This letter deals with an interesting intersection phenomenon of prescribed-time stability (PTSta) for dynamical systems, and develops a novel switching control scheme to investigate prescribed-time synchronization (P...
This letter deals with an interesting intersection phenomenon of prescribed-time stability (PTSta) for dynamical systems, and develops a novel switching control scheme to investigate prescribed-time synchronization (PTSyn) for multiweighted and directly coupled complex networks. Different from most previous works that scholars only pay attention to designing the regulation function to ensure PTSta, we aim to select various parameters and uncover the mathematical mechanism of intersecting system state curves. We rigorously prove that, if the settling time is larger than 1, then no matter what the initial value is, the intersection exists only once before the settling time; otherwise, there is no intersection. Moreover, an energy consumption evaluation function is also put forward for PTSta, whose exact value is also calculated via exponential integrals. Then, this intersection theory is applied on the PTSyn of multiweighted complex networks, which is beneficial to construct the switching control scheme or choose the optimal parameters to reduce the energy cost. The rearranging variables’ order technique is utilized to conduct the multiweighted complex networks and obtain the synchronization criterion. Finally, four simulations are presented to verify theoretical results.
A class of models for activity-driven networks is proposed in which nodes vary in two states: active and inactive. Only active nodes can receive links from others which represent instantaneous dynamical interactions....
详细信息
A class of models for activity-driven networks is proposed in which nodes vary in two states: active and inactive. Only active nodes can receive links from others which represent instantaneous dynamical interactions. The evolution of the network couples the addition of new nodes and state transitions of old ones. The active group changes with activated nodes entering and deactivated ones leaving. A general differential equation framework is developed to study the degree distribution of nodes of integrated networks where four different schemes are formulated.
Accurate traffic prediction is crucial for urban traffic management. Spatial-temporal graph neural networks, which combine graph neural networks with time series processing, have been extensively employed in traffic p...
详细信息
Accurate traffic prediction is crucial for urban traffic management. Spatial-temporal graph neural networks, which combine graph neural networks with time series processing, have been extensively employed in traffic prediction. However, traditional graph neural networks only capture pairwise spatial relationships between road network nodes, neglecting high-order interactions among multiple nodes. Meanwhile, most work for extracting temporal dependencies suffers from implicit modeling and overlooks the internal and external dependencies of time series. To address these challenges, we propose a Geometric Algebraic Multi-order Graph Neural Network (GA-MGNN). Specifically, in the temporal dimension, we design a convolution kernel based on the rotation matrix of geometric algebra, which not only learns internal dependencies between different time steps in time series but also external dependencies between time series and convolution kernels. In the spatial dimension, we construct a tokenized hypergraph and integrate dynamic graph convolution with attention hypergraph convolution to comprehensively capture multi-order spatial dependencies. Additionally, we design a segmented loss function based on traffic periodic information to further improve prediction accuracy. Extensive experiments on seven real-world datasets demonstrate that GAMGNN outperforms state-of-the-art baselines IEEE
In local differential privacy(LDP), a challenging problem is the ability to generate highdimensional data while efficiently capturing the correlation between attributes in a dataset. Existing solutions for low-dimensi...
详细信息
In local differential privacy(LDP), a challenging problem is the ability to generate highdimensional data while efficiently capturing the correlation between attributes in a dataset. Existing solutions for low-dimensional data synthesis, which partition the privacy budget among all attributes, cease to be effective in high-dimensional scenarios due to the large-scale noise and communication cost caused by the high dimension. In fact, the high-dimensional characteristics not only bring challenges but also make it possible to apply some technologies to break this bottleneck. This paper presents Sam Priv Syn for high-dimensional data synthesis under LDP, which is composed of a marginal sampling module and a data generation *** marginal sampling module is used to sample from the original data to obtain two-way marginals. The sampling process is based on mutual information, which is updated iteratively to retain, as much as possible,the correlation between attributes. The data generation module is used to reconstruct the synthetic dataset from the sampled two-way marginals. Furthermore, this study conducted comparison experiments on the real-world datasets to demonstrate the effectiveness and efficiency of the proposed method, with results proving that Sam PrivSyn can not only protect privacy but also retain the correlation information between the attributes.
