期刊文献+
共找到10,704篇文章
< 1 2 250 >
每页显示 20 50 100
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
1
作者 Muhammad Ahmad Nawaz Ul Ghani Kun She +4 位作者 Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga 《Computers, Materials & Continua》 SCIE EI 2024年第5期2609-2623,共15页
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingthe significance of using cutting-edge technology to meet rising privacy issues in digital identity. 展开更多
关键词 Facial recognition privacy protection blockchain GAN distributed systems
下载PDF
Data-driven Wasserstein distributionally robust chance-constrained optimization for crude oil scheduling under uncertainty
2
作者 Xin Dai Liang Zhao +4 位作者 Renchu He Wenli Du Weimin Zhong Zhi Li Feng Qian 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2024年第5期152-166,共15页
Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans... Crude oil scheduling optimization is an effective method to enhance the economic benefits of oil refining.But uncertainties,including uncertain demands of crude distillation units(CDUs),might make the production plans made by the traditional deterministic optimization models infeasible.A data-driven Wasserstein distributionally robust chance-constrained(WDRCC)optimization approach is proposed in this paper to deal with demand uncertainty in crude oil scheduling.First,a new deterministic crude oil scheduling optimization model is developed as the basis of this approach.The Wasserstein distance is then used to build ambiguity sets from historical data to describe the possible realizations of probability distributions of uncertain demands.A cross-validation method is advanced to choose suitable radii for these ambiguity sets.The deterministic model is reformulated as a WDRCC optimization model for crude oil scheduling to guarantee the demand constraints hold with a desired high probability even in the worst situation in ambiguity sets.The proposed WDRCC model is transferred into an equivalent conditional value-at-risk representation and further derived as a mixed-integer nonlinear programming counterpart.Industrial case studies from a real-world refinery are conducted to show the effectiveness of the proposed method.Out-of-sample tests demonstrate that the solution of the WDRCC model is more robust than those of the deterministic model and the chance-constrained model. 展开更多
关键词 DISTRIBUTIONS Model OPTIMIZATION Crude oil scheduling Wasserstein distance distributionally robust chance constraints
下载PDF
Observer-based dynamic event-triggered control for distributed parameter systems over mobile sensor-plus-actuator networks
3
作者 穆文英 庄波 邱芳 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期237-243,共7页
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov... We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance. 展开更多
关键词 distributed parameter systems event-triggered control mobile sensors mobile actuators
下载PDF
Combined CNN-LSTM Deep Learning Algorithms for Recognizing Human Physical Activities in Large and Distributed Manners:A Recommendation System
4
作者 Ameni Ellouze Nesrine Kadri +1 位作者 Alaa Alaerjan Mohamed Ksantini 《Computers, Materials & Continua》 SCIE EI 2024年第4期351-372,共22页
Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell t... Recognizing human activity(HAR)from data in a smartphone sensor plays an important role in the field of health to prevent chronic diseases.Daily and weekly physical activities are recorded on the smartphone and tell the user whether he is moving well or not.Typically,smartphones and their associated sensing devices operate in distributed and unstable environments.Therefore,collecting their data and extracting useful information is a significant challenge.In this context,the aimof this paper is twofold:The first is to analyze human behavior based on the recognition of physical activities.Using the results of physical activity detection and classification,the second part aims to develop a health recommendation system to notify smartphone users about their healthy physical behavior related to their physical activities.This system is based on the calculation of calories burned by each user during physical activities.In this way,conclusions can be drawn about a person’s physical behavior by estimating the number of calories burned after evaluating data collected daily or even weekly following a series of physical workouts.To identify and classify human behavior our methodology is based on artificial intelligence models specifically deep learning techniques like Long Short-Term Memory(LSTM),stacked LSTM,and bidirectional LSTM.Since human activity data contains both spatial and temporal information,we proposed,in this paper,to use of an architecture allowing the extraction of the two types of information simultaneously.While Convolutional Neural Networks(CNN)has an architecture designed for spatial information,our idea is to combine CNN with LSTM to increase classification accuracy by taking into consideration the extraction of both spatial and temporal data.The results obtained achieved an accuracy of 96%.On the other side,the data learned by these algorithms is prone to error and uncertainty.To overcome this constraint and improve performance(96%),we proposed to use the fusion mechanisms.The last combines deep learning classifiers tomodel non-accurate and ambiguous data to obtain synthetic information to aid in decision-making.The Voting and Dempster-Shafer(DS)approaches are employed.The results showed that fused classifiers based on DS theory outperformed individual classifiers(96%)with the highest accuracy level of 98%.Also,the findings disclosed that participants engaging in physical activities are healthy,showcasing a disparity in the distribution of physical activities between men and women. 展开更多
