This paper proposes linear and nonlinear filters for a non-Gaussian dynamic system with an unknown nominal covariance of the output noise.The challenge of designing a suitable filter in the presence of an unknown cova...This paper proposes linear and nonlinear filters for a non-Gaussian dynamic system with an unknown nominal covariance of the output noise.The challenge of designing a suitable filter in the presence of an unknown covariance matrix is addressed by focusing on the output data set of the system.Considering that data generated from a Gaussian distribution exhibit ellipsoidal scattering,we first propose the weighted sum of norms(SON)clustering method that prioritizes nearby points,reduces distant point influence,and lowers computational cost.Then,by introducing the weighted maximum likelihood,we propose a semi-definite program(SDP)to detect outliers and reduce their impacts on each cluster.Detecting these weights paves the way to obtain an appropriate covariance of the output noise.Next,two filtering approaches are presented:a cluster-based robust linear filter using the maximum a posterior(MAP)estimation and a clusterbased robust nonlinear filter assuming that output noise distribution stems from some Gaussian noise resources according to the ellipsoidal clusters.At last,simulation results demonstrate the effectiveness of our proposed filtering approaches.展开更多
With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also increasing.An intrusion detection system(IDS)is a secondary intelligent system for monitoring,detectin...With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also increasing.An intrusion detection system(IDS)is a secondary intelligent system for monitoring,detecting and alerting against malicious activity.IDS is important in developing advanced security models.This study reviews the importance of various techniques,tools,and methods used in IoT detection and/or prevention systems.Specifically,it focuses on machine learning(ML)and deep learning(DL)techniques for IDS.This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles.To speed up the detection of recent attacks,the proposed network architecture developed at the data processing layer is incorporated with a convolutional neural network(CNN),which performs better than a support vector machine(SVM).Processing data are enhanced using the synthetic minority oversampling technique to ensure learning accuracy.The nearest class mean classifier is applied during the testing phase to identify new attacks.Experimental results using the AWID dataset,which is one of the most common open intrusion detection datasets,revealed a higher detection accuracy(94%)compared to SVM and random forest methods.展开更多
Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications i...Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications in education,healthcare,entertainment,science,and more are being increasingly deployed based on the internet.Concurrently,malicious threats on the internet are on the rise as well.Distributed Denial of Service(DDoS)attacks are among the most common and dangerous threats on the internet today.The scale and complexity of DDoS attacks are constantly growing.Intrusion Detection Systems(IDS)have been deployed and have demonstrated their effectiveness in defense against those threats.In addition,the research of Machine Learning(ML)and Deep Learning(DL)in IDS has gained effective results and significant attention.However,one of the challenges when applying ML and DL techniques in intrusion detection is the identification of unknown attacks.These attacks,which are not encountered during the system’s training,can lead to misclassification with significant errors.In this research,we focused on addressing the issue of Unknown Attack Detection,combining two methods:Spatial Location Constraint Prototype Loss(SLCPL)and Fuzzy C-Means(FCM).With the proposed method,we achieved promising results compared to traditional methods.The proposed method demonstrates a very high accuracy of up to 99.8%with a low false positive rate for known attacks on the Intrusion Detection Evaluation Dataset(CICIDS2017)dataset.Particularly,the accuracy is also very high,reaching 99.7%,and the precision goes up to 99.9%for unknown DDoS attacks on the DDoS Evaluation Dataset(CICDDoS2019)dataset.The success of the proposed method is due to the combination of SLCPL,an advanced Open-Set Recognition(OSR)technique,and FCM,a traditional yet highly applicable clustering technique.This has yielded a novel method in the field of unknown attack detection.This further expands the trend of applying DL and ML techniques in the development of intrusion detection systems and cybersecurity.Finally,implementing the proposed method in real-world systems can enhance the security capabilities against increasingly complex threats on computer networks.展开更多
