Active metamaterials are engineered structures that possess novel properties that can be changed after the point of manufacture. Their novel properties arise predominantly from their physical structure, as opposed to ...
详细信息
作者:
Mohamed I. El-HawwaryDepartment of Electrical Power Engineering
Faculty of Engineering Cairo University Giza 12613 Egypt Division of Decision and Control Systems School of Electrical Engineering & Computer Science KTH Royal Institute of Technology SE-100 44 Stockholm Sweden
In this paper the flying convex-path-following formations problem (FCxPFF) is solved for two cases of underactuated rigid bodies. In the first case the the rigid bodies have a single degree of underactuation with two ...
详细信息
In this paper the flying convex-path-following formations problem (FCxPFF) is solved for two cases of underactuated rigid bodies. In the first case the the rigid bodies have a single degree of underactuation with two thrusts and three torques. In the second, they have two degrees of underactuation with a single thrust. The solution builds on the one developed for fully-actuated agents in Part I of the paper. In addition, the way the solution is tailored for underactuation relies on further utilization of hierarchic set stabilization, and reduction. Additional remarks on the benefits of the approach, and simulation results of the proposed solutions are presented.
Future railway is expected to accommodate both train operation services and passenger broadband services. The millimeter wave (mmWave) communication is a promising technology in providing multi-gigabit data rates to o...
详细信息
Cancer is a rapidly evolving disease, with complex physiological changes throughout its development. Different patients of the same cancer type may require distinct treatments depending on the level of development. He...
详细信息
ISBN:
(数字)9781728162157
ISBN:
(纸本)9781728162164
Cancer is a rapidly evolving disease, with complex physiological changes throughout its development. Different patients of the same cancer type may require distinct treatments depending on the level of development. Hence it is essential to identify the genes and biological processes strongly associated with cancer progression to design an effective treatment plan. Our study has found that cancer samples of the same development stage (or grade, subtype) tend to share highly unique co-expression patterns, providing considerably stronger discerning power than differential expressions for cancer staging (and grading, subtyping). Based on this, we have developed a framework for identification and analyses of genes and pathways strongly associated with a cancer's development through identification of co-expression patterns that become increasingly stronger or weaker over cancer samples from early through advanced stages. Functional analyses of such co-expressed genes reveal that (1) cell-cycle, immune response, ribosome, proteasome and oxidative phosphorylation, among others, strongly associate with cancer development, (2) the co-expression patterns among ribosome, proteasome and oxidative phosphorylation genes tend to become increasingly weaker as a cancer advances, for almost all cancer types, and (3) the co-expression patterns among cell cycle and immune response genes tend to become increasingly stronger with cancer progression. We anticipate that co-expression-based analyses like we present here will become a key technique for functional studies of cancer development and evolution.
Two-line graphs of a given partial Latin rectangle are introduced as vertex-and-edge-coloured bipartite graphs that give rise to new autotopism invariants. They reduce the complexity of any currently known method for ...
详细信息
To perform an in-depth analysis on the current researches concerning the application of neural networks in the encryption algorithms, this paper used some research methods such as literature review and algorithm analy...
To perform an in-depth analysis on the current researches concerning the application of neural networks in the encryption algorithms, this paper used some research methods such as literature review and algorithm analysis to review the proposal and application of neural network technologies as well as the proposal and research and development of encryption algorithms through. The importance of neural networks in the encryption algorithms is highlighted. The current researches on encryption algorithms based on neural networks are reviewed from three dimensions, namely, algorithm framework, algorithm model and algorithm application. Through the research, it shows that the neural network technology has become the preferred choice for developing the encryption algorithms. This paper also proposed the direction of improvement through fusion application of multiple information processing technologies. This work lays the basis for improving the encryption algorithms based on neural network.
There is an important parameter in the normal operation of thermal power plant units, that is, the main steam temperature, too high or too low will have a great impact on production. For safety and efficiency consider...
There is an important parameter in the normal operation of thermal power plant units, that is, the main steam temperature, too high or too low will have a great impact on production. For safety and efficiency considerations, the main steam temperature needs to be controlled within a stable and appropriate range. In this way, the safety of equipment and people is guaranteed, but also ensures that resources will not be wasted. The prediction of the main steam temperature can achieve this aim. In view of the numerous influencing factors and non-linear characteristics of the main steam temperature, this paper proposes a main steam temperature prediction model based on autoencoder and GRU. First, build an autoencoder model, use historical data for training, enable it to accurately extract the essential information of the data. Then multiple influence parameters are dimensional reduced by the trained autoencoder, and use the reduced data as the input of the neural network built using GRU for training. The better model is finally compared with RNN and LSTM to verify the effectiveness and accuracy of the method.
This paper searches for the leader-follower stochastic differential Stackelberg game under a partial observed information. The controlled system equation and the observation equation are looked as the equality constra...
详细信息
This paper searches for the leader-follower stochastic differential Stackelberg game under a partial observed information. The controlled system equation and the observation equation are looked as the equality constraints, and then variation method is used to derive the necessary condition of this differential game problem for follower and leader respectively. Finally,an example is given to illustrate its application.
In the environment of the power Internet of Things, equipment network security is mainly analyzed through the physical signal characteristics of the equipment or a single flow characteristic, so as to realize the equi...
In the environment of the power Internet of Things, equipment network security is mainly analyzed through the physical signal characteristics of the equipment or a single flow characteristic, so as to realize the equipment network abnormality detection. Therefore, a method for detecting network abnormalities of power Internet of Things terminal equipment based on device fingerprints is proposed. Aiming at the problem of incomplete detection methods, a multi-dimensional matching device fingerprint model is established. Firstly, the basic information of the device is collected, such as IP, MAC, etc.; then the network traffic information of the device is analyzed to extract the characteristics of network traffic; then, the frequency of keyword and keyword group of service protocol is counted. The device fingerprint model is established by using the traffic and service characteristics. When the network anomaly occurs, the device fingerprint model can be found effectively. The experimental results show that the device fingerprint model can detect the abnormal behavior of the device.
This paper studies the synchronization of a finite number of Kuramoto oscillators in a frequency-dependent bidirectional tree network. We assume that the coupling strength of each link in each direction is equal to th...
详细信息
暂无评论