关键词 Human physical activities smartphone sensors deep learning distributed monitoring recommendation system uncertainty HEALTHY CALORIES
下载PDF
A new method for evaluating the firing precision of multiple launch rocket system based on Bayesian theory
5
作者 Yunfei Miao Guoping Wang Wei Tian 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期232-241,共10页
How to effectively evaluate the firing precision of weapon equipment at low cost is one of the core contents of improving the test level of weapon system.A new method to evaluate the firing precision of the MLRS consi... How to effectively evaluate the firing precision of weapon equipment at low cost is one of the core contents of improving the test level of weapon system.A new method to evaluate the firing precision of the MLRS considering the credibility of simulation system based on Bayesian theory is proposed in this paper.First of all,a comprehensive index system for the credibility of the simulation system of the firing precision of the MLRS is constructed combined with the group analytic hierarchy process.A modified method for determining the comprehensive weight of the index is established to improve the rationality of the index weight coefficients.The Bayesian posterior estimation formula of firing precision considering prior information is derived in the form of mixed prior distribution,and the rationality of prior information used in estimation model is discussed quantitatively.With the simulation tests,the different evaluation methods are compared to validate the effectiveness of the proposed method.Finally,the experimental results show that the effectiveness of estimation method for firing precision is improved by more than 25%. 展开更多
关键词 Multiple launch rocket system Bayesian theory Simulation credibility Mixed prior distribution Firing precision
下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
6
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous Merkle tree distributed systems
下载PDF
Weak influence of natural vegetation in urban green spaces compared to agricultural ecosystems on House Martin populations:Insights from nationwide citizen science data in the Czech Republic
7
作者 Denisa Dvorakova Jan Sipos Josef Suchomel 《Avian Research》 SCIE CSCD 2024年第2期139-146,共8页
The House Martin(Delichon urbicum)is a common farmland bird species in the European landscape,yet its population numbers are currently in decline.However,it is not yet sufficiently explained why this long-term decline... The House Martin(Delichon urbicum)is a common farmland bird species in the European landscape,yet its population numbers are currently in decline.However,it is not yet sufficiently explained why this long-term decline occurs.To fill this gap in our knowledge,we investigated how land cover composition affects the abundance of House Martins on the landscape scale by using nationwide citizen science data.Utilizing a generalised linear mixed-effect model(GLMM),we evaluated 12,094 records from the Czech Republic spanning 2009-2017.Our analysis underscores the significance of land cover type in shaping House Martin abundance.More specifically,our results indicate that within agricultural land covers“naturally managed arable lands”exhibited significant positive effect,while forests,orchards,and vineyards were deemed less favourable for House Martin populations.Within urban land covers,we found a clear distinction in the impact on House Martin populations,with a positive effect observed in urban infrastructure,development areas,and post-industrial sites(i.e.,UrbanAreas),while an indifferent impact was noted within urban green spaces and landscaped areas(i.e.,GreenUrban).Notably,our findings suggest that the simple spatial,age,and species structure typical of forests in Europe,and similarly,the uniform structure of parks and gardens,may be responsible for the decline in the abundance of the House Martin.We advocate for the preservation or enhancement of urban greenery,expansion of natural vegetation in rural areas and adoption of ecological management practices in orchards and vineyards to mitigate further declines in House Martin populations. 展开更多
关键词 Citizen science Habitat preferences House Martin Species distribution Urban and suburban landscape
下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
8
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
Adaptive Cloud Intrusion Detection System Based on Pruned Exact Linear Time Technique
9