Objective: To analyze the patterns of relapse and management options in unknown primary cervical metastatic carcinoma (UPCMC) as well as to discuss its treatment strategies. Methods: Clinical data of 111 cases of elig...Objective: To analyze the patterns of relapse and management options in unknown primary cervical metastatic carcinoma (UPCMC) as well as to discuss its treatment strategies. Methods: Clinical data of 111 cases of eligible UPCMC were retrospectively studied. Neck control, primary relapse and long-term survival were compared among different groups. Results: Primary carcinomas ultimately appeared in 12 cases (10.8%, 12/111). Neck control rate was 36.9%. Overall 5-year survival rate was 41.4%. Neck control, N stage and primary control were prognostic factors for UPCMC. Neck control was affected by N stage and whether or not comprehensive radiotherapy was administered. Conclusion: UPCMC should primarily be treated by radiotherapy except for cases with N1 or N2 insensitive to radiation. Bilateral necks radiotherapy is the optimal choice in terms of neck radiotherapy. Selective total pharyngeal irradiation is recommended for potential primary treatment.展开更多
A force control strategy for position controlled robotic manipulators is presented. On line force feedback data are employed to estimate the local shape of the unknown constraint. The estimated vectors are used to ge...A force control strategy for position controlled robotic manipulators is presented. On line force feedback data are employed to estimate the local shape of the unknown constraint. The estimated vectors are used to generate the virtual reference trajectory for the target impedance model that is driven by the force error to produce command position. By following the command position trajectory the robotic manipulator can follow the unknown constraint surface while keeping an acceptable force error in a manner depicted by the target impedance model. Computer simulation on a 3 linked planar manipulator and experimental studies on an Adept 3, an SCARA type robotic manipulator, are conducted to verify the force tracking capability of the proposed control strategy.展开更多
While reading plays a very important role in English study, many English language learners find it very difficult to fully comprehend some reading materials on account of many unknown words in them. This essay mainly ...While reading plays a very important role in English study, many English language learners find it very difficult to fully comprehend some reading materials on account of many unknown words in them. This essay mainly discusses one technique of guessing meanings of new words according to context clues, thus emphasizing the importance of context.展开更多
The year 2020 was welcomed and characterized with a report of pneumonia of unknown etiology,which occurred primarily in Wuhan City of Hubei Province of China.Between 31 December 2019 and 3 January 2020,a total of 44 c...The year 2020 was welcomed and characterized with a report of pneumonia of unknown etiology,which occurred primarily in Wuhan City of Hubei Province of China.Between 31 December 2019 and 3 January 2020,a total of 44 cases in human was reported to the World Health Organization(WHO)by the Chinese Health Authorities[1].By 3 February 2020,a total of 17391 cases have been confirmed globally with 2838 new cases(China:17238;2831 new cases and 361 deaths;Outside China:153 with 7 new cases and 1 death from 23 countries)[1].展开更多
A new representation of an arbitrary and unknown N-particle state is presented at first. As an application, a scheme for teleporting an arbitrary and unknown N-particle state is proposed when N pairs of two-particle n...A new representation of an arbitrary and unknown N-particle state is presented at first. As an application, a scheme for teleporting an arbitrary and unknown N-particle state is proposed when N pairs of two-particle non- maximally entangled states are utilized as quantum channels. After Alice (sender) makes Bell-state measurement on her particles, Bob (recipient) introduces an auxiliary particle and carries out appropriate unitary transformation on his particle and the auxiliary particle depending on classical information from Alice. Then, von Neumann measurement that confirms whether the teleportation succeeds or not is performed by Bob on the auxiliary particle. In order to complete the teleportation, another N-1 times operations need to be performed which are similar to the above ones. It can be successfully realized with a certain probability which is determined by the product of the smaller coefficients of non-maximally entangled pairs. All possible unitary transformations are given in detail.展开更多
The diagnosis and treatment of fever of unknown origin (FUO) are huge challenges to clinicians.Separating the etiologies of FUO into infectious and non-infectious disease is conducive to clinical physicians not only o...The diagnosis and treatment of fever of unknown origin (FUO) are huge challenges to clinicians.Separating the etiologies of FUO into infectious and non-infectious disease is conducive to clinical physicians not only on making decisions rapidly concerning the prescription of suitable antibiotics but also on further analysis of the final diagnosis.In order to develop and validate a diagnostic tool to efficiently distinguish the etiologies of adult FUO patients as infectious or non-infectious disease,FUO patients from the departments of infectious disease and internal medicine in three Chinese tertiary hospitals were enrolled retrospectively and prospectively.By using polynomial logistic regression analysis,the diagnostic formula and the associated scoring system were developed.The variables included in this diagnostic formula were from clinical evaluations and common laboratory examinations.The proposed tool could discriminate infectious and noninfectious causes of FUO with an area under receiver operating characteristic curve (AUC) of 0.83,sensitivity of 0.80 and specificity of 0.75.This diagnosis tool could predict the infectious and non-infectious causes of FUO in the validation cohort with an AUC of 0.79,sensitivity of 0.79 and specificity of 0.70.The results suggested that this diagnostic tool could be a reliable tool to discriminate between infectious and non-infectious causes of FUO.展开更多
