期刊文献+
共找到1,182,981篇文章
< 1 2 250 >
每页显示 20 50 100
Conventional Geothermal Systems and Unconventional Geothermal Developments: An Overview 被引量:1
1
作者 Maryam Khodayar Sveinbjörn Björnsson 《Open Journal of Geology》 CAS 2024年第2期196-246,共51页
This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal syste... This paper provides an overview of conventional geothermal systems and unconventional geothermal developments as a common reference is needed for discussions between energy professionals. Conventional geothermal systems have the heat, permeability and fluid, requiring only drilling down to °C, normal heat flow or decaying radiogenic granite as heat sources, and used in district heating. Medium-temperature (MT) 100°C - 190°C, and high-temperature (HT) 190°C - 374°C resources are mostly at plate boundaries, with volcanic intrusive heat source, used mostly for electricity generation. Single well capacities are °C - 500°C) and a range of depths (1 m to 20 Km), but lack permeability or fluid, thus requiring stimulations for heat extraction by conduction. HVAC is 1 - 2 m deep and shallow geothermal down to 500 m in wells, both capturing °C, with °C are either advanced by geothermal developers at <7 Km depth (Enhanced Geothermal Systems (EGS), drilling below brittle-ductile transition zones and under geothermal fields), or by the Oil & Gas industry (Advanced Geothermal Systems, heat recovery from hydrocarbon wells or reservoirs, Superhot Rock Geothermal, and millimeter-wave drilling down to 20 Km). Their primary aim is electricity generation, relying on closed-loops, but EGS uses fractures for heat exchange with earthquake risks during fracking. Unconventional approaches could be everywhere, with shallow geothermal already functional. The deeper and hotter unconventional alternatives are still experimental, overcoming costs and technological challenges to become fully commercial. Meanwhile, the conventional geothermal resources remain the most proven opportunities for investments and development. 展开更多
关键词 Conventional Geothermal systems Unconventional Geothermal Developments Shallow and Deep Closed-Loops Enhanced Geothermal systems Supercritical and Millimeter-Wave Drilling
下载PDF
Systems Theory-Driven Framework for AI Integration into the Holistic Material Basis Research of Traditional Chinese Medicine 被引量:1
2
作者 Jingqi Zeng Xiaobin Jia 《Engineering》 SCIE EI CAS CSCD 2024年第9期28-50,共23页
This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhe... This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhering to evidence-based principles.Utilizing the System Function Decoding Model(SFDM),the research progresses through define,quantify,infer,and validate phases to systematically explore TCM’s material basis.It employs a dual analytical approach that combines top-down,systems theory-guided perspectives with bottom-up,elements-structure-function methodologies,provides comprehensive insights into TCM’s holistic material basis.Moreover,the research examines AI’s role in quantitative assessment and predictive analysis of TCM’s material components,proposing two specific AIdriven technical applications.This interdisciplinary effort underscores AI’s potential to enhance our understanding of TCM’s holistic material basis and establishes a foundation for future research at the intersection of traditional wisdom and modern technology. 展开更多
关键词 Artificial intelligence systems theory Traditional Chinese medicine Material basis BOTTOM-UP
下载PDF
Computational Experiments for Complex Social Systems:Experiment Design and Generative Explanation 被引量:2
3
作者 Xiao Xue Deyu Zhou +5 位作者 Xiangning Yu Gang Wang Juanjuan Li Xia Xie Lizhen Cui Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期1022-1038,共17页
Powered by advanced information technology,more and more complex systems are exhibiting characteristics of the cyber-physical-social systems(CPSS).In this context,computational experiments method has emerged as a nove... Powered by advanced information technology,more and more complex systems are exhibiting characteristics of the cyber-physical-social systems(CPSS).In this context,computational experiments method has emerged as a novel approach for the design,analysis,management,control,and integration of CPSS,which can realize the causal analysis of complex systems by means of“algorithmization”of“counterfactuals”.However,because CPSS involve human and social factors(e.g.,autonomy,initiative,and sociality),it is difficult for traditional design of experiment(DOE)methods to achieve the generative explanation of system emergence.To address this challenge,this paper proposes an integrated approach to the design of computational experiments,incorporating three key modules:1)Descriptive module:Determining the influencing factors and response variables of the system by means of the modeling of an artificial society;2)Interpretative module:Selecting factorial experimental design solution to identify the relationship between influencing factors and macro phenomena;3)Predictive module:Building a meta-model that is equivalent to artificial society to explore its operating laws.Finally,a case study of crowd-sourcing platforms is presented to illustrate the application process and effectiveness of the proposed approach,which can reveal the social impact of algorithmic behavior on“rider race”. 展开更多
