The effects of the solid solution conditions on the microstructure and tensile properties of Al?Zn?Mg?Cu aluminum alloy were investigated by in-situ resistivity measurement, optical microscopy (OM), scanning electron ...The effects of the solid solution conditions on the microstructure and tensile properties of Al?Zn?Mg?Cu aluminum alloy were investigated by in-situ resistivity measurement, optical microscopy (OM), scanning electron microscopy (SEM), transmission electron microscopy (TEM) and tensile test. A radial basis function artificial neural network (RBF-ANN) model was developed for the analysis and prediction of the electrical resistivity of the tested alloy during the solid solution process. The results show that the model is capable of predicting the electrical resistivity with remarkable success. The correlation coefficient between the predicted results and experimental data is 0.9958 and the relative error is 0.33%. The predicted data were adopted to construct a novel physical picture which was defined as “solution resistivity map”. As revealed by the map, the optimum domain for the solid solution of the tested alloy is in the temperature range of 465?475 °C and solution time range of 50?60 min. In this domain, the solution of second particles and the recrystallization phenomenon will reach equilibrium.展开更多
Both the global exponential stability and the existence of periodic solutions for a class of recurrent neural networks with continuously distributed delays (RNNs) are studied. By employing the inequality α∏k=1^m ...Both the global exponential stability and the existence of periodic solutions for a class of recurrent neural networks with continuously distributed delays (RNNs) are studied. By employing the inequality α∏k=1^m bk^qk≤1/r ∑qkbk^r+1/rα^r(α≥0,bk≥0,qk〉0,with ∑k=1^m qk=r-1,r≥1, constructing suitable Lyapunov r k=l k=l functions and applying the homeomorphism theory, a family of simple and new sufficient conditions are given ensuring the global exponential stability and the existence of periodic solutions of RNNs. The results extend and improve the results of earlier publications.展开更多
Fast simulated annealing is implemented into the learning process of neural network to replace the traditional back-propagation algorithm. The new procedure exhibits performance fast in learning and accurate in predic...Fast simulated annealing is implemented into the learning process of neural network to replace the traditional back-propagation algorithm. The new procedure exhibits performance fast in learning and accurate in prediction compared to the traditional neural networks. Two numerical data sets were used to illustrate its use in chemistry.展开更多
This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intr...This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intrusion detection performance,given the vital relevance of safeguarding computer networks against harmful activity.The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset,a popular benchmark for IDS research.The model performs well in both the training and validation stages,with 91.30%training accuracy and 94.38%validation accuracy.Thus,the model shows good learning and generalization capabilities with minor losses of 0.22 in training and 0.1553 in validation.Furthermore,for both macro and micro averages across class 0(normal)and class 1(anomalous)data,the study evaluates the model using a variety of assessment measures,such as accuracy scores,precision,recall,and F1 scores.The macro-average recall is 0.9422,the macro-average precision is 0.9482,and the accuracy scores are 0.942.Furthermore,macro-averaged F1 scores of 0.9245 for class 1 and 0.9434 for class 0 demonstrate the model’s ability to precisely identify anomalies precisely.The research also highlights how real-time threat monitoring and enhanced resistance against new online attacks may be achieved byDNN-based intrusion detection systems,which can significantly improve network security.The study underscores the critical function ofDNN-based IDS in contemporary cybersecurity procedures by setting the foundation for further developments in this field.Upcoming research aims to enhance intrusion detection systems by examining cooperative learning techniques and integrating up-to-date threat knowledge.展开更多
