In the Newman-Penrose formalism,we prove that the Reissner-Nordstrom metric is the only asymptotically fat,static,axially symmetric,Petrov type-D analytic solution of the electro-vacuum Einstein-Maxwell equations near...
详细信息
In the Newman-Penrose formalism,we prove that the Reissner-Nordstrom metric is the only asymptotically fat,static,axially symmetric,Petrov type-D analytic solution of the electro-vacuum Einstein-Maxwell equations near the null infinity.
This paper investigates the pursuit-evasion problem involving one evader and multiple pursuers with limited sensing capability, where the evader tries to maximize the distance with the pursuers, while the pursuers hav...
This paper investigates the pursuit-evasion problem involving one evader and multiple pursuers with limited sensing capability, where the evader tries to maximize the distance with the pursuers, while the pursuers have different objectives based on whether they can receive the information of the evader. The subgroup of pursuers who can observe the evader(called leaders) tries to be close to the evader, and the other subgroup of pursuers(called followers) tries to synchronize with their neighbors. When the subgraph formed by all leaders is complete, sufficient conditions are given to guarantee that the pursuers capture the evader and the pursuit-evasion game composed of the evader and leaders reaches Nash equilibrium. Furthermore, for the incomplete subgraph case, the distributed observers are proposed to estimate the relative positions between the evader and all leaders. It is shown that the distributed control strategy based on the observers converges exponentially to the Nash equilibrium solution, and makes the pursuers capture the evader. Finally, simulation examples are provided to verify the effectiveness of the proposed strategies.
Spatially resolved transcriptomics(SRT)is capable of comprehensively characterizing gene expression patterns and providing an unbiased image of spatial *** fully understand the organizational complexity and tumor immu...
详细信息
Spatially resolved transcriptomics(SRT)is capable of comprehensively characterizing gene expression patterns and providing an unbiased image of spatial *** fully understand the organizational complexity and tumor immune escape mechanism,we propose stMGATF,a multiview graph attention fusion model that integrates gene expression,histological images,spatial location,and gene *** better extract information,stMGATF exploits SimCLRv2 for visual feature exaction and employs edge feature enhanced graph attention networks for the learning potential embedding of each view.A global attention mechanism is used to adaptively integrate 3 views to obtain low-dimensional *** to diverse SRT datasets,stMGATF is robust and outperforms other methods in detecting spatial domains and denoising data even with different resolutions and *** particular,stMGATF contributes to the elucidation of tissue heterogeneity and extraction of 3-dimensional expression ***,considering the associations between genes in tumors,stMGATF can identify the spatial dark genes ignored by traditional methods,which can be used to predict tumor-driving transcription factors and reveal tumor immune escape mechanisms,providing theoretical evidence for the development of new immunotherapeutic strategies.
Trainability and generalization are two key issues in quantum machine learning on the basis of variational algorithms. It has been demonstrated in [1] that with the reduced-domain initialization strategy, the trainabi...
详细信息
Optimizing parameterized quantum circuits promises efficient use of near-term quantum devices to achieve potential quantum advantage. However, there is a notorious tradeoff between the expressibility and trainability ...
详细信息
With the development of wireless communication technology,cyber physical systems are applied in various fields such as industrial production and infrastructure,where lots of information exchange brings cyber security ...
详细信息
With the development of wireless communication technology,cyber physical systems are applied in various fields such as industrial production and infrastructure,where lots of information exchange brings cyber security threats to the *** the perspective of system identification with binary-valued observations,we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering *** packet loss rate and the data tampering rate caused by the attack is given,and the estimation error is *** the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with *** explicit expression of the optimal attack strategy is *** examples are presented to verify the effectiveness of the main conclusions.
In this paper,the pursuit-evasion game with state and control constraints is solved to achieve the Nash equilibrium of both the pursuer and the evader with an iterative self-play *** the condition where the Hamiltonia...
详细信息
In this paper,the pursuit-evasion game with state and control constraints is solved to achieve the Nash equilibrium of both the pursuer and the evader with an iterative self-play *** the condition where the Hamiltonian formed by means of Pontryagin’s maximum principle has the unique solution,it can be proven that the iterative control law converges to the Nash equilibrium ***,the strong nonlinearity of the ordinary differential equations formulated by Pontryagin’s maximum principle makes the control policy difficult to figured *** the system dynamics employed in this manuscript contains a high dimensional state vector with *** practical applications,such as the control of aircraft,the provided overload is ***,in this paper,we consider the optimal strategy of pursuit-evasion games with constant constraint on the control,while some state vectors are restricted by the function of the *** address the challenges,the optimal control problems are transformed into nonlinear programming problems through the direct collocation ***,two numerical cases of the aircraft pursuit-evasion scenario are given to demonstrate the effectiveness of the presented method to obtain the optimal control of both the pursuer and the evader.
Synchronization of multi-agent systems(MAS) has attracted much attention of researchers in various fields including physicists,biologists,and *** the investigation of multi-agent systems,the model proposed by Vicsek e...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
Synchronization of multi-agent systems(MAS) has attracted much attention of researchers in various fields including physicists,biologists,and *** the investigation of multi-agent systems,the model proposed by Vicsek et *** is a basic and classical model which consists of a large number of autonomous agents moving in the plane with the same speed but with different *** to the the delay of communication network and packet loss,each agent in the system may update the state according to its own clock,and we call it the asynchronous multi-agent *** this paper,we will present a theoretical analysis for synchronization of the asynchronous Vicsek model in a random framework with large population,and we establish the sufficient conditions for synchronization without any priori connectivity assumptions on the neighbor graphs.
In this paper,we investigate the counting complexity of reachability problem for Boolean control networks(BCNs) by Boolean counting constraint satisfaction problem(#CSP).We prove that the counting complexity of a clas...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
In this paper,we investigate the counting complexity of reachability problem for Boolean control networks(BCNs) by Boolean counting constraint satisfaction problem(#CSP).We prove that the counting complexity of a class of Boolean#CSP by using Post's lattice in universal algebra is#P-complete,and further use it to classify the counting complexity of M-reachability problem(#M-RP) when M=***,we prove that #M-RP is #P-complete.
暂无评论