Unknown input observer is one of the most famous strategies for robust fault diagnosis of linear systems, but studies on nonlinear cases are not sufficient. On the other hand, the extended Kalman filter (EKF) is wel...Unknown input observer is one of the most famous strategies for robust fault diagnosis of linear systems, but studies on nonlinear cases are not sufficient. On the other hand, the extended Kalman filter (EKF) is wellknown in nonlinear estimation, and its convergence as an observer of nonlinear deterministic system has been derived recently. By combining the EKF and the unknown input Kalman filter, we propose a robust nonlinear estimator called unknown input EKF (UIEKF) and prove its convergence as a nonlinear robust observer under some mild conditions using linear matrix inequality (LMI). Simulation of a three-tank system “DTS200”, a benchmark in process control, demonstrates the robustness and effectiveness of the UIEKF as an observer for nonlinear systems with uncertainty, and the fault diagnosis based on the UIEKF is found successful.展开更多
A robust delay compensator has been developed for a class of uncertain nonlinear systems with an unknown constant input delay.The control law consists of feedback terms based on the integral of past control values and...A robust delay compensator has been developed for a class of uncertain nonlinear systems with an unknown constant input delay.The control law consists of feedback terms based on the integral of past control values and a novel filtered tracking error,capable of compensating for input delays.Suitable Lyapunov-Krasovskii functionals are used to prove global uniformly ultimately bounded(GUUB)tracking,provided certain sufficient gain conditions,dependent on the bound of the delay,are satisfied.Simulation results illustrate the performance and robustness of the controller for different values of input delay.展开更多
A unknown input observer (UIO) design for a class of linear time-delay systems when the observer error can't completely decouple from unknown input is dealt with. A sufficient condition to its existence is presente...A unknown input observer (UIO) design for a class of linear time-delay systems when the observer error can't completely decouple from unknown input is dealt with. A sufficient condition to its existence is presented based on Lyapunov stability method. Design problem of the proposed observer is formulated in term of linear matrix inequalities. Two design problems of the observer with internal delay and without internal delay are formulated. Based on H∞ control theory in time-delay systems, the proposed observer is designed in term of linear matrix inequalities (LMI). A design algorithm is proposed. The effective of the proposed approach is illustrated by a numerical example.展开更多
Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence...Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence has become a problem. For this condition, we should analyze unknown correspondence due to the influence of different correspondences.In this paper we obtain the relations of transitions based on event relations using branching processes, and build a behavioral matrix of relations. Based on the permutation of behavioral matrix, we express different correspondences, and define a new formula to compute the maximal consistency degree of two workflow nets. Additionally, this paper utilizes an example to show these definitions, computation as well as the advantages.展开更多
The formation problem of multi-agent systems via coordinated control is investigated,where the multiple agents can achieve the common velocity with leader and avoid collision during the evolution.In the real-world sit...The formation problem of multi-agent systems via coordinated control is investigated,where the multiple agents can achieve the common velocity with leader and avoid collision during the evolution.In the real-world situation,the communication is often disturbed and inaccurate.Hence,the unknown disturbances are considered in the velocity measurements,which is assumed to be bounded and does not need to be modelled.Moreover,a complicated nonlinear interaction among agents is presented in the design of control.Based on the existing work of multi-agent systems,a flocking control protocol is proposed to address the formation problem in the dynamic topology.The stability analysis is given to prove that the velocities of all agents can converge to the velocity of leader and the stable motion with collision avoidance can be achieved eventually.Finally,some simulations are presented to verify the effectiveness of the proposed algorithm.展开更多