In recent years,the Internet of Things(IoT)has gradually developed applications such as collecting sensory data and building intelligent services,which has led to an explosion in mobile data traffic.Meanwhile,with the...In recent years,the Internet of Things(IoT)has gradually developed applications such as collecting sensory data and building intelligent services,which has led to an explosion in mobile data traffic.Meanwhile,with the rapid development of artificial intelligence,semantic communication has attracted great attention as a new communication paradigm.However,for IoT devices,however,processing image information efficiently in real time is an essential task for the rapid transmission of semantic information.With the increase of model parameters in deep learning methods,the model inference time in sensor devices continues to increase.In contrast,the Pulse Coupled Neural Network(PCNN)has fewer parameters,making it more suitable for processing real-time scene tasks such as image segmentation,which lays the foundation for real-time,effective,and accurate image transmission.However,the parameters of PCNN are determined by trial and error,which limits its application.To overcome this limitation,an Improved Pulse Coupled Neural Networks(IPCNN)model is proposed in this work.The IPCNN constructs the connection between the static properties of the input image and the dynamic properties of the neurons,and all its parameters are set adaptively,which avoids the inconvenience of manual setting in traditional methods and improves the adaptability of parameters to different types of images.Experimental segmentation results demonstrate the validity and efficiency of the proposed self-adaptive parameter setting method of IPCNN on the gray images and natural images from the Matlab and Berkeley Segmentation Datasets.The IPCNN method achieves a better segmentation result without training,providing a new solution for the real-time transmission of image semantic information.展开更多
A designed visual geometry group(VGG)-based convolutional neural network(CNN)model with small computational cost and high accuracy is utilized to monitor pulse amplitude modulation-based intensity modulation and direc...A designed visual geometry group(VGG)-based convolutional neural network(CNN)model with small computational cost and high accuracy is utilized to monitor pulse amplitude modulation-based intensity modulation and direct detection channel performance using eye diagram measurements.Experimental results show that the proposed technique can achieve a high accuracy in jointly monitoring modulation format,probabilistic shaping,roll-off factor,baud rate,optical signal-to-noise ratio,and chromatic dispersion.The designed VGG-based CNN model outperforms the other four traditional machine-learning methods in different scenarios.Furthermore,the multitask learning model combined with MobileNet CNN is designed to improve the flexibility of the network.Compared with the designed VGG-based CNN,the MobileNet-based MTL does not need to train all the classes,and it can simultaneously monitor single parameter or multiple parameters without sacrificing accuracy,indicating great potential in various monitoring scenarios.展开更多
In this paper, we employ a fixed point theorem due to Krasnosel’skii to attain the existence of periodic solutions for neutral-type neural networks with delays on a periodic time scale. Some new sufficient conditions...In this paper, we employ a fixed point theorem due to Krasnosel’skii to attain the existence of periodic solutions for neutral-type neural networks with delays on a periodic time scale. Some new sufficient conditions are established to show that there exists a unique periodic solution by the contraction mapping principle.展开更多
Sufficient conditions to guarantee the existence and global exponential stability of periodic solutions of a Cohen-Grossberg-type BAM neural network are established by suitable mathematical transformation.
