a finite control input set whose convex hull contains the origin, the origin can be globally asymptotically stabilized and locally exponentially stabilized by means of relaxed control and nearest-action control approaches. In particular, we improve on a recent result of practical stabilization via nearest-action control by utilizing switching controllers that can synthesize extra control actions from an existing control input set. Three switching methodologies are proposed to enlarge the control set and enable global asymptotic and local exponential stabilization. These three methodologies vary in the cardinality of the expanded control set. These methods are validated in numerical simulations where a comparison of the convergence rate is provided.
Distribution system plays an important role in supplying consumers with electric energy. Due to their structural complexity, these systems have always had difficulties in locating faults for faster restoration. Restor...
详细信息
This study is about developing sentiment analysis and classification method for Amazon Alexa products based on the rating and feedback given by customers. The purpose of the method is to investigate the polarity of po...
详细信息
In parallel and distributed communication networks, task scheduling is essential for attaining the best system performance. Innovative ways that may intelligently distribute computing resources while minimizing energy...
详细信息
In this paper, we present an architecture for the deployment of an edge computing system based on Named Data Networking (NDN) as part of a private 5G network. Our proposed architecture integrates IP-based and non-IP-b...
详细信息
ISBN:
(数字)9798331508050
ISBN:
(纸本)9798331508067
In this paper, we present an architecture for the deployment of an edge computing system based on Named Data Networking (NDN) as part of a private 5G network. Our proposed architecture integrates IP-based and non-IP-based components using the W3C Web of Things (WoT) standards, including a Thing Description Directory (TDD). Our results highlight the potential of both edge computing and WoT concepts for private 5G deployments but also reveal several standardization gaps that need to be closed to make effective use of the new technologies.
In this paper we consider a system of one macro diversity SC receiver (MD SC) and two micro MRC (mD MRC) receivers, operating in a Nakagami-m multipath environment with gamma shadowing. The combination of the maximum ...
详细信息
Europe, with all its common sights, has an enviable wealth of history and cultural heritage. With its many monuments, sites, traditions, history, art, and culture, it has always attracted curious views and tells centu...
详细信息
Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product *** models,frameworks and methodol...
详细信息
Most of the security strategies today are primarily designed to provide security protection,rather than to solve one of the basic security issues related to adequate software product *** models,frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life *** it is important to assess the usability of the popular security requirements engineering(SRE)approaches.A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method *** assessment will allow changes to the engineering process of security *** consistency of security requirements depends heavily on the usability of security requirements *** SRE approaches are available for use and each approach takes into account several factors of usability but does not cover every element of *** seems to be no realistic implementation of such models because the concept of usability is not *** paper aims at specifying the different taxonomy of usability and design hierarchical usability *** taxonomy takes into account the common quality assessment parameters that combine variables,attributes,and characteristics identified in different approaches used for security requirements *** multiple-criteria decision-making(MCDM)model used in this paper for usability evaluation is called the fuzzy AHP-TOPSIS model which can conveniently be incorporated into the current approach of software *** significant usability criteria are identified and used to evaluate the six different *** strategies are graded as per their expected values of usability.
Capsule networks (CapsNet), an emerging neural network architecture, is now used in medical science to develop potential tools and applications. Particularly, in the domain of medical image analysis, CapsNet outperfor...
详细信息
Spherical evolution (SE) is a recently proposed meta-heuristic algorithm. Its special search approach has been proved to be very effective in exploring the search space. SE is very powerful for optimization, but still...
详细信息
暂无评论