The unknown parameter’s variance-covariance propagation and calculation in the generalized nonlinear least squares remain to be studied now, which didn’t appear in the internal and external referencing documents. Th...The unknown parameter’s variance-covariance propagation and calculation in the generalized nonlinear least squares remain to be studied now, which didn’t appear in the internal and external referencing documents. The unknown parameter’s vari- ance-covariance propagation formula, considering the two-power terms, was concluded used to evaluate the accuracy of unknown parameter estimators in the generalized nonlinear least squares problem. It is a new variance-covariance formula and opens up a new way to evaluate the accuracy when processing data which have the multi-source, multi-dimensional, multi-type, multi-time-state, different accuracy and nonlinearity.展开更多
The present study aimed to establish a list of parameters indicative of pathogen invasion and develop a predictive model to distinguish the etiologies of fever of unknown origin (FUO) into infectious and non-infectiou...The present study aimed to establish a list of parameters indicative of pathogen invasion and develop a predictive model to distinguish the etiologies of fever of unknown origin (FUO) into infectious and non-infectious causes.From January 2014 to September 2017,431 patients with FUO were prospectively enrolled in the study population.This study established a list of 26 variables from the following 4aspects:host factors,epidemiological factors,behavioral factors,and iatrogenic factors.Predefined predicted variables were included in a multivariate logistic regression analysis to develop a predictive model.The predictive model and the corresponding scoring system were developed using data from the confirmed diagnoses and 9 variables were eventually identified.These factors were incorporated into the predictive model.This model discriminated between infectious and non-infectious causes of FUO with an AUC of 0.72,sensitivity of 0.71, and specificity of 0.63.The predictive model and corresponding scoring system based on factors concerning pathogen invasion appear to be reliable screening tools to discriminate between infectious and non-infectious causes of FUO.展开更多
AIM: To investigate the prevalence and demography of microscopic colitis in patients with diarrhea of unknown etiology and normal colonoscopy in Turkey. METHODS: Between March, 1998 to July, 2005, 129 patients with ch...AIM: To investigate the prevalence and demography of microscopic colitis in patients with diarrhea of unknown etiology and normal colonoscopy in Turkey. METHODS: Between March, 1998 to July, 2005, 129 patients with chronic non-bloody diarrhea of unexplained etiology who had undergone full colonoscopy with no obvious abnormalities were included in the study. Two biopsies were obtained from all colonic segments and terminal ileum for diagnosis of microscopic colitis. On histopathologic examination, criteria for lymphocytic colitis (intraepithelial lymphocyte ≥ 20 per 100 intercryptal epithelial cells, change in surface epithelium, mononuclear infiltration of the lamina propria) and collagenous colitis (subepithelial collagen band thickness ≥ 10 μm) were explored. RESULTS: Lymphocytic colitis was diagnosed in 12 (9%) patients (Female/Male: 7/5, mean age: 45 year, range: 27-63) and collagenous colitis was diagnosed in only 3 (2.5%) patients (all female, mean age: 60 years, range: 54-65).CONCLUSION: Biopsy of Turkish patients with the diagnosis of chronic non-bloody diarrhea of unexplained etiology and normal colonoscopic findings will reveal microscopic colitis in approximately 10% of the patients. Lymphocytic colitis is 4 times more frequent than collagenous colitis in these patients.展开更多
This work proposes a robust fault detection and isolation scheme for discrete-time systems subject to actuator faults,in which a bank of H_/H∞ fault detection unknown input observers(UIOs) and a zonotopic threshold a...This work proposes a robust fault detection and isolation scheme for discrete-time systems subject to actuator faults,in which a bank of H_/H∞ fault detection unknown input observers(UIOs) and a zonotopic threshold analysis strategy are considered. In observer design, finite-frequency H_ index based on the generalized Kalman-Yakubovich-Popov lemma and H∞ technique are utilized to evaluate worst-case fault sensitivity and disturbance attenuation performance, respectively. The proposed H_/H∞ fault detection observers are designed to be insensitive to the corresponding actuator fault only, but sensitive to others.Then, to overcome the weakness of predefining threshold for FDI decision-making, this work proposes a zonotopic threshold analysis method to evaluate the generated residuals. The FDI decision-making relies on the evaluation with a dynamical zonotopic threshold. Finally, numerical simulations are provided to show the feasibility of the proposed scheme.展开更多
We read with interest the article entitled: ‘Jejuno-jejunal invagination due to intestinal melanoma’ by Resta , et al. They reported a rare clinical case of a young woman with a bleeding jejunal melanoma, whose ear...We read with interest the article entitled: ‘Jejuno-jejunal invagination due to intestinal melanoma’ by Resta , et al. They reported a rare clinical case of a young woman with a bleeding jejunal melanoma, whose early clinical presentation was an intestinal invagination. The article is also referred to the rarity of gastrointestinal melanomas as well as their possible primary nature.展开更多