作者 Widad Elbakri Maheyzah Md.Siraj +2 位作者 Bander Ali Saleh Al-rimy Sultan Noman Qasem Tawfik Al-Hadhrami 《Computers, Materials & Continua》 SCIE EI 2024年第6期3725-3756,共32页
Cloud computing environments,characterized by dynamic scaling,distributed architectures,and complex work-loads,are increasingly targeted by malicious actors.These threats encompass unauthorized access,data breaches,de... Cloud computing environments,characterized by dynamic scaling,distributed architectures,and complex work-loads,are increasingly targeted by malicious actors.These threats encompass unauthorized access,data breaches,denial-of-service attacks,and evolving malware variants.Traditional security solutions often struggle with the dynamic nature of cloud environments,highlighting the need for robust Adaptive Cloud Intrusion Detection Systems(CIDS).Existing adaptive CIDS solutions,while offering improved detection capabilities,often face limitations such as reliance on approximations for change point detection,hindering their precision in identifying anomalies.This can lead to missed attacks or an abundance of false alarms,impacting overall security effectiveness.To address these challenges,we propose ACIDS(Adaptive Cloud Intrusion Detection System)-PELT.This novel Adaptive CIDS framework leverages the Pruned Exact Linear Time(PELT)algorithm and a Support Vector Machine(SVM)for enhanced accuracy and efficiency.ACIDS-PELT comprises four key components:(1)Feature Selection:Utilizing a hybrid harmony search algorithm and the symmetrical uncertainty filter(HSO-SU)to identify the most relevant features that effectively differentiate between normal and anomalous network traffic in the cloud environment.(2)Surveillance:Employing the PELT algorithm to detect change points within the network traffic data,enabling the identification of anomalies and potential security threats with improved precision compared to existing approaches.(3)Training Set:Labeled network traffic data forms the training set used to train the SVM classifier to distinguish between normal and anomalous behaviour patterns.(4)Testing Set:The testing set evaluates ACIDS-PELT’s performance by measuring its accuracy,precision,and recall in detecting security threats within the cloud environment.We evaluate the performance of ACIDS-PELT using the NSL-KDD benchmark dataset.The results demonstrate that ACIDS-PELT outperforms existing cloud intrusion detection techniques in terms of accuracy,precision,and recall.This superiority stems from ACIDS-PELT’s ability to overcome limitations associated with approximation and imprecision in change point detection while offering a more accurate and precise approach to detecting security threats in dynamic cloud environments. 展开更多
关键词 Adaptive cloud IDS harmony search distributed denial of service(DDoS) PELT machine learning SVM ISOTCID NSL-KDD
下载PDF
CL2ES-KDBC:A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems
10
作者 Talal Albalawi P.Ganeshkumar 《Computers, Materials & Continua》 SCIE EI 2024年第3期3511-3528,共18页
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed wo... The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless networks.Specifically,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks.In this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT intrusions.Then,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value precisely.In addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the classifier.The effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other factors.Computational analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks. 展开更多
关键词 IoT security attack detection covariance linear learning embedding selection kernel distributed bayes classifier mongolian gazellas optimization
下载PDF
Threshold-Based Software-Defined Networking(SDN)Solution for Healthcare Systems against Intrusion Attacks
11
作者 Laila M.Halman Mohammed J.F.Alenazi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1469-1483,共15页
The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are ... The healthcare sector holds valuable and sensitive data.The amount of this data and the need to handle,exchange,and protect it,has been increasing at a fast pace.Due to their nature,software-defined networks(SDNs)are widely used in healthcare systems,as they ensure effective resource utilization,safety,great network management,and monitoring.In this sector,due to the value of thedata,SDNs faceamajor challengeposed byawide range of attacks,such as distributed denial of service(DDoS)and probe attacks.These attacks reduce network performance,causing the degradation of different key performance indicators(KPIs)or,in the worst cases,a network failure which can threaten human lives.This can be significant,especially with the current expansion of portable healthcare that supports mobile and wireless devices for what is called mobile health,or m-health.In this study,we examine the effectiveness of using SDNs for defense against DDoS,as well as their effects on different network KPIs under various scenarios.We propose a threshold-based DDoS classifier(TBDC)technique to classify DDoS attacks in healthcare SDNs,aiming to block traffic considered a hazard in the form of a DDoS attack.We then evaluate the accuracy and performance of the proposed TBDC approach.Our technique shows outstanding performance,increasing the mean throughput by 190.3%,reducing the mean delay by 95%,and reducing packet loss by 99.7%relative to normal,with DDoS attack traffic. 展开更多
