With the recent development of information technology, the importance of protecting personal information has increased. Because of the vulnerability in passwords, biometric authentication is now being used as a method...
详细信息
Human activity recognition involves identifying the daily living activities of an individual through the utilization of sensor attributes and intelligent learning algorithms. The identification of intricate human acti...
详细信息
Now that the population is growing, the expenditure on basic needs of life is also increasing due to a lack of or less availability of resources. The economy consumed electricity is reaching peaks as its main fuel, co...
详细信息
In this paper,a two-step control method is proposed,leveraging the generalized Halanay inequality and existing finite-time stability theorems,to achieve finite-time synchronization for a class of neural networks with ...
In this paper,a two-step control method is proposed,leveraging the generalized Halanay inequality and existing finite-time stability theorems,to achieve finite-time synchronization for a class of neural networks with bounded time-varying *** the first step,the system state is attenuated from V (t0) to γV (t0) using the generalized Halanay inequality,where0<γ 1 is a free *** the second step,by applying existing finite-time stability theorems,the system state further decays from γV (t0) to *** on the above ideas,two novel finite-time stability lemmas for the error system are presented,and the convergence rate as well as the settling time is ***,the value of γ that results in the shortest settling time for the error system is also *** the help of the derived lemmas,several sufficient algebraic criteria are established to achieve finite-time synchronization between the considered delayed neural *** results of this paper not only improve the existing two-step control method but also overcome the limitations of certain one-step finite-time control ***,the validity and practical applicability of the obtained theoretical results are demonstrated through two numerical examples and an image protection experiment.
Existing works on rule discovery often yield an overwhelming number of rules with a high computational cost. Moreover, few studies consider the impact of data quality on the reliability of rules produced. This paper s...
详细信息
Forest plays a vital role in environmental change and the protection of forests is the utmost important thing. The study attempts to suggest a solution for a smart forest (Internet of Forest Things). As nowadays, the ...
详细信息
Liquid permeation into silicone rubber(SR)may lead to the degradation or complete failure of the composite *** to inhibit liquid permeation,two kinds of superhydrophobic coatings are applied to the SR *** liquid perme...
详细信息
Liquid permeation into silicone rubber(SR)may lead to the degradation or complete failure of the composite *** to inhibit liquid permeation,two kinds of superhydrophobic coatings are applied to the SR *** liquid permeation properties of SR with different types of liquids are investigated,and the Langmuir diffusion model is applied to analyse the experimental *** results show that the composite superhydrophobic coating can effectively inhibit liquid permeation by reducing the contact area between the surface and liquid,and the stable structure of the composite coating can maintain the performance after the liquid permeation and ***,the nano‐particle coating without the polymer binder experiences severe performance degradation during the immersion test,and it cannot restrain the liquid permeation anymore after it loses the *** a validation of the effective protection,the insulation resistivity change was *** resistivity decreases sharply for the pristine SR after water permeation;however,the decrease is much smaller for the coated *** current study not only provides new insight into the liquid permeation properties of SR with different surface wettability but also suggests an effective measure to prevent liquid permeation into SR.
This study comprehensively analyzes the future production, sales and charging infrastructure expansion of new energy electric vehicles in China over the next decade, including production, sales and charging infrastruc...
详细信息
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ...
详细信息
Capsule networks offer a useful approach for modeling part-whole hierarchies in visual data, yet they remain limited in effectively handling uncertainty in part-object relationships. This work introduces an entropy-ad...
详细信息
暂无评论