文摘This paper proposes linear and nonlinear filters for a non-Gaussian dynamic system with an unknown nominal covariance of the output noise.The challenge of designing a suitable filter in the presence of an unknown covariance matrix is addressed by focusing on the output data set of the system.Considering that data generated from a Gaussian distribution exhibit ellipsoidal scattering,we first propose the weighted sum of norms(SON)clustering method that prioritizes nearby points,reduces distant point influence,and lowers computational cost.Then,by introducing the weighted maximum likelihood,we propose a semi-definite program(SDP)to detect outliers and reduce their impacts on each cluster.Detecting these weights paves the way to obtain an appropriate covariance of the output noise.Next,two filtering approaches are presented:a cluster-based robust linear filter using the maximum a posterior(MAP)estimation and a clusterbased robust nonlinear filter assuming that output noise distribution stems from some Gaussian noise resources according to the ellipsoidal clusters.At last,simulation results demonstrate the effectiveness of our proposed filtering approaches.
基金The author extends the appreciation to the Deanship of Postgraduate Studies and Scientific Research atMajmaah University for funding this research work through the project number(R-2024-920).
文摘With the increasing number of connected devices in the Internet of Things(IoT)era,the number of intrusions is also increasing.An intrusion detection system(IDS)is a secondary intelligent system for monitoring,detecting and alerting against malicious activity.IDS is important in developing advanced security models.This study reviews the importance of various techniques,tools,and methods used in IoT detection and/or prevention systems.Specifically,it focuses on machine learning(ML)and deep learning(DL)techniques for IDS.This paper proposes an accurate intrusion detection model to detect traditional and new attacks on the Internet of Vehicles.To speed up the detection of recent attacks,the proposed network architecture developed at the data processing layer is incorporated with a convolutional neural network(CNN),which performs better than a support vector machine(SVM).Processing data are enhanced using the synthetic minority oversampling technique to ensure learning accuracy.The nearest class mean classifier is applied during the testing phase to identify new attacks.Experimental results using the AWID dataset,which is one of the most common open intrusion detection datasets,revealed a higher detection accuracy(94%)compared to SVM and random forest methods.
基金This research was partly supported by the National Science and Technology Council,Taiwan with Grant Numbers 112-2221-E-992-045,112-2221-E-992-057-MY3 and 112-2622-8-992-009-TD1.
文摘Since its inception,the Internet has been rapidly evolving.With the advancement of science and technology and the explosive growth of the population,the demand for the Internet has been on the rise.Many applications in education,healthcare,entertainment,science,and more are being increasingly deployed based on the internet.Concurrently,malicious threats on the internet are on the rise as well.Distributed Denial of Service(DDoS)attacks are among the most common and dangerous threats on the internet today.The scale and complexity of DDoS attacks are constantly growing.Intrusion Detection Systems(IDS)have been deployed and have demonstrated their effectiveness in defense against those threats.In addition,the research of Machine Learning(ML)and Deep Learning(DL)in IDS has gained effective results and significant attention.However,one of the challenges when applying ML and DL techniques in intrusion detection is the identification of unknown attacks.These attacks,which are not encountered during the system’s training,can lead to misclassification with significant errors.In this research,we focused on addressing the issue of Unknown Attack Detection,combining two methods:Spatial Location Constraint Prototype Loss(SLCPL)and Fuzzy C-Means(FCM).With the proposed method,we achieved promising results compared to traditional methods.The proposed method demonstrates a very high accuracy of up to 99.8%with a low false positive rate for known attacks on the Intrusion Detection Evaluation Dataset(CICIDS2017)dataset.Particularly,the accuracy is also very high,reaching 99.7%,and the precision goes up to 99.9%for unknown DDoS attacks on the DDoS Evaluation Dataset(CICDDoS2019)dataset.The success of the proposed method is due to the combination of SLCPL,an advanced Open-Set Recognition(OSR)technique,and FCM,a traditional yet highly applicable clustering technique.This has yielded a novel method in the field of unknown attack detection.This further expands the trend of applying DL and ML techniques in the development of intrusion detection systems and cybersecurity.Finally,implementing the proposed method in real-world systems can enhance the security capabilities against increasingly complex threats on computer networks.