关键词 Network resilience network management attack prediction software defined networking(SDN) distributed denial of service(DDoS) healthcare
下载PDF
Seismic safety assessment with non-Gaussian random processes for train-bridge coupled systems
12
作者 Zhao Han Gao Lei +4 位作者 Wei Biao Tan Jincheng Guo Peidong Jiang Lizhong Xiang Ping 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2024年第1期241-260,共20页
Extensive high-speed railway(HSR)network resembled the intricate vascular system of the human body,crisscrossing mainlands.Seismic events,known for their unpredictability,pose a significant threat to both trains and b... Extensive high-speed railway(HSR)network resembled the intricate vascular system of the human body,crisscrossing mainlands.Seismic events,known for their unpredictability,pose a significant threat to both trains and bridges,given the HSR’s extended operational duration.Therefore,ensuring the running safety of train-bridge coupled(TBC)system,primarily composed of simply supported beam bridges,is paramount.Traditional methods like the Monte Carlo method fall short in analyzing this intricate system efficiently.Instead,efficient algorithm like the new point estimate method combined with moment expansion approximation(NPEM-MEA)is applied to study random responses of numerical simulation TBC systems.Validation of the NPEM-MEA’s feasibility is conducted using the Monte Carlo method.Comparative analysis confirms the accuracy and efficiency of the method,with a recommended truncation order of four to six for the NPEM-MEA.Additionally,the influences of seismic magnitude and epicentral distance are discussed based on the random dynamic responses in the TBC system.This methodology not only facilitates seismic safety assessments for TBC systems but also contributes to standard-setting for these systems under earthquake conditions. 展开更多
关键词 train-bridge coupled(TBC)system random vibration new point estimate method(NPEM) seismic safety assessment moment expansion approximation(MEA) non-Gaussian distributions
下载PDF
A review of artificial intelligence applications in high-speed railway systems
13
作者 Xuehan Li Minghao Zhu +3 位作者 Boyang Zhang Xiaoxuan Wang Zha Liu Liang Han 《High-Speed Railway》 2024年第1期11-16,共6页
In recent years,the global surge of High-speed Railway(HSR)revolutionized ground transportation,providing secure,comfortable,and punctual services.The next-gen HSR,fueled by emerging services like video surveillance,e... In recent years,the global surge of High-speed Railway(HSR)revolutionized ground transportation,providing secure,comfortable,and punctual services.The next-gen HSR,fueled by emerging services like video surveillance,emergency communication,and real-time scheduling,demands advanced capabilities in real-time perception,automated driving,and digitized services,which accelerate the integration and application of Artificial Intelligence(AI)in the HSR system.This paper first provides a brief overview of AI,covering its origin,evolution,and breakthrough applications.A comprehensive review is then given regarding the most advanced AI technologies and applications in three macro application domains of the HSR system:mechanical manufacturing and electrical control,communication and signal control,and transportation management.The literature is categorized and compared across nine application directions labeled as intelligent manufacturing of trains and key components,forecast of railroad maintenance,optimization of energy consumption in railroads and trains,communication security,communication dependability,channel modeling and estimation,passenger scheduling,traffic flow forecasting,high-speed railway smart platform.Finally,challenges associated with the application of AI are discussed,offering insights for future research directions. 展开更多
关键词 High-speed railway Artificial intelligence Intelligent distribution Intelligent control Intelligent scheduling
下载PDF
Using Pearson’s System of Curves to Approximate the Distributions of the Difference between Two Correlated Estimates of Signal-to-Noise Ratios: The Cases of Bivariate Normal and Bivariate Lognormal Distributions
14
作者 Mohamed M. Shoukri 《Open Journal of Statistics》 2024年第3期207-227,共21页