An effective prognostic program is crucial to the predictive maintenance of complex equipment since it can improve productivity, prolong equipment life, and enhance system safety. This paper proposes a novel technique...
详细信息
An effective prognostic program is crucial to the predictive maintenance of complex equipment since it can improve productivity, prolong equipment life, and enhance system safety. This paper proposes a novel technique for accurate failure prognosis based on back propagation neural network and quantum multi-agent algorithm. Inspired by the extensive research of quantum computing theory and multi-agent systems, the technique employs a quantum multi-agent strategy, with the main characteristics of quantum agent representation and several operations including fitness evaluation, cooperation, crossover and mutation, for parameters optimization of neural network to avoid the deficiencies such as slow convergence and liability of getting stuck to local minima. To validate the feasibility of the proposed approach, several numerical approximation experiments were firstly designed, after which real vibrational data of bearings from the laboratory of Cincinnati University were analyzed and used to assess the health condition for a given future point. The results were rather encouraging and indicated that the presented forecasting method has the potential to be utilized as an estimation tool for failure prediction in industrial machinery.
The weighted sampling methods based on k-nearest neighbors have been demonstrated to be effective in solving the class imbalance problem. However,they usually ignore the positional relationship between a sample and th...
详细信息
The weighted sampling methods based on k-nearest neighbors have been demonstrated to be effective in solving the class imbalance problem. However,they usually ignore the positional relationship between a sample and the heterogeneous samples in its neighborhood when calculating sample weight. This paper proposes a novel neighborhood-weighted based sampling method named NWBBagging to improve the Bagging algorithm's performance on imbalanced datasets. It considers the positional relationship between the center sample and the heterogeneous samples in its neighborhood when identifying critical samples. And a parameter reduction method is proposed and combined into the ensemble learning framework, which reduces the parameters and increases the classifier's diversity. We compare NWBBagging with some state-of-the-art ensemble learning algorithms on 34 imbalanced datasets, and the result shows that NWBBagging achieves better performance.
The interest in multi-drone systems flourished in the last decade and their application is promising in many fields. We believe that in order to make drone swarms flying smoothly and reliably in real-world scenarios w...
详细信息
ISBN:
(纸本)9781538692455
The interest in multi-drone systems flourished in the last decade and their application is promising in many fields. We believe that in order to make drone swarms flying smoothly and reliably in real-world scenarios we need a first intermediate step which consists in the analysis of the effects of limited sensing on the behavior of the swarm. In nature, the central sensor modality often used for achieving flocking is vision. In this work, we study how the reduction in the field of view and the orientation of the visual sensors affect the performance of the Reynolds flocking algorithm used to control the swarm. To quantify the impact of limited visual sensing, we introduce different metrics such as (i) order, (ii) safety, (iii) union and (iv) connectivity. As Nature suggests, our results confirm that lateral vision is essential for coordinating the movements of the individuals. Moreover, the analysis we provide will simplify the tuning of the Reynolds flocking algorithm which is crucial for real-world deployment and, especially for aerial swarms, it depends on the envisioned application. We achieve the results presented in this paper through extensive Monte-Carlo simulations and integrate them with the use of genetic algorithm optimization.
When the high occlusion occurs in crowded scene, face detection is a better substitute for detecting pedestrian. In this paper, we present a novel crowd analysis method based on discriminative descriptor of faces and ...
详细信息
This paper will present an obstacle detection approach that relies on the three-dimensional information from stereo vision. Concerning real-time response of the system and high accuracy of the reconstructed points, in...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavio...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavior models to authenticate *** this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is *** architecture is suitable for users using the mobile terminal APP in the daily *** architecture includes data acquisition,data processing,feature extraction,and sub model *** can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
暂无评论