In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the ex...In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the existence and global exponential stability of the anti-periodic solutions.The criteria extend and improve some earlier results.Moreover,we give an examples to illustrate our main results.展开更多
The global exponentially stability and the existence of periodic solutions of a class of Hopfield neural networks with time delays are investigated. By constructing a novel Lyapunov function, new criteria are provided...The global exponentially stability and the existence of periodic solutions of a class of Hopfield neural networks with time delays are investigated. By constructing a novel Lyapunov function, new criteria are provided to guarantee the global exponentially stability of such systems. For the delayed Hopfield neural networks with time-varying external inputs, new criteria are also acquired for the existence and exponentially stability of periodic solutions. The results are generalizations and improvements of some recent achievements reported in the literature on networks with time delays.展开更多
In this paper, the existence of almost periodic solutions to general BAM neural networks with leakage delays on time scales is first studied, by using the exponential dichotomy method of linear differential equations ...In this paper, the existence of almost periodic solutions to general BAM neural networks with leakage delays on time scales is first studied, by using the exponential dichotomy method of linear differential equations and fixed point theorem. Then, the exponential stability of almost periodic solutions to such BAM neural networks on time scales is discussed by utilizing differential inequality. Finally, an example is given to support our results in this paper and the results are up-to-date.展开更多
Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information,a problem that persists despite user awareness.This study addresses the pressing issue of phis...Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information,a problem that persists despite user awareness.This study addresses the pressing issue of phishing attacks on websites and assesses the performance of three prominent Machine Learning(ML)models—Artificial Neural Networks(ANN),Convolutional Neural Networks(CNN),and Long Short-Term Memory(LSTM)—utilizing authentic datasets sourced from Kaggle and Mendeley repositories.Extensive experimentation and analysis reveal that the CNN model achieves a better accuracy of 98%.On the other hand,LSTM shows the lowest accuracy of 96%.These findings underscore the potential of ML techniques in enhancing phishing detection systems and bolstering cybersecurity measures against evolving phishing tactics,offering a promising avenue for safeguarding sensitive information and online security.展开更多
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se...A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.展开更多
Time lapse, characteristic of aging, is a complex process that affects the reliability and security of biometric face recognition systems. This paper reports the novel use and effectiveness of deep learning, in genera...Time lapse, characteristic of aging, is a complex process that affects the reliability and security of biometric face recognition systems. This paper reports the novel use and effectiveness of deep learning, in general, and convolutional neural networks (CNN), in particular, for automatic rather than hand-crafted feature extraction for robust face recognition across time lapse. A CNN architecture using the VGG-Face deep (neural network) learning is found to produce highly discriminative and interoperable features that are robust to aging variations even across a mix of biometric datasets. The features extracted show high inter-class and low intra-class variability leading to low generalization errors on aging datasets using ensembles of subspace discriminant classifiers. The classification results for the all-encompassing authentication methods proposed on the challenging FG-NET and MORPH datasets are competitive with state-of-the-art methods including commercial face recognition engines and are richer in functionality and interoperability than existing methods as it handles mixed biometric datasets, e.g., FG-NET and MORPH.展开更多
In this paper, global exponential stability of almost periodic solution of cellular neural networks with time-varing delays (CNNVDs) is considered. By using the methods of the topological degree theory and generaliz...In this paper, global exponential stability of almost periodic solution of cellular neural networks with time-varing delays (CNNVDs) is considered. By using the methods of the topological degree theory and generalized Halanay inequality, a few new applicable criteria are established for the existence and global exponential stability of almost periodic solution. Some previous results are improved and extended in this letter and one example is given to illustrate the effectiveness of the new results.展开更多
This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluat...This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments.展开更多
In this paper,the existence,uniqueness and global attractivity are discussed on almost periodic solution of SICNNs(shunting inhibitory cellular neural networks)with continuously distributed delays.By using the fixed...In this paper,the existence,uniqueness and global attractivity are discussed on almost periodic solution of SICNNs(shunting inhibitory cellular neural networks)with continuously distributed delays.By using the fixed point theorem,differential inequality technique and Lyapunov functional method,giving the new ranges of parameters,several sufficient conditions are obtained to ensure the existence,uniqueness and global attractivity of almost periodic solution.Compared with the previous studies,our methods are more effective for almost periodic solution analysis of SICNNs with continuously distributed delays.Some existing results have been improved and extended.In order to show the effectiveness of the obtained results,an example is given in this paper.展开更多
In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2...In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.展开更多
In this paper, we investigate the dynamics and the global exponential stability of a new class of Hopfield neural network with time-varying and distributed delays. In fact, the properties of norms and the contraction ...In this paper, we investigate the dynamics and the global exponential stability of a new class of Hopfield neural network with time-varying and distributed delays. In fact, the properties of norms and the contraction principle are adjusted to ensure the existence as well as the uniqueness of the pseudo almost periodic solution, which is also its derivative pseudo almost periodic. This results are without resorting to the theory of exponential dichotomy. Furthermore, by employing the suitable Lyapunov function, some delayindependent sufficient conditions are derived for exponential convergence. The main originality lies in the fact that spaces considered in this paper generalize the notion of periodicity and almost periodicity. Lastly, two examples are given to demonstrate the validity of the proposed theoretical results.展开更多
基金Acknowledgements: This work is supported by grants from the National Natural Science Foundation of China (No. 60203044, 90412010) and 242 program #(242)2007A07.