文摘Objective: To analyze the patterns of relapse and management options in unknown primary cervical metastatic carcinoma (UPCMC) as well as to discuss its treatment strategies. Methods: Clinical data of 111 cases of eligible UPCMC were retrospectively studied. Neck control, primary relapse and long-term survival were compared among different groups. Results: Primary carcinomas ultimately appeared in 12 cases (10.8%, 12/111). Neck control rate was 36.9%. Overall 5-year survival rate was 41.4%. Neck control, N stage and primary control were prognostic factors for UPCMC. Neck control was affected by N stage and whether or not comprehensive radiotherapy was administered. Conclusion: UPCMC should primarily be treated by radiotherapy except for cases with N1 or N2 insensitive to radiation. Bilateral necks radiotherapy is the optimal choice in terms of neck radiotherapy. Selective total pharyngeal irradiation is recommended for potential primary treatment.
文摘A force control strategy for position controlled robotic manipulators is presented. On line force feedback data are employed to estimate the local shape of the unknown constraint. The estimated vectors are used to generate the virtual reference trajectory for the target impedance model that is driven by the force error to produce command position. By following the command position trajectory the robotic manipulator can follow the unknown constraint surface while keeping an acceptable force error in a manner depicted by the target impedance model. Computer simulation on a 3 linked planar manipulator and experimental studies on an Adept 3, an SCARA type robotic manipulator, are conducted to verify the force tracking capability of the proposed control strategy.
文摘While reading plays a very important role in English study, many English language learners find it very difficult to fully comprehend some reading materials on account of many unknown words in them. This essay mainly discusses one technique of guessing meanings of new words according to context clues, thus emphasizing the importance of context.
文摘The year 2020 was welcomed and characterized with a report of pneumonia of unknown etiology,which occurred primarily in Wuhan City of Hubei Province of China.Between 31 December 2019 and 3 January 2020,a total of 44 cases in human was reported to the World Health Organization(WHO)by the Chinese Health Authorities[1].By 3 February 2020,a total of 17391 cases have been confirmed globally with 2838 new cases(China:17238;2831 new cases and 361 deaths;Outside China:153 with 7 new cases and 1 death from 23 countries)[1].
文摘A new representation of an arbitrary and unknown N-particle state is presented at first. As an application, a scheme for teleporting an arbitrary and unknown N-particle state is proposed when N pairs of two-particle non- maximally entangled states are utilized as quantum channels. After Alice (sender) makes Bell-state measurement on her particles, Bob (recipient) introduces an auxiliary particle and carries out appropriate unitary transformation on his particle and the auxiliary particle depending on classical information from Alice. Then, von Neumann measurement that confirms whether the teleportation succeeds or not is performed by Bob on the auxiliary particle. In order to complete the teleportation, another N-1 times operations need to be performed which are similar to the above ones. It can be successfully realized with a certain probability which is determined by the product of the smaller coefficients of non-maximally entangled pairs. All possible unitary transformations are given in detail.
文摘The diagnosis and treatment of fever of unknown origin (FUO) are huge challenges to clinicians.Separating the etiologies of FUO into infectious and non-infectious disease is conducive to clinical physicians not only on making decisions rapidly concerning the prescription of suitable antibiotics but also on further analysis of the final diagnosis.In order to develop and validate a diagnostic tool to efficiently distinguish the etiologies of adult FUO patients as infectious or non-infectious disease,FUO patients from the departments of infectious disease and internal medicine in three Chinese tertiary hospitals were enrolled retrospectively and prospectively.By using polynomial logistic regression analysis,the diagnostic formula and the associated scoring system were developed.The variables included in this diagnostic formula were from clinical evaluations and common laboratory examinations.The proposed tool could discriminate infectious and noninfectious causes of FUO with an area under receiver operating characteristic curve (AUC) of 0.83,sensitivity of 0.80 and specificity of 0.75.This diagnosis tool could predict the infectious and non-infectious causes of FUO in the validation cohort with an AUC of 0.79,sensitivity of 0.79 and specificity of 0.70.The results suggested that this diagnostic tool could be a reliable tool to discriminate between infectious and non-infectious causes of FUO.