关键词 Agent-based modeling computational experiments cyber-physical-social systems(CPSS) generative deduction generative experiments meta model
下载PDF
Prescribed Performance Tracking Control of Time-Delay Nonlinear Systems With Output Constraints 被引量:1
4
作者 Jin-Xi Zhang Kai-Di Xu Qing-Guo Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1557-1565,共9页
The problem of prescribed performance tracking control for unknown time-delay nonlinear systems subject to output constraints is dealt with in this paper. In contrast with related works, only the most fundamental requ... The problem of prescribed performance tracking control for unknown time-delay nonlinear systems subject to output constraints is dealt with in this paper. In contrast with related works, only the most fundamental requirements, i.e., boundedness and the local Lipschitz condition, are assumed for the allowable time delays. Moreover, we focus on the case where the reference is unknown beforehand, which renders the standard prescribed performance control designs under output constraints infeasible. To conquer these challenges, a novel robust prescribed performance control approach is put forward in this paper.Herein, a reverse tuning function is skillfully constructed and automatically generates a performance envelop for the tracking error. In addition, a unified performance analysis framework based on proof by contradiction and the barrier function is established to reveal the inherent robustness of the control system against the time delays. It turns out that the system output tracks the reference with a preassigned settling time and good accuracy,without constraint violations. A comparative simulation on a two-stage chemical reactor is carried out to illustrate the above theoretical findings. 展开更多
关键词 Nonlinear systems output constraints prescribed performance reference tracking time delays
下载PDF
Finite-time Prescribed Performance Time-Varying Formation Control for Second-Order Multi-Agent Systems With Non-Strict Feedback Based on a Neural Network Observer 被引量:1
5
作者 Chi Ma Dianbiao Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期1039-1050,共12页
This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eli... This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eliminate nonlinearities,neural networks are applied to approximate the inherent dynamics of the system.In addition,due to the limitations of the actual working conditions,each follower agent can only obtain the locally measurable partial state information of the leader agent.To address this problem,a neural network state observer based on the leader state information is designed.Then,a finite-time prescribed performance adaptive output feedback control strategy is proposed by restricting the sliding mode surface to a prescribed region,which ensures that the closed-loop system has practical finite-time stability and that formation errors of the multi-agent systems converge to the prescribed performance bound in finite time.Finally,a numerical simulation is provided to demonstrate the practicality and effectiveness of the developed algorithm. 展开更多
关键词 Finite-time control multi-agent systems neural network prescribed performance control time-varying formation control
下载PDF
Attribute Reduction of Hybrid Decision Information Systems Based on Fuzzy Conditional Information Entropy 被引量:1
6
作者 Xiaoqin Ma Jun Wang +1 位作者 Wenchang Yu Qinli Zhang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2063-2083,共21页