基金Project(51344004)supported by the National Natural Science Foundation of China
文摘The effects of the solid solution conditions on the microstructure and tensile properties of Al?Zn?Mg?Cu aluminum alloy were investigated by in-situ resistivity measurement, optical microscopy (OM), scanning electron microscopy (SEM), transmission electron microscopy (TEM) and tensile test. A radial basis function artificial neural network (RBF-ANN) model was developed for the analysis and prediction of the electrical resistivity of the tested alloy during the solid solution process. The results show that the model is capable of predicting the electrical resistivity with remarkable success. The correlation coefficient between the predicted results and experimental data is 0.9958 and the relative error is 0.33%. The predicted data were adopted to construct a novel physical picture which was defined as “solution resistivity map”. As revealed by the map, the optimum domain for the solid solution of the tested alloy is in the temperature range of 465?475 °C and solution time range of 50?60 min. In this domain, the solution of second particles and the recrystallization phenomenon will reach equilibrium.
文摘Both the global exponential stability and the existence of periodic solutions for a class of recurrent neural networks with continuously distributed delays (RNNs) are studied. By employing the inequality α∏k=1^m bk^qk≤1/r ∑qkbk^r+1/rα^r(α≥0,bk≥0,qk〉0,with ∑k=1^m qk=r-1,r≥1, constructing suitable Lyapunov r k=l k=l functions and applying the homeomorphism theory, a family of simple and new sufficient conditions are given ensuring the global exponential stability and the existence of periodic solutions of RNNs. The results extend and improve the results of earlier publications.
文摘Fast simulated annealing is implemented into the learning process of neural network to replace the traditional back-propagation algorithm. The new procedure exhibits performance fast in learning and accurate in prediction compared to the traditional neural networks. Two numerical data sets were used to illustrate its use in chemistry.
基金Princess Nourah bint Abdulrahman University for funding this project through the Researchers Supporting Project(PNURSP2024R319)funded by the Prince Sultan University,Riyadh,Saudi Arabia.
文摘This study describes improving network security by implementing and assessing an intrusion detection system(IDS)based on deep neural networks(DNNs).The paper investigates contemporary technical ways for enhancing intrusion detection performance,given the vital relevance of safeguarding computer networks against harmful activity.The DNN-based IDS is trained and validated by the model using the NSL-KDD dataset,a popular benchmark for IDS research.The model performs well in both the training and validation stages,with 91.30%training accuracy and 94.38%validation accuracy.Thus,the model shows good learning and generalization capabilities with minor losses of 0.22 in training and 0.1553 in validation.Furthermore,for both macro and micro averages across class 0(normal)and class 1(anomalous)data,the study evaluates the model using a variety of assessment measures,such as accuracy scores,precision,recall,and F1 scores.The macro-average recall is 0.9422,the macro-average precision is 0.9482,and the accuracy scores are 0.942.Furthermore,macro-averaged F1 scores of 0.9245 for class 1 and 0.9434 for class 0 demonstrate the model’s ability to precisely identify anomalies precisely.The research also highlights how real-time threat monitoring and enhanced resistance against new online attacks may be achieved byDNN-based intrusion detection systems,which can significantly improve network security.The study underscores the critical function ofDNN-based IDS in contemporary cybersecurity procedures by setting the foundation for further developments in this field.Upcoming research aims to enhance intrusion detection systems by examining cooperative learning techniques and integrating up-to-date threat knowledge.
