In the general max–min fair allocation problem, there are m players and n indivisible resources, each player has his/her own utilities for the resources, and the goal is to find an assignment that maximizes the minim...
详细信息
Graded dielectric media composites, with negative-index materials (MM), are of interest for various applications such as microwave graded-index (GRIN) lenses [ 1,2], wideband THz filtering [3], and enhanced energy har...
详细信息
ISBN:
(纸本)9798350360974
Graded dielectric media composites, with negative-index materials (MM), are of interest for various applications such as microwave graded-index (GRIN) lenses [ 1,2], wideband THz filtering [3], and enhanced energy harvesting [4]. Graded dielectric media with regular positive-index materials are also of importance in e.g. the field of biosensing. One example is mimicking of dielectric phantoms for the characterization of biological tissue's properties and response to electromagnetic radiation [5,6]. Our research is therefore of interest for applications within both general electromagnetics and biosensing due to its generality. In line with our previous work [7], in the present abstract we review TE-wave propagation in waveguide structures filled with dielectric composites graded along the direction of the waveguide (conveniently chosen to be z-direction). Using Maxwell's equations in a source-free (p = 0 and 7 = 0) inhomogeneous medium{Formula Method} for TE-waves (Ez = 0) in the z-direction along the waveguide structure filled with a non-magnetic (ii(r, a») = ii0) dielectric composite with graded permittivity along the z-direction (e(r, a») = e(z, a»)), the wave equation for the electric field reduces to a simple form V2E(r, a>) + fc2£r(z, a>)E(r, a>) = 0 where k2 = o»2£0lu0 and £r(z,a>) is the relative permittivity function. The longintudinal component of the magnetic field Hz(r,a>) satisfies the same differential equation, i.e. V2Hz(r,a>) + k2Er(z,a>)Hz(r,a>) = 0 . These wave equations have the form of the Klein-Gordon (or Schrôdinger) equation of quantum physics, and they offer readily available exact analytical solutions for a number of permittivity profiles of interest, such as the hyperbolic tangent profile or periodic (sinusoidal) profile and similar. As an example, for a circular waveguide, of radius r0 , filled with graded dielectric composite with the periodic permittivity function{Formula Method} where C {...} and S {...} are the even and odd Mathieu func
Water resource management relies heavily on reliable water quality predictions. Predicting water quality metrics in the watershed system, including dissolved oxygen (DO), is the main emphasis of this work. The enhance...
详细信息
In today's world, online payment has become the most popular transaction method, making payments convenient for people. However, this ease of use comes with the risk of an increasing number of online fraud inciden...
详细信息
Renewable energies are generated from natural processes that are continuously renewed. Therefore, it is required to combine the PV modules either in series combinations or parallel combinations for developing the appr...
详细信息
This paper addresses the tracking control problem of a class of multiple-input–multiple-output nonlinear systems subject to actuator *** a balance between input saturation and performance constraints,rather than cond...
详细信息
This paper addresses the tracking control problem of a class of multiple-input–multiple-output nonlinear systems subject to actuator *** a balance between input saturation and performance constraints,rather than conducting isolated analyses,especially in the presence of frequently encountered unknown actuator faults,becomes an interesting yet challenging ***,to enhance the tracking performance,Tunnel Prescribed Performance(TPP)is proposed to provide narrow tunnel-shape constraints instead of the common over-relaxed trumpet-shape performance constraints.A pair of non-negative signals produced by an auxiliary system is then integrated into TPP,resulting in Saturation-tolerant Prescribed Performance(SPP)with flexible performance boundaries that account for input saturation ***,SPP can appropriately relax TPP when needed and decrease the conservatism of control *** the help of SPP,our developed Saturation-tolerant Prescribed Control(SPC)guarantees finite-time convergence while satisfying both input saturation and performance constraints,even under serious actuator *** are conducted to illustrate the effectiveness of the proposed SPC.
In crowded settings,mobile robots face challenges like target disappearance and occlusion,impacting tracking *** existing optimisations,tracking in complex environments remains *** address this issue,the authors propo...
详细信息
In crowded settings,mobile robots face challenges like target disappearance and occlusion,impacting tracking *** existing optimisations,tracking in complex environments remains *** address this issue,the authors propose a tailored visual navigation tracking system for crowded *** target disappearance,an autonomous navigation strategy based on target coordinates,utilising a path memory bank for intelligent search and re‐tracking is *** significantly enhances tracking *** handle target occlusion,the system relies on appearance features extracted by a target detection network and a feature memory bank for enhanced *** control technology ensures robust target tracking by fully utilising appearance information and motion characteristics,even in occluded *** testing on the OTB100 dataset validates the system's effectiveness in addressing target tracking challenges in diverse crowded environments,affirming algorithm robustness.
Accurate segmentation of skin lesions is critical for dermatological diagnosis and treatment. This study investigates the impact of label errors on the performance of convolutional neural networks in skin lesion segme...
详细信息
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection *** DDoS attack defence strategies deploy only to a certain type of devices in the at...
详细信息
The proliferation of Internet of Things(IoT)rapidly increases the possiblities of Simple Service Discovery Protocol(SSDP)reflection *** DDoS attack defence strategies deploy only to a certain type of devices in the attack chain,and need to detect attacks in advance,and the detection of DDoS attacks often uses heavy algorithms consuming lots of computing *** paper proposes a comprehensive DDoS attack defence approach which combines broad learning and a set of defence strategies against SSDP attacks,called Broad Learning based Comprehensive Defence(BLCD).The defence strategies work along the attack chain,starting from attack sources to *** defends against attacks without detecting attacks or identifying the roles of IoT devices in SSDP reflection *** also detects suspicious traffic at bots,service providers and victims by using broad learning,and the detection results are used as the basis for automatically deploying defence strategies which can significantly reduce DDoS *** evaluations,we thoroughly analyze attack traffic when deploying BLCD to different defence *** show that BLCD can reduce the number of packets received at the victim to 39 without affecting the standard SSDP service,and detect malicious packets with an accuracy of 99.99%.
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)*** security issues directly result from inappropriate security management protocols and their implementation by IoT ga...
详细信息
The recent developments in smart cities pose major security issues for the Internet of Things(IoT)*** security issues directly result from inappropriate security management protocols and their implementation by IoT gadget ***-attackers take advantage of such gadgets’vulnerabilities through various attacks such as injection and Distributed Denial of Service(DDoS)*** this background,Intrusion Detection(ID)is the only way to identify the attacks and mitigate their *** recent advancements in Machine Learning(ML)and Deep Learning(DL)models are useful in effectively classifying *** current research paper introduces a new Coot Optimization Algorithm with a Deep Learning-based False Data Injection Attack Recognition(COADL-FDIAR)model for the IoT *** presented COADL-FDIAR technique aims to identify false data injection attacks in the IoT *** accomplish this,the COADL-FDIAR model initially preprocesses the input data and selects the features with the help of the Chi-square *** detect and classify false data injection attacks,the Stacked Long Short-Term Memory(SLSTM)model is exploited in this ***,the COA algorithm effectively adjusts the SLTSM model’s hyperparameters effectively and accomplishes a superior recognition *** proposed COADL-FDIAR model was experimentally validated using a standard dataset,and the outcomes were scrutinized under distinct *** comparative analysis results assured the superior performance of the proposed COADL-FDIAR model over other recent approaches with a maximum accuracy of 98.84%.
暂无评论