The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attr... The presence of numerous uncertainties in hybrid decision information systems(HDISs)renders attribute reduction a formidable task.Currently available attribute reduction algorithms,including those based on Pawlak attribute importance,Skowron discernibility matrix,and information entropy,struggle to effectively manages multiple uncertainties simultaneously in HDISs like the precise measurement of disparities between nominal attribute values,and attributes with fuzzy boundaries and abnormal values.In order to address the aforementioned issues,this paper delves into the study of attribute reduction withinHDISs.First of all,a novel metric based on the decision attribute is introduced to solve the problem of accurately measuring the differences between nominal attribute values.The newly introduced distance metric has been christened the supervised distance that can effectively quantify the differences between the nominal attribute values.Then,based on the newly developed metric,a novel fuzzy relationship is defined from the perspective of“feedback on parity of attribute values to attribute sets”.This new fuzzy relationship serves as a valuable tool in addressing the challenges posed by abnormal attribute values.Furthermore,leveraging the newly introduced fuzzy relationship,the fuzzy conditional information entropy is defined as a solution to the challenges posed by fuzzy attributes.It effectively quantifies the uncertainty associated with fuzzy attribute values,thereby providing a robust framework for handling fuzzy information in hybrid information systems.Finally,an algorithm for attribute reduction utilizing the fuzzy conditional information entropy is presented.The experimental results on 12 datasets show that the average reduction rate of our algorithm reaches 84.04%,and the classification accuracy is improved by 3.91%compared to the original dataset,and by an average of 11.25%compared to the other 9 state-of-the-art reduction algorithms.The comprehensive analysis of these research results clearly indicates that our algorithm is highly effective in managing the intricate uncertainties inherent in hybrid data. 展开更多
关键词 Hybrid decision information systems fuzzy conditional information entropy attribute reduction fuzzy relationship rough set theory(RST)
下载PDF
Mass Transfer-Promoted Fe^(2+)/Fe^(3+)Circulation Steered by 3D Flow-Through Co-Catalyst System Toward Sustainable Advanced Oxidation Processes
7
作者 Weiyang Lv Hao Li +6 位作者 Jinhui Wang Lixin Wang Zenglong Wu Yuge Wang Wenkai Song Wenkai Cheng Yuyuan Yao 《Engineering》 SCIE EI CAS CSCD 2024年第5期264-275,共12页
Realizing fast and continuous generation of reactive oxygen species(ROSs)via iron-based advanced oxidation processes(AOPs)is significant in the environmental and biological fields.However,current AOPs assisted by co-c... Realizing fast and continuous generation of reactive oxygen species(ROSs)via iron-based advanced oxidation processes(AOPs)is significant in the environmental and biological fields.However,current AOPs assisted by co-catalysts still suffer from the poor mass/electron transfer and non-durable promotion effect,giving rise to the sluggish Fe^(2+)/Fe^(3+)cycle and low dynamic concentration of Fe^(2+)for ROS production.Herein,we present a three-dimensional(3D)macroscale co-catalyst functionalized with molybdenum disulfide(MoS_(2))to achieve ultra-efficient Fe^(2+)regeneration(equilibrium Fe^(2+)ratio of 82.4%)and remarkable stability(more than 20 cycles)via a circulating flow-through process.Unlike the conventional batch-type reactor,experiments and computational fluid dynamics simulations demonstrate that the optimal utilization of the 3D active area under the flow-through mode,initiated by the convectionenhanced mass/charge transfer for Fe^(2+)reduction and then strengthened by MoS_(2)-induced flow rotation for sufficient reactant mixing,is crucial for oxidant activation and subsequent ROS generation.Strikingly,the flow-through co-catalytic system with superwetting capabilities can even tackle the intricate oily wastewater stabilized by different surfactants without the loss of pollutant degradation efficiency.Our findings highlight an innovative co-catalyst system design to expand the applicability of AOPs based technology,especially in large-scale complex wastewater treatment. 展开更多
关键词 Advanced oxidation processes 3D co-catalyst flow-through mode Enhanced mass transfer Complex wastewater treatment
下载PDF
Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems
8
作者 Xia Li Zhanyou Ma +3 位作者 Zhibao Mian Ziyuan Liu Ruiqi Huang Nana He 《Computers, Materials & Continua》 SCIE EI 2024年第3期4129-4152,共24页
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s... Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system. 展开更多
关键词 Model checking multi-agent systems fuzzy epistemic interpreted systems fuzzy computation tree logic transformation algorithm
下载PDF
Optimal Multi-Timescale Scheduling of Integrated Energy Systems with Hybrid Energy Storage System Based on Lyapunov Optimization
9
作者 Yehui Ma Dong Han Zhuoxin Lu 《Journal of Beijing Institute of Technology》 EI CAS 2024年第5期465-480,共16页