基金Supported by the National Natural Science Foundation of China (No. 60234010, 60574084)the Field Bus Technology & Automation Key Lab of Beijing at North China and the National 973 Program of China (No. 2002CB312200).
文摘Unknown input observer is one of the most famous strategies for robust fault diagnosis of linear systems, but studies on nonlinear cases are not sufficient. On the other hand, the extended Kalman filter (EKF) is wellknown in nonlinear estimation, and its convergence as an observer of nonlinear deterministic system has been derived recently. By combining the EKF and the unknown input Kalman filter, we propose a robust nonlinear estimator called unknown input EKF (UIEKF) and prove its convergence as a nonlinear robust observer under some mild conditions using linear matrix inequality (LMI). Simulation of a three-tank system “DTS200”, a benchmark in process control, demonstrates the robustness and effectiveness of the UIEKF as an observer for nonlinear systems with uncertainty, and the fault diagnosis based on the UIEKF is found successful.
文摘A robust delay compensator has been developed for a class of uncertain nonlinear systems with an unknown constant input delay.The control law consists of feedback terms based on the integral of past control values and a novel filtered tracking error,capable of compensating for input delays.Suitable Lyapunov-Krasovskii functionals are used to prove global uniformly ultimately bounded(GUUB)tracking,provided certain sufficient gain conditions,dependent on the bound of the delay,are satisfied.Simulation results illustrate the performance and robustness of the controller for different values of input delay.
基金This project was supported by the National Natural Science Foundation of China(60374024)
文摘A unknown input observer (UIO) design for a class of linear time-delay systems when the observer error can't completely decouple from unknown input is dealt with. A sufficient condition to its existence is presented based on Lyapunov stability method. Design problem of the proposed observer is formulated in term of linear matrix inequalities. Two design problems of the observer with internal delay and without internal delay are formulated. Based on H∞ control theory in time-delay systems, the proposed observer is designed in term of linear matrix inequalities (LMI). A design algorithm is proposed. The effective of the proposed approach is illustrated by a numerical example.
基金supported in part by the National Key R&D Program of China(2017YFB1001804)Shanghai Science and Technology Innovation Action Plan Project(16511100900)the National Natural Science Foundation of China(61572360)
文摘Consistency degree calculation is established on the basis of known correspondence, but in real life, the correspondence is generally unknown, so how to calculate consistency of two models under unknown correspondence has become a problem. For this condition, we should analyze unknown correspondence due to the influence of different correspondences.In this paper we obtain the relations of transitions based on event relations using branching processes, and build a behavioral matrix of relations. Based on the permutation of behavioral matrix, we express different correspondences, and define a new formula to compute the maximal consistency degree of two workflow nets. Additionally, this paper utilizes an example to show these definitions, computation as well as the advantages.
基金the National Key Research and Development Program of China(No.2021ZD0112500)the National Natural Scientific Foundation of China(No.12072128)。
文摘The formation problem of multi-agent systems via coordinated control is investigated,where the multiple agents can achieve the common velocity with leader and avoid collision during the evolution.In the real-world situation,the communication is often disturbed and inaccurate.Hence,the unknown disturbances are considered in the velocity measurements,which is assumed to be bounded and does not need to be modelled.Moreover,a complicated nonlinear interaction among agents is presented in the design of control.Based on the existing work of multi-agent systems,a flocking control protocol is proposed to address the formation problem in the dynamic topology.The stability analysis is given to prove that the velocities of all agents can converge to the velocity of leader and the stable motion with collision avoidance can be achieved eventually.Finally,some simulations are presented to verify the effectiveness of the proposed algorithm.
