The analysis of a system model with special structured properties is presented in this paper. In particular, the analytical and simulation techniques for computing the system response in the context of a descriptor-li...
The analysis of a system model with special structured properties is presented in this paper. In particular, the analytical and simulation techniques for computing the system response in the context of a descriptor-like model is developed. In addition, the stability theorems for this model are also developed. This includes the formulation of both the classical and modern stability methods. The latter method leads to a generalized form of the Liapunov equation. The computational saving associated with using the methods developed here is also discussed.
In this work we propose a novel fault detection (FD) technique in order to enhance monitoring of biological processes. To do that, a new statistical FD method, that is based on combining the advantages of the double e...
详细信息
Hand-ischemia and artery-thrombosis are serious complications of hand artery cannulation/grafting. Screening the patency of hand arteries reduces the complications. Modified Allen Test (MAT), Barbeau's test, and D...
详细信息
Flow matching in the continuous simplex has emerged as a promising strategy for DNA sequence design, but struggles to scale to higher simplex dimensions required for peptide and protein generation. We introduce Gumbel...
详细信息
Investigations on the junctions made between Pb and polycrystalline Bi2Sr2CaCu2O8+x (BSCCO) are reported. The BSCCO surfaces were treated with number of methods including mechanically scraping, plasma sputtering, plas...
详细信息
Investigations on the junctions made between Pb and polycrystalline Bi2Sr2CaCu2O8+x (BSCCO) are reported. The BSCCO surfaces were treated with number of methods including mechanically scraping, plasma sputtering, plasma oxidation, and Br etch before junctions were fabricated. The current-voltage characteristics and dynamic resistance (dV/dI) vs voltage have been measured at both 77K and 4.2K. We observed, among other features, a Pb gap structure similar to that seen in Pb/YBa2Cu3O7-delta junctions, a magnetic dependent supercurrent, an asymmetric I-V curve, and narrow resistance peaks. Properties of junctions prepared in different manners are compared. Both XPS and electrical studies indicated that Br etch is not suitable for the BiSrCaCuO system in spite of its successful application in YBa2Cu3O7-delta.
Crohn's disease (CD) is a chronic inflammatory condition of the gastrointestinal tract characterized by alternating periods of activity and remission. This study investigates whether the cellular environments of q...
详细信息
The concept of an optical fuzzy flip-flop, as an essential and basic component for the effective processing of fuzzy information, is introduced. A design based on the area-encoding technique and a multiple-imaging sys...
详细信息
The concept of an optical fuzzy flip-flop, as an essential and basic component for the effective processing of fuzzy information, is introduced. A design based on the area-encoding technique and a multiple-imaging system is proposed to implement two types of fuzzy J-K flip-flops. (C) John Wiley & Sons, Inc.
This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control area...
详细信息
This paper addresses a set-theoretic method for the detection of data corruption cyber-attacks on the load frequency control loop of a networked power system. The system consists of several interconnected control areas forming a power grid. Based on the overall discrete-time network dynamics, a convex and compact polyhedral robust invariant set is extracted and is used as a set-induced anomaly detector. If the state vector exits the invariant set,then an alarm will be activated, and the potential threat is considered disclosed. The attack scenario used to assess the efficiency of the proposed anomaly detector concerns corrupted frequency sensor measurements transmitted to the automatic generation control unit of a compromised control area. Simulation studies highlight the ability of a set-theoretic approach to disclose persistent and intermittent attack patterns even when they occur at the same time with changes in the power load demand.
Causal source codes are defined. These include quantizers, delta modulators, differential pulse code modulators, and adaptive versions of these. Several types of causal codes are identified. For memoryless sources it ...
Causal source codes are defined. These include quantizers, delta modulators, differential pulse code modulators, and adaptive versions of these. Several types of causal codes are identified. For memoryless sources it is shown that the optimum performance attainable by causal codes can be achieved by memoryless codes or by time-sharing memoryless codes. This optimal performance can be evaluated straightforwardly.
暂无评论