Hand-foot-mouth disease (HFMD) has gradually become prevalent in mainland China since the first official report in 2008. The incidence of HFMD is increasing among children mainly aged zero to five. Thus how to monitor...
详细信息
For spacecraft attitude control affected by environmental disturbance, parameter uncertainty and actuator fault, a novel composite active fault-tolerant scheme, combining a strong tracking Cubature Kalman filter (STCK...
详细信息
Previous studies have shown gender differences in cognitive function and the prevalence of some neurological diseases. Understanding gender differences in functional connectivity (FC) will provide a new perspective fo...
详细信息
Robot operating system has become an important basic software for robots. It improves the reuse rate of software codes and provides a unified platform for application developers. However, ROS runs on Linux, which take...
详细信息
In this paper, a novel navigation method is proposed to dock a mobile manipulator in front of a specific person by combining the ultra-wideband (UWB) positioning system with image-based motion control. The UWB is used...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a da...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a dataset,making it difficult to pick the best set of features using standard ***,in this research,a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm(ASSOA)has been *** using metaheuristics to pick features,it is common for the selection of features to vary across runs,which can lead to *** of this,we used the adaptive squirrel search to balance exploration and exploitation duties more evenly in the optimization *** the selection of the best subset of features,we recommend using the binary ASSOA search strategy we developed *** to the suggested approach,the number of features picked is reduced while maximizing classification accuracy.A ten-feature dataset from the University of California,Irvine(UCI)repository was used to test the proposed method’s performance *** other state-of-the-art approaches,including binary grey wolf optimization(bGWO),binary hybrid grey wolf and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hybrid GWO and genetic algorithm 4028 CMC,2023,vol.74,no.2(bGWO-GA),binary firefly algorithm(bFA),and *** results confirm the superiority and effectiveness of the proposed algorithm for solving the problem of feature selection.
Sliding mode control(SMC)has been studied since the 1950s and widely used in practical applications due to its insensitivity to matched *** aim of this paper is to present a review of SMC describing the key developmen...
详细信息
Sliding mode control(SMC)has been studied since the 1950s and widely used in practical applications due to its insensitivity to matched *** aim of this paper is to present a review of SMC describing the key developments and examining the new trends and challenges for its application to power electronic *** fundamental theory of SMC is briefly reviewed and the key technical problems associated with the implementation of SMC to power converters and drives,such chattering phenomenon and variable switching frequency,are discussed and *** recent developments in SMC systems,future challenges and perspectives of SMC for power converters are discussed.
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
The 3D reconstruction process often requires high-precision depth images. However, based on the limitations of the current depth sensor's own equipment and the influence of shootingobjects, environment and other f...
详细信息
Computing-in-memory (CIM) is a promising technique for energy-efficiently conducting the massive amount of required multiply-And-Accumulate (MAC) calculations in neural networks (NNs). The read-decoupled 8T (RD8T) SRA...
详细信息
暂无评论