基金Supported by the National Natural Science Foundation of China (40174003)
文摘The unknown parameter’s variance-covariance propagation and calculation in the generalized nonlinear least squares remain to be studied now, which didn’t appear in the internal and external referencing documents. The unknown parameter’s vari- ance-covariance propagation formula, considering the two-power terms, was concluded used to evaluate the accuracy of unknown parameter estimators in the generalized nonlinear least squares problem. It is a new variance-covariance formula and opens up a new way to evaluate the accuracy when processing data which have the multi-source, multi-dimensional, multi-type, multi-time-state, different accuracy and nonlinearity.
文摘The present study aimed to establish a list of parameters indicative of pathogen invasion and develop a predictive model to distinguish the etiologies of fever of unknown origin (FUO) into infectious and non-infectious causes.From January 2014 to September 2017,431 patients with FUO were prospectively enrolled in the study population.This study established a list of 26 variables from the following 4aspects:host factors,epidemiological factors,behavioral factors,and iatrogenic factors.Predefined predicted variables were included in a multivariate logistic regression analysis to develop a predictive model.The predictive model and the corresponding scoring system were developed using data from the confirmed diagnoses and 9 variables were eventually identified.These factors were incorporated into the predictive model.This model discriminated between infectious and non-infectious causes of FUO with an AUC of 0.72,sensitivity of 0.71, and specificity of 0.63.The predictive model and corresponding scoring system based on factors concerning pathogen invasion appear to be reliable screening tools to discriminate between infectious and non-infectious causes of FUO.
文摘AIM: To investigate the prevalence and demography of microscopic colitis in patients with diarrhea of unknown etiology and normal colonoscopy in Turkey. METHODS: Between March, 1998 to July, 2005, 129 patients with chronic non-bloody diarrhea of unexplained etiology who had undergone full colonoscopy with no obvious abnormalities were included in the study. Two biopsies were obtained from all colonic segments and terminal ileum for diagnosis of microscopic colitis. On histopathologic examination, criteria for lymphocytic colitis (intraepithelial lymphocyte ≥ 20 per 100 intercryptal epithelial cells, change in surface epithelium, mononuclear infiltration of the lamina propria) and collagenous colitis (subepithelial collagen band thickness ≥ 10 μm) were explored. RESULTS: Lymphocytic colitis was diagnosed in 12 (9%) patients (Female/Male: 7/5, mean age: 45 year, range: 27-63) and collagenous colitis was diagnosed in only 3 (2.5%) patients (all female, mean age: 60 years, range: 54-65).CONCLUSION: Biopsy of Turkish patients with the diagnosis of chronic non-bloody diarrhea of unexplained etiology and normal colonoscopic findings will reveal microscopic colitis in approximately 10% of the patients. Lymphocytic colitis is 4 times more frequent than collagenous colitis in these patients.
基金partially supported by National Key R&D Program of China(2018YFB1304600)National Natural Science Foundation of China(51805021,U1813220)+1 种基金China Postdoctoral Science Foundation Grant(2018M631311)the Fundamental Research Funds for the Central Universities(XK1802-4)
文摘This work proposes a robust fault detection and isolation scheme for discrete-time systems subject to actuator faults,in which a bank of H_/H∞ fault detection unknown input observers(UIOs) and a zonotopic threshold analysis strategy are considered. In observer design, finite-frequency H_ index based on the generalized Kalman-Yakubovich-Popov lemma and H∞ technique are utilized to evaluate worst-case fault sensitivity and disturbance attenuation performance, respectively. The proposed H_/H∞ fault detection observers are designed to be insensitive to the corresponding actuator fault only, but sensitive to others.Then, to overcome the weakness of predefining threshold for FDI decision-making, this work proposes a zonotopic threshold analysis method to evaluate the generated residuals. The FDI decision-making relies on the evaluation with a dynamical zonotopic threshold. Finally, numerical simulations are provided to show the feasibility of the proposed scheme.
文摘We read with interest the article entitled: ‘Jejuno-jejunal invagination due to intestinal melanoma’ by Resta , et al. They reported a rare clinical case of a young woman with a bleeding jejunal melanoma, whose early clinical presentation was an intestinal invagination. The article is also referred to the rarity of gastrointestinal melanomas as well as their possible primary nature.