基金supported in part by the National Key Research and Development Program of China(Grant No.2019YFA0706200).
文摘In recent years,the Internet of Things(IoT)has gradually developed applications such as collecting sensory data and building intelligent services,which has led to an explosion in mobile data traffic.Meanwhile,with the rapid development of artificial intelligence,semantic communication has attracted great attention as a new communication paradigm.However,for IoT devices,however,processing image information efficiently in real time is an essential task for the rapid transmission of semantic information.With the increase of model parameters in deep learning methods,the model inference time in sensor devices continues to increase.In contrast,the Pulse Coupled Neural Network(PCNN)has fewer parameters,making it more suitable for processing real-time scene tasks such as image segmentation,which lays the foundation for real-time,effective,and accurate image transmission.However,the parameters of PCNN are determined by trial and error,which limits its application.To overcome this limitation,an Improved Pulse Coupled Neural Networks(IPCNN)model is proposed in this work.The IPCNN constructs the connection between the static properties of the input image and the dynamic properties of the neurons,and all its parameters are set adaptively,which avoids the inconvenience of manual setting in traditional methods and improves the adaptability of parameters to different types of images.Experimental segmentation results demonstrate the validity and efficiency of the proposed self-adaptive parameter setting method of IPCNN on the gray images and natural images from the Matlab and Berkeley Segmentation Datasets.The IPCNN method achieves a better segmentation result without training,providing a new solution for the real-time transmission of image semantic information.
基金supported by the National Key Research and Development Program of China (Grant No.2019YFB1803700)the Key Technologies Research and Development Program of Tianjin (Grant No.20YFZCGX00440).
文摘A designed visual geometry group(VGG)-based convolutional neural network(CNN)model with small computational cost and high accuracy is utilized to monitor pulse amplitude modulation-based intensity modulation and direct detection channel performance using eye diagram measurements.Experimental results show that the proposed technique can achieve a high accuracy in jointly monitoring modulation format,probabilistic shaping,roll-off factor,baud rate,optical signal-to-noise ratio,and chromatic dispersion.The designed VGG-based CNN model outperforms the other four traditional machine-learning methods in different scenarios.Furthermore,the multitask learning model combined with MobileNet CNN is designed to improve the flexibility of the network.Compared with the designed VGG-based CNN,the MobileNet-based MTL does not need to train all the classes,and it can simultaneously monitor single parameter or multiple parameters without sacrificing accuracy,indicating great potential in various monitoring scenarios.
文摘In this paper, we employ a fixed point theorem due to Krasnosel’skii to attain the existence of periodic solutions for neutral-type neural networks with delays on a periodic time scale. Some new sufficient conditions are established to show that there exists a unique periodic solution by the contraction mapping principle.
文摘Sufficient conditions to guarantee the existence and global exponential stability of periodic solutions of a Cohen-Grossberg-type BAM neural network are established by suitable mathematical transformation.
基金supported by National Nature Science Foundation under Grant 11161029,Chinascience and technology research projects of guangxi under Grant 2013YB282,201203YB186
文摘In this paper,we study the anti-periodic solutions for a class of impulsive Cohen-Grossberg neural networks with mixed delays.By using analysis techniques,some sufficient conditions are obtained which guarantee the existence and global exponential stability of the anti-periodic solutions.The criteria extend and improve some earlier results.Moreover,we give an examples to illustrate our main results.
基金the Science Foundation of Guangdong Province in China
文摘The global exponentially stability and the existence of periodic solutions of a class of Hopfield neural networks with time delays are investigated. By constructing a novel Lyapunov function, new criteria are provided to guarantee the global exponentially stability of such systems. For the delayed Hopfield neural networks with time-varying external inputs, new criteria are also acquired for the existence and exponentially stability of periodic solutions. The results are generalizations and improvements of some recent achievements reported in the literature on networks with time delays.