Background: The signal-to-noise ratio (SNR) is recognized as an index of measurements reproducibility. We derive the maximum likelihood estimators of SNR and discuss confidence interval construction on the difference ... Background: The signal-to-noise ratio (SNR) is recognized as an index of measurements reproducibility. We derive the maximum likelihood estimators of SNR and discuss confidence interval construction on the difference between two correlated SNRs when the readings are from bivariate normal and bivariate lognormal distribution. We use the Pearsons system of curves to approximate the difference between the two estimates and use the bootstrap methods to validate the approximate distributions of the statistic of interest. Methods: The paper uses the delta method to find the first four central moments, and hence the skewness and kurtosis which are important in the determination of the parameters of the Pearsons distribution. Results: The approach is illustrated in two examples;one from veterinary microbiology and food safety data and the other on data from clinical medicine. We derived the four central moments of the target statistics, together with the bootstrap method to evaluate the parameters of Pearsons distribution. The fitted Pearsons curves of Types I and II were recommended based on the available data. The R-codes are also provided to be readily used by the readers. 展开更多
关键词 Signal-to-Noise Ratio Bivariate Distributions Bootstrap Methods Delta Method Pearson system of Curves
下载PDF
Cooperative Distributed Beamforming Design for Multi-RIS Aided Cell-Free Systems
15
作者 ZHU Yuting XU Zhiyu ZHANG Hongtao 《ZTE Communications》 2024年第2期99-106,共8页
Cell-free systems significantly improve network capacity by enabling joint user service without cell boundaries,eliminating intercell interference.However,to satisfy further capacity demands,it leads to high-cost prob... Cell-free systems significantly improve network capacity by enabling joint user service without cell boundaries,eliminating intercell interference.However,to satisfy further capacity demands,it leads to high-cost problems of both hardware and power consumption.In this paper,we investigate multiple reconfigurable intelligent surfaces(RISs)aided cell-free systems where RISs are introduced to improve spectrum efficiency in an energy-efficient way.To overcome the centralized high complexity and avoid frequent information exchanges,a cooperative distributed beamforming design is proposed to maximize the weighted sum-rate performance.In particular,the alternating optimization method is utilized with the distributed closed-form solution of active beamforming being derived locally at access points,and phase shifts are obtained centrally based on the Riemannian conjugate gradient(RCG)manifold method.Simulation results verify the effectiveness of the proposed design whose performance is comparable to the centralized scheme and show great superiority of the RISs-aided system over the conventional cellular and cell-free system. 展开更多
关键词 cell-free systems reconfigurable intelligent surface cooperative distributed beamforming Riemannian conjugate gradient
下载PDF
Distributional Chaoticity of the Minimal Subshift of Shift Operators
16
作者 Yuanlin Chen Tianxiu Lu Jiazheng Zhao 《Journal of Applied Mathematics and Physics》 2024年第5期1647-1660,共14页
This paper focus on the chaotic properties of minimal subshift of shift operators. It is proved that the minimal subshift of shift operators is uniformly distributional chaotic, distributional chaotic in a sequence, d... This paper focus on the chaotic properties of minimal subshift of shift operators. It is proved that the minimal subshift of shift operators is uniformly distributional chaotic, distributional chaotic in a sequence, distributional chaotic of type k ( k∈{ 1,2,2 1 2 ,3 } ), and ( 0,1 ) -distribution. 展开更多
关键词 Shift Operators SUBSHIFT distributional Chaoticity
下载PDF
Study of Canada’s Economic System from a System Thinking Perspective
17
作者 Wei Zhang Yuejun Cui 《Proceedings of Business and Economic Studies》 2024年第3期179-187,共9页
This article analyzes Canada’s economic system from a systems thinking perspective.The content includes patterns of public choice(party system and power distribution),organizational framework of decision-making arran... This article analyzes Canada’s economic system from a systems thinking perspective.The content includes patterns of public choice(party system and power distribution),organizational framework of decision-making arrangements,information provision and coordination mechanisms,property rights system,incentive system,and welfare system.Canada’s economic system significantly influences the development of the Canadian economy,and its economic system arrangements hold reference significance for other developed and developing countries. 展开更多
关键词 CANADA Economic system Party system Power distribution Property rights system
下载PDF
Whole petroleum system and ordered distribution pattern of conventional and unconventional oil and gas reservoirs 被引量:11
18
作者 Cheng-Zao Jia Xiong-Qi Pang Yan Song 《Petroleum Science》 SCIE EI CAS CSCD 2023年第1期1-19,共19页