The economic operation of integrated energy system(IES)faces new challenges such as multi-timescale characteristics of heterogeneous energy sources,and cooperative operation of hybrid energy storage system(HESS).To th... The economic operation of integrated energy system(IES)faces new challenges such as multi-timescale characteristics of heterogeneous energy sources,and cooperative operation of hybrid energy storage system(HESS).To this end,this paper investigates the multi-timescale rolling opti-mization problem for IES integrated with HESS.Firstly,the architecture of IES with HESS is established,a comparative analysis is conducted to evaluate the advantages of the HESS over a single energy storage system(SESS)in stabilizing power fluctuations.Secondly,the dayahead and real-time scheduling cost functions of IES are established,the day-ahead scheduling mainly depends on operation costs of the components in IES,the real-time optimal scheduling adopts the Lya-punov optimization method to schedule the battery and hydrogen energy storage in each time slot,so as to minimize the real-time average scheduling operation cost,and the problem of day-ahead and real-time scheduling error,which caused by the uncertainty of the energy storage is solved by online optimization.Finally,the proposed model is verified to reduce the scheduling operation cost and the dispatching error by performing an arithmetic example analysis of the IES in Shanghai,which provides a reference for the safe and stable operation of the IES. 展开更多
关键词 integrated energy systems multiple time scales hybrid energy storage systems Lya-punov optimization
下载PDF
Anomalous time-reversal symmetric non-Hermitian systems
10
作者 易益妃 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期162-166,共5页
The conditions for the emergence of the non-Hermitian skin effect, as a unique physical response of non-Hermitian systems, have now become one of the hot research topics. In this paper, we study the novel physical res... The conditions for the emergence of the non-Hermitian skin effect, as a unique physical response of non-Hermitian systems, have now become one of the hot research topics. In this paper, we study the novel physical responses of nonHermitian systems with anomalous time-reversal symmetry, in both one dimension and two dimensions. Specifically, we focus on whether the systems will exhibit a non-Hermitian skin effect. We employ the theory of generalized Brillouin zone and also numerical methods to show that the anomalous time-reversal symmetry can prevent the skin effect in onedimensional non-Hermitian systems, but is unable to exert the same effectiveness in two-dimensional cases. 展开更多
关键词 skin effect SYMMETRY non-Hermitian systems
下载PDF
Numerical simulation for the initial state of avalanche in polydisperse particle systems
11
作者 韩韧 李亭 +2 位作者 迟志鹏 杨晖 李然 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期405-412,共8页
Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle systems.Nucleation and propagation processes are illustrated for pentadisperse and triadisperse particle systems,... Numerical simulation is employed to investigate the initial state of avalanche in polydisperse particle systems.Nucleation and propagation processes are illustrated for pentadisperse and triadisperse particle systems,respectively.In these processes,particles involved in the avalanche grow slowly in the early stage and explosively in the later stage,which is clearly different from the continuous and steady growth trend in the monodisperse system.By examining the avalanche propagation,the number growth of particles involved in the avalanche and the slope of the number growth,the initial state can be divided into three stages:T1(nucleation stage),T2(propagation stage),T3(overall avalanche stage).We focus on the characteristics of the avalanche in the T2 stage,and find that propagation distances increase almost linearly in both axial and radial directions in polydisperse systems.We also consider the distribution characteristics of the average coordination number and average velocity for the moving particles.The results support that the polydisperse particle systems are more stable in the T2 stage. 展开更多
关键词 AVALANCHE initial state polydisperse particle systems PROPAGATION
下载PDF
Quantum discord and its dynamics for multipartite systems
12
作者 罗嘉欣 郭琼 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期168-175,共8页
Quantum discord, one of the famous quantum correlations, has been recently generalized to multipartite systems by Radhakrishnan et al. Here we give analytical solutions of the quantum discord for a family of N-qubit q... Quantum discord, one of the famous quantum correlations, has been recently generalized to multipartite systems by Radhakrishnan et al. Here we give analytical solutions of the quantum discord for a family of N-qubit quantum states. For the bipartite system, we derive a zero quantum discord which will remain unchanged under the phase damping channel. For multiparitite systems, it is found that the quantum discord can be classified into three categories and the quantum discord for odd-partite systems can exhibit freezing under the phase damping channel, while the freezing does not exist in the even-partite systems. 展开更多
