The main focus of this research is on improving the performance of dynamic systems with actuator non-linearities and time-varying disturbances. To this end, using the concept of finite-time stability, a novel observer...
详细信息
This study presents an adaptive fuzzy broad-learning neural control (AFBNC) system applied to a reaction wheel pendulum without knowing its dynamic model. The AFBNC system uses a fuzzy broad-learning system (FBLS) to ...
详细信息
The Single-Source Shortest Path (SSSP) algorithm is one of the most important kernels used by a variety of high-level graph processing applications. Although having been extensively studied for single-node scenarios, ...
详细信息
We investigate the equilibrium stability and robustness in a class of moving target defense problems, in which players have both incomplete information and asymmetric cognition. We first establish a Bayesian Stackelbe...
详细信息
Bursting is a diverse and common phenomenon in neuronal activation patterns and it indicates that fast action voltage spiking periods are followed by resting *** interspike interval(ISI)is the time between successive ...
详细信息
Bursting is a diverse and common phenomenon in neuronal activation patterns and it indicates that fast action voltage spiking periods are followed by resting *** interspike interval(ISI)is the time between successive action voltage spikes of neuron and it is a key indicator used to characterize the ***,a three-dimensional memristive Hindmarsh-Rose(mHR)neuron model was constructed to generate hidden chaotic ***,the properties of the discrete mHR neuron model have not been investigated,*** this article,we first construct a discrete mHR neuron model and then acquire different hidden chaotic bursting sequences under four typical sets of *** make these sequences more suitable for the application,we further encode these hidden chaotic sequences using their ISIs and the performance comparative results show that the ISI-encoded chaotic sequences have much more complex chaos properties than the original *** addition,we apply these ISI-encoded chaotic sequences to the application of image *** image encryption scheme has a symmetric key structure and contains plain-text permutation and bidirectional diffusion *** results and security analyses prove that it has excellent robustness against various possible attacks.
We study the computation of the global generalized Nash equilibrium (GNE) for a class of non-convex multi-player games, where players' actions are subject to both local and coupling constraints. Due to the non-con...
详细信息
ISBN:
(数字)9798350354409
ISBN:
(纸本)9798350354416
We study the computation of the global generalized Nash equilibrium (GNE) for a class of non-convex multi-player games, where players' actions are subject to both local and coupling constraints. Due to the non-convex payoff functions, we employ canonical duality to reformulate the setting as a complementary problem. Under given conditions, we reveal the relation between the stationary point and the global GNE. According to the convex-concave properties within the complementary function, we propose a continuous-time mirror descent to compute GNE by generating functions in the Bregman divergence and the damping-based design. Then, we devise several Lyapunov functions to prove that the trajectory along the dynamics is bounded and convergent.
Cell type identification is a crucial step in single-cell RNA-seq (scRNA-seq) data analysis. The supervised cell type identification method is a preferred solution due to its accuracy and efficiency. The performance o...
详细信息
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer an...
详细信息
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer and process trillions and zillions of bytes using the current cloud-device architecture.
Despite the drug approval process consists of extremely rigorous clinical and preclinical studies, not all side effects are identified before its marketing, posing a significant risk to public health. Furthermore, con...
详细信息
In this paper, a model of the turbine and its regulation system of a typical coal-fired unit is built based on the Matlab/Simulink simulation platform, including the electro-hydraulic regulation system model, the elec...
详细信息
暂无评论