It is well known that nonsymmetric algebraic Riccati equation can be efficiently solved by using the structure-preserving doubling algorithm (SDA) with the shift-and-shrink transformation and the corresponding doublin...
It is well known that nonsymmetric algebraic Riccati equation can be efficiently solved by using the structure-preserving doubling algorithm (SDA) with the shift-and-shrink transformation and the corresponding doubling algorithm is called the SDA-ss. In this paper, we propose an improved SDA-ss algorithm. Preliminary numerical experiments show that the algorithm is efficient to derive the minimal nonnegative solution of nonsymmetric algebraic Riccati equation with M-matrix.
Sparse Representation (SR) techniques encode the test samples into a sparse linear combination of all training samples and then classify the test samples into the class with the minimum residual. The classification of...
详细信息
In many realistic scenarios,such as political election and viral marketing,two opposite opinions,i.e.,positive opinion and negative opinion,spread simultaneously in the same social networks[1,2].Consequently,to achiev...
详细信息
In many realistic scenarios,such as political election and viral marketing,two opposite opinions,i.e.,positive opinion and negative opinion,spread simultaneously in the same social networks[1,2].Consequently,to achieve good word-of-mouth effect,it is desired to maximize the spread of posi-
This paper presents an end-to-end ECG signal classification method based on a novel segmentation strategy via 1D Convolutional Neural networks (CNN) to aid the classification of ECG signals. The ECG segmentation strat...
详细信息
As a completely new residential distribution infrastructure,energy internet facilitates transactions of equipment,energy and services. However,there is security risk under all the *** paper proposes an electricity pri...
详细信息
As a completely new residential distribution infrastructure,energy internet facilitates transactions of equipment,energy and services. However,there is security risk under all the *** paper proposes an electricity pricing model based on insurance from the perspective of maximizing the benefits of Energy Internet service providers by using the principal-agent theory. The consumer prepays the provider insurance premiums and signs a contract. The provider sets electricity price according to the premiums and therefore provides differentiated electric services for the consumer. Loss suffered by the consumer due to the power failure is compensated by the provider according to the contract. The equivalent model is presented and a necessary condition of the optimal strategy is obtained on the basis of Pontryagin's maximum principle. At last,a numerical example is presented,which illustrates the effectiveness of the proposed model.
Traffic sign classification is a significant issue in the intelligent vehicle domain, which helps vehicles to follow the traffic rules and ensure the safety. Feature selection and description are very important and di...
详细信息
Nowadays, the cameras of traffic monitoring systems are mounted toward roads or interactions. The views are fixed and limited. To extend the monitoring area, a novel onboard abnormal event detection system is proposed...
详细信息
In this paper, we study the local unitary (LU) classification for pairs (triples) of generalized Bell states, based on the local unitary equivalence of two sets. In detail, we first introduce some general unitary oper...
详细信息
In this paper, we study the local unitary (LU) classification for pairs (triples) of generalized Bell states, based on the local unitary equivalence of two sets. In detail, we first introduce some general unitary operators which give us more local unitary equivalent sets besides Clifford operators. And then we present two necessary conditions for local unitary equivalent sets which can be used to examine the local inequivalence. Following this approach, we completely classify all pairs in the d⊗d quantum system into ∏j=1n(kj+1)−1 LU-inequivalent pairs when the prime factorization of d=∏j=1npjkj. Moreover, all triples in the pα⊗pα quantum system for prime p can be partitioned into (α+3)6pα+O(αpα−1) LU-inequivalent triples; especially, when α=2 and p>2, there are exactly ⌊56p2⌋+⌊p−26+(−1)⌊p3⌋p3⌋+3 LU-inequivalent triples.
In order to effectively detect phishing attacks, this paper designed a new detection system for phishing websites using LSTM Recurrent neural networks. LSTM has the advantage of capturing data timing and long-term dep...
详细信息
暂无评论