关键词 quantum discord multipartite systems decoherence channels frozen discord
下载PDF
Bipartite consensus problems of Lurie multi-agent systems over signed graphs: A contraction approach
13
作者 张晓娇 吴祥 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期137-145,共9页
This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theor... This paper examines the bipartite consensus problems for the nonlinear multi-agent systems in Lurie dynamics form with cooperative and competitive communication between different agents. Based on the contraction theory, some new conditions for the nonlinear Lurie multi-agent systems reaching bipartite leaderless consensus and bipartite tracking consensus are presented. Compared with the traditional methods, this approach degrades the dimensions of the conditions, eliminates some restrictions of the system matrix, and extends the range of the nonlinear function. Finally, two numerical examples are provided to illustrate the efficiency of our results. 展开更多
关键词 contraction theory virtual system bipartite consensus Lurie multi-agent systems
下载PDF
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
14
作者 Muhammad Ahmad Nawaz Ul Ghani Kun She +4 位作者 Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga 《Computers, Materials & Continua》 SCIE EI 2024年第5期2609-2623,共15页
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity. 展开更多
关键词 Facial recognition privacy protection blockchain GAN distributed systems
下载PDF
Analysis and Design of Time-Delay Impulsive Systems Subject to Actuator Saturation
15
作者 Chenhong Zhu Xiuping Han Xiaodi Li 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期196-204,共9页
This paper investigates the exponential stability and performance analysis of nonlinear time-delay impulsive systems subject to actuator saturation. When continuous dynamics is unstable, under some conditions, it is s... This paper investigates the exponential stability and performance analysis of nonlinear time-delay impulsive systems subject to actuator saturation. When continuous dynamics is unstable, under some conditions, it is shown that the system can be stabilized by a class of saturated delayed-impulses regardless of the length of input delays. Conversely, when the system is originally stable, it is shown that under some conditions, the system is robust with respect to sufficient small delayed-impulses. Moreover, the design problem of the controller with the goal of obtaining a maximized estimate of the domain of attraction is formulated via a convex optimization problem. Three examples are provided to demonstrate the validity of the main results. 展开更多
关键词 Delayed impulses impulsive control impulsive disturbance nonlinear systems SATURATION
下载PDF
A Survey on Type-3 Fuzzy Logic Systems and Their Control Applications
16
作者 Oscar Castillo Fevrier Valdez +1 位作者 Patricia Melin Weiping Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1744-1756,共13页
In this paper,we offer a review of type-3 fuzzy logic systems and their applications in control.The main objective of this work is to observe and analyze in detail the applications in the control area using type-3 fuz... In this paper,we offer a review of type-3 fuzzy logic systems and their applications in control.The main objective of this work is to observe and analyze in detail the applications in the control area using type-3 fuzzy logic systems.In this case,we review their most important applications in control and other related topics with type-3 fuzzy systems.Intelligent algorithms have been receiving increasing attention in control and for this reason a review in this area is important.This paper reviews the main applications that make use of Intelligent Computing methods.Specifically,type-3 fuzzy logic systems.The aim of this research is to be able to appreciate,in detail,the applications in control systems and to point out the scientific trends in the use of Intelligent Computing techniques.This is done with the construction and visualization of bibliometric networks,developed with VosViewer Software,which it is a free Java-based program,mainly intended to be used for analyzing and visualizing bibliometric networks.With this tool,we can create maps of publications,authors,or journals based on a co-citation network or construct maps of keywords,countries based on a co-occurrence networks,research groups,etc. 展开更多
关键词 Applications control systems optimization REVIEW type-3 fuzzy logic.
