Dual active bridge is a promising isolated bidirectional DC/DC converter which has attracted more and more attention due to its advantages of zero-voltage switching, great voltage regulation ability, high power densit...
详细信息
Commutation failure (CF) is one of the major concerns in high-voltage direct current (HVDC) transmission system. Of many methods to mitigate CF, advancing firing angle is preferred one since it can be easily implement...
详细信息
Deep neural networks(DNNs) have achieved remarkable success in diverse ***,it has been demonstrated that DNNs are very vulnerable to adversarial examples even in black-box settings.A large number of black-box attack m...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
Deep neural networks(DNNs) have achieved remarkable success in diverse ***,it has been demonstrated that DNNs are very vulnerable to adversarial examples even in black-box settings.A large number of black-box attack methods have been proposed to in the ***,those methods usually suffer from low success rates and large query counts,which cannot fully satisfy practical *** this paper,we propose a hybrid attack method which trains meta adversarial perturbations(MAPs) on surrogate models and performs black-box attacks by estimating gradients of the *** method uses the meta adversarial perturbation as an initialization and subsequently trains any black-box attack method for several ***,the MAPs enjoy favorable transferability and universality,in the sense that they can be employed to boost performance of other black-box adversarial attack *** experiments demonstrate that our method can not only improve the attack success rates,but also reduces the number of queries compared to other methods.
This paper considers a target tracking problem, and the dynamics of the target regarded as an active leader is given in a general form of linear system. The multi-agent network contains communication delays and experi...
详细信息
This paper studies the adaptive control for linear systems with set-valued observations to track given periodic target. Based on the system parameters, accessorial parameters with the same order as tracking target is ...
详细信息
Protein N-glycosylation plays a crucial role in a considerable number of important biological *** studies on glycoproteomes and glycomes have already characterized many glycoproteins and glycans associated with cell d...
详细信息
Protein N-glycosylation plays a crucial role in a considerable number of important biological *** studies on glycoproteomes and glycomes have already characterized many glycoproteins and glycans associated with cell development, life cycle, and disease progression. Mass spectrometry(MS) is the most powerful tool for identifying biomolecules including glycoproteins and glycans, however, utilizing MS-based approaches to identify glycoproteomes and glycomes is challenging due to the technical difficulties associated with glycosylation analysis. In this review, we summarize the most recent developments in MS-based glycoproteomics and glycomics, including a discussion on the development of analytical methodologies and strategies used to explore the glycoproteome and glycome, as well as noteworthy biological discoveries made in glycoproteome and glycome research. This review places special emphasis on China, where scientists have made sizeable contributions to the literature, as advancements in glycoproteomics and glycomincs are occurring quite rapidly.
A new transformation that converts a Bayesian game to a so-called ex-ante agent game (a normal-form game) is proposed. Differently from the existing transformation proposed by R. Selten that changes a Bayesian game to...
详细信息
This paper is concerned with the stabilization problem of linear time-invariant systems under Denial-of-Service(DoS)***,system matrices are unknown,and only some input-output trajectories collected from off-line exper...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
This paper is concerned with the stabilization problem of linear time-invariant systems under Denial-of-Service(DoS)***,system matrices are unknown,and only some input-output trajectories collected from off-line experiments are ***,in the model-based case,it has been proven that systems equipped with a predictor-based state feedback controller achieve resilience against DoS ***,this is difficult or even impossible to be implemented in the absence of a system model,thus leading to resilient control challenging in the data-based *** maintain resilience against DoS attacks in the data-based case,a data-driven model predictive control(MPC) scheme is proposed such that future system input-output trajectories can be obtained by solving a data-dependent optimal *** this scheme,a data-driven resilient control strategy is developed such that the system achieves the same level of resilience of the DoS attacks as the model-based ***,a numerical example is given to validate the effectiveness of the proposed method.
This paper studies the control problem for a class of multiple-input multiple-output (MIMO) lower-triangular systems which have uncertain dynamics and disturbance. The active disturbance rejection control (ADRC) is de...
详细信息
From the view of combination of stereo vision and robot control, an active stereo vision for object tracking and location system is built to work on flexible manufacturing system. A method based on local HSV image and...
详细信息
From the view of combination of stereo vision and robot control, an active stereo vision for object tracking and location system is built to work on flexible manufacturing system. A method based on local HSV image and shape of object to recognize object is used for robot tracking. After the color segment, use the knowledge of shape of objects to recognize objects. And a technique for camera calibration based on plane square is proposed. It only requires the camera to observe a square at two (or more) different unknown orientations. Use the result of object recognize and camera calibration the robot can position and track the object. At the last of the paper, the results of object tracking experiments prove that the method is correct.
暂无评论