基金Partially supported by the Special Basic Cooperative Research Programs of Yunnan Provincial Undergraduate Universities'Association(Grant No.202101BA070001-045).
文摘In this paper, the existence of almost periodic solutions to general BAM neural networks with leakage delays on time scales is first studied, by using the exponential dichotomy method of linear differential equations and fixed point theorem. Then, the exponential stability of almost periodic solutions to such BAM neural networks on time scales is discussed by utilizing differential inequality. Finally, an example is given to support our results in this paper and the results are up-to-date.
文摘Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information,a problem that persists despite user awareness.This study addresses the pressing issue of phishing attacks on websites and assesses the performance of three prominent Machine Learning(ML)models—Artificial Neural Networks(ANN),Convolutional Neural Networks(CNN),and Long Short-Term Memory(LSTM)—utilizing authentic datasets sourced from Kaggle and Mendeley repositories.Extensive experimentation and analysis reveal that the CNN model achieves a better accuracy of 98%.On the other hand,LSTM shows the lowest accuracy of 96%.These findings underscore the potential of ML techniques in enhancing phishing detection systems and bolstering cybersecurity measures against evolving phishing tactics,offering a promising avenue for safeguarding sensitive information and online security.
文摘A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state.
文摘Time lapse, characteristic of aging, is a complex process that affects the reliability and security of biometric face recognition systems. This paper reports the novel use and effectiveness of deep learning, in general, and convolutional neural networks (CNN), in particular, for automatic rather than hand-crafted feature extraction for robust face recognition across time lapse. A CNN architecture using the VGG-Face deep (neural network) learning is found to produce highly discriminative and interoperable features that are robust to aging variations even across a mix of biometric datasets. The features extracted show high inter-class and low intra-class variability leading to low generalization errors on aging datasets using ensembles of subspace discriminant classifiers. The classification results for the all-encompassing authentication methods proposed on the challenging FG-NET and MORPH datasets are competitive with state-of-the-art methods including commercial face recognition engines and are richer in functionality and interoperability than existing methods as it handles mixed biometric datasets, e.g., FG-NET and MORPH.
文摘In this paper, global exponential stability of almost periodic solution of cellular neural networks with time-varing delays (CNNVDs) is considered. By using the methods of the topological degree theory and generalized Halanay inequality, a few new applicable criteria are established for the existence and global exponential stability of almost periodic solution. Some previous results are improved and extended in this letter and one example is given to illustrate the effectiveness of the new results.
文摘This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments.
文摘In this paper,the existence,uniqueness and global attractivity are discussed on almost periodic solution of SICNNs(shunting inhibitory cellular neural networks)with continuously distributed delays.By using the fixed point theorem,differential inequality technique and Lyapunov functional method,giving the new ranges of parameters,several sufficient conditions are obtained to ensure the existence,uniqueness and global attractivity of almost periodic solution.Compared with the previous studies,our methods are more effective for almost periodic solution analysis of SICNNs with continuously distributed delays.Some existing results have been improved and extended.In order to show the effectiveness of the obtained results,an example is given in this paper.
文摘In the computer field,network security is a crucial integrant.It is necessary to pay attention on the application of virtual network technology,so as to raise the standard of computer network security to a new level[2].In view of this,this paper will analyze the application of virtual network technology in computer network security and propose some strategies for future reference.
文摘In this paper, we investigate the dynamics and the global exponential stability of a new class of Hopfield neural network with time-varying and distributed delays. In fact, the properties of norms and the contraction principle are adjusted to ensure the existence as well as the uniqueness of the pseudo almost periodic solution, which is also its derivative pseudo almost periodic. This results are without resorting to the theory of exponential dichotomy. Furthermore, by employing the suitable Lyapunov function, some delayindependent sufficient conditions are derived for exponential convergence. The main originality lies in the fact that spaces considered in this paper generalize the notion of periodicity and almost periodicity. Lastly, two examples are given to demonstrate the validity of the proposed theoretical results.