下载PDF
Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information
17
作者 Honghai Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期878-892,共15页
This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consens... This paper is concerned with consensus of a secondorder linear time-invariant multi-agent system in the situation that there exists a communication delay among the agents in the network.A proportional-integral consensus protocol is designed by using delayed and memorized state information.Under the proportional-integral consensus protocol,the consensus problem of the multi-agent system is transformed into the problem of asymptotic stability of the corresponding linear time-invariant time-delay system.Note that the location of the eigenvalues of the corresponding characteristic function of the linear time-invariant time-delay system not only determines the stability of the system,but also plays a critical role in the dynamic performance of the system.In this paper,based on recent results on the distribution of roots of quasi-polynomials,several necessary conditions for Hurwitz stability for a class of quasi-polynomials are first derived.Then allowable regions of consensus protocol parameters are estimated.Some necessary and sufficient conditions for determining effective protocol parameters are provided.The designed protocol can achieve consensus and improve the dynamic performance of the second-order multi-agent system.Moreover,the effects of delays on consensus of systems of harmonic oscillators/double integrators under proportional-integral consensus protocols are investigated.Furthermore,some results on proportional-integral consensus are derived for a class of high-order linear time-invariant multi-agent systems. 展开更多
关键词 Consensus protocol Hurwitz stability multi-agent systems quasi-polynomials time delay
下载PDF
Microphysiological systems for modeling gut-organ interaction
18
作者 JONG HWAN SUNG 《BIOCELL》 SCIE 2024年第8期1145-1153,共9页
The gut is a digestive organ that absorbs nutrients but also plays a vital role in immune response and defense against external compounds.The complex interaction between the gut microbiota and other organs including t... The gut is a digestive organ that absorbs nutrients but also plays a vital role in immune response and defense against external compounds.The complex interaction between the gut microbiota and other organs including the immune system of the host has been known in various contexts,yielding the notion of‘axes’between the gut and other organs.While the presence of various gut-organ axes has been reported,the lack of adequate in vitro model systems for studying this interaction has restricted a deeper insight into these phenomena.Recently developed microphysiological systems(MPS),also known as organ-on-a-chip,allow researchers to study complex interactions between diverse organs,and here we provide a review of how recently developed gut-on-a-chip systems are used for building models of various diseases that were difficult to study. 展开更多
关键词 MICROFLUIDICS Gut-liver axis Gut-brain axis Microphysiological systems
下载PDF
A PID Tuning Approach for Inertial Systems Performance Optimization
19
作者 Irina Cojuhari 《Applied Mathematics》 2024年第1期96-107,共12页
In the practice of control the industrial processes, proportional-integral-derivative controller remains pivotal due to its simple structure and system performance-oriented tuning process. In this paper are presented ... In the practice of control the industrial processes, proportional-integral-derivative controller remains pivotal due to its simple structure and system performance-oriented tuning process. In this paper are presented two approaches for synthesis the proportional-integral-derivative controller to the models of objects with inertia, that offer the procedure of system performance optimization based on maximum stability degree criterion. The proposed algorithms of system performance optimization were elaborated for model of objects with inertia second and third order and offer simple analytical expressions for tuning the PID controller. Validation and verification are conducted through computer simulations using MATLAB, demonstrating successful performance optimization and showcasing the effectiveness PID controllers’ tuning. The proposed approaches contribute insights to the field of control, offering a pathway for optimizing the performance of second and third-order inertial systems through robust controller synthesis. 展开更多
关键词 PID Control Algorithm Inertial systems system Performance Optimization Maximum Stability Degree
下载PDF
Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems
20
作者 Mohammed Amin Almaiah Leen Mohammad Saqr +3 位作者 Leen Ahmad Al-Rawwash Layan Ahmed Altellawi Romel Al-Ali Omar Almomani 《Computers, Materials & Continua》 SCIE EI 2024年第11期3189-3220,共32页
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues... Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks. 展开更多
关键词 Cyber threats database systems cyber risk assessment VULNERABILITIES COUNTERMEASURES
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部