The classical source-to-trap petroleum system concept only considers the migration and accumulation of conventional oil and gas in traps driven dominantly by buoyance in a basin,although revised and improved,even some... The classical source-to-trap petroleum system concept only considers the migration and accumulation of conventional oil and gas in traps driven dominantly by buoyance in a basin,although revised and improved,even some new concepts as composite petroleum system,total petroleum system,total composite petroleum system,were proposed,but they do not account for the vast unconventional oil and gas reservoirs within the system,which is not formed and distributed in traps dominantly by buoyancedriven.Therefore,the petroleum system concept is no longer adequate in dealing with all the oil and gas accumulations in a basin where significant amount of the unconventional oil and gas resources are present in addition to the conventional oil and gas accumulations.This paper looked into and analyzed the distribution characteristics of conventional and unconventional oil/gas reservoirs and their differences and correlations in petroliferous basins in China and North America,and then proposed whole petroleum system(WPS)concept,the WPS is defined as a natural system that encompasses all the conventional and unconventional oil and gas,reservoirs and resources originated from organic matter in source rocks,the geological elements and processes involving the formation,evolution,and distribution of these oil and gas,reservoirs and resources.It is found in the WPS that there are three kinds of hydrocarbons dynamic fields,three kinds of original hydrocarbons,three kinds of reservoir rocks,and the coupling of these three essential elements lead to the basic ordered distribution model of shale oil/gas reservoirs contacting or interbeded with tight oil/gas reservoirs and separated conventional oil/gas reservoirs from source rocks upward,which is expressed as“S\T-C”.Abnormal conditions lead to other three special ordered distribution models:The first is that with shale oil/gas reservoirs separated from tight oil/gas reservoirs.The second is that with two direction ordered distributions from source upward and downward.The third is with lateral distribution from source outside. 展开更多
关键词 Conventional and unconventional oil and gas Petroleum system Whole petroleum system Hydrocarbon reservoirs ordered distribution model Fossil energy
下载PDF
Data-Driven Control of Distributed Event-Triggered Network Systems 被引量:6
19
作者 Xin Wang Jian Sun +2 位作者 Gang Wang Frank Allgower Jie Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第2期351-364,共14页
The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-trigge... The present paper deals with data-driven event-triggered control of a class of unknown discrete-time interconnected systems(a.k.a.network systems).To this end,we start by putting forth a novel distributed event-triggering transmission strategy based on periodic sampling,under which a model-based stability criterion for the closed-loop network system is derived,by leveraging a discrete-time looped-functional approach.Marrying the model-based criterion with a data-driven system representation recently developed in the literature,a purely data-driven stability criterion expressed in the form of linear matrix inequalities(LMIs)is established.Meanwhile,the data-driven stability criterion suggests a means for co-designing the event-triggering coefficient matrix and the feedback control gain matrix using only some offline collected state-input data.Finally,numerical results corroborate the efficacy of the proposed distributed data-driven event-triggered network system(ETS)in cutting off data transmissions and the co-design procedure. 展开更多
关键词 Data-driven control distributed event-triggered network system(ETS) linear matrix inequalitie(LMI) looped-functional STABILITY
下载PDF
Robust Consensus Tracking Control of Uncertain Multi-Agent Systems With Local Disturbance Rejection 被引量:3
20
作者 Pan Yu Kang-Zhi Liu +3 位作者 Xudong Liu Xiaoli Li Min Wu Jinhua She 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第2期427-438,共12页
In this paper,a new distributed consensus tracking protocol incorporating local disturbance rejection is devised for a multi-agent system with heterogeneous dynamic uncertainties and disturbances over a directed graph... In this paper,a new distributed consensus tracking protocol incorporating local disturbance rejection is devised for a multi-agent system with heterogeneous dynamic uncertainties and disturbances over a directed graph.It is of two-degree-of-freedom nature.Specifically,a robust distributed controller is designed for consensus tracking,while a local disturbance estimator is designed for each agent without requiring the input channel information of disturbances.The condition for asymptotic disturbance rejection is derived.Moreover,even when the disturbance model is not exactly known,the developed method also provides good disturbance-rejection performance.Then,a robust stabilization condition with less conservativeness is derived for the whole multi-agent system.Further,a design algorithm is given.Finally,comparisons with the conventional one-degree-of-freedombased distributed disturbance-rejection method for mismatched disturbances and the distributed extended-state observer for matched disturbances validate the developed method. 展开更多
关键词 Directed graph distributed control disturbance rejection dynamic uncertainties multi-agent systems robust control
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部