- Neural Networks Stability and Synchronization
- Fractional Differential Equations Solutions
- Nonlinear Differential Equations Analysis
- Differential Equations and Numerical Methods
- Stability and Control of Uncertain Systems
- Network Security and Intrusion Detection
- Advanced Mathematical Modeling in Engineering
- Mathematical and Theoretical Epidemiology and Ecology Models
- Neural Networks and Applications
- Distributed Control Multi-Agent Systems
- Advanced Control Systems Design
- Stability and Controllability of Differential Equations
- Numerical methods for differential equations
- Advanced Memory and Neural Computing
- Advanced Computational Techniques and Applications
- Cryptography and Data Security
- Multi-Criteria Decision Making
- Nonlinear Dynamics and Pattern Formation
- Cooperative Communication and Network Coding
- Meromorphic and Entire Functions
- Advanced Differential Equations and Dynamical Systems
- Advanced Image Processing Techniques
- stochastic dynamics and bifurcation
- Numerical Methods and Algorithms
- Privacy-Preserving Technologies in Data
Tobacco Research Institute
2025
Harbin Institute of Technology
2005-2024
Changchun University of Technology
2010-2024
Liaoning University of Technology
2024
Xidian University
2019-2024
Jiangsu University of Technology
2024
China University of Mining and Technology
2023
Tsinghua University
2023
University of Electronic Science and Technology of China
2006-2022
Shanghai Institute of Materia Medica
2021
This paper discusses the fuzzy adaptive consensus secure control problem for a class of stochastic nonlinear multi-agent systems (MASs) with unknown false data injection attacks. Fuzzy logic (FLSs) are used to model functions. A distributed filter is proposed obtain information leader since leaders only available partial agents. To deal virtual time-varying gains caused by attacks, an compensation method developed via re-codesigning controllers. Based on backstepping methodology and bounded...
As a generation of the real-valued neural network (RVNN), complex-valued (CVNN) is based on (CV) parameters and variables. The fractional-order (FO) CVNN with linear impulses fixed time delays discussed. By using sign function, Banach point theorem, two classes activation functions, some criteria uniform stability for solution existence uniqueness equilibrium are derived. Finally, three experimental simulations presented to illustrate correctness effectiveness obtained results.
Due to the limitation of firewall and intrusion detection system in information security domain, prevention (IPS) appeared. It is a new generation technology following technique. also secure product that protects network real time from attacking, now becomes hotspot research domain. This article mainly focuses on support vector machine (SVM) applying Snort system, then implements small scale intelligent by combining firewall.
无证书签密密钥封装机制(CLSC-KEM)与数据封装机制共同构成无证书混合签密方案。该文提出一个新的概念:无证书体制下的多接收者签密密钥封装机制(mCLSC-KEM)。给出了mCLSC-KEM的定义以及安全模型,并构造了一个具体的方案。该方案比一般性构造(对每个接收者分别运行CLSC-KEM)高效很多,其密钥封装仅需计算1个双线性对,且对应的数据封装仅需运行1次对称加密,而一般性构造需计算n个双线性对和n次数据封装(设n个接收者)。在随机预言模型下,基于Gap双线性Diffie-Hellman问题,该文的方案是可证明安全的。
The stability of fractional-order (FO) nonlinear system with state-dependent delays (SDDs) is investigated. Unlike the usual time-dependent delays, (SD) make size relative to states, which makes uncertain when historical state information would be used. A Lemma on Riemann-Liouville derivative first given ensure monotonicity considered function. Then, based Lyapunov method, several sufficient criteria are presented guarantee Mittag-Leffler discussed systems. In end, three examples applied...
Due to the stitching precision and speed of existing image mosaicing technique, this paper summarizes three common based on Feature matching algorithm: Harris corner detection algorithm, SIFT (Scale Invariant Transform) SURF ( Speeded-Up Robust Features ) algorithm. This describes principle algorithm respectively. The performance are compared for corresponding points computing time precision. algorithm's perform extracting angular was worst, lowest effectiveness finding points. presents its...
This paper is devoted to prove the existence of optimal interval where Green's function negative definite. The left and right endpoints are found. Then, a new principle comparison third-order differential equation es- tablished. As an application our results, solvability non-conjugate boundary value problem discussed.
Generative adversarial networks (GANs) are an unsupervised generative model that learns data distribution through training. However, recent experiments indicated GANs difficult to train due the requirement of optimization in high dimensional parameter space and zero gradient problem. In this work, we propose a self-sparse network (Self-Sparse GAN) reduces alleviates Self-Sparse GAN, design self-adaptive sparse transform module (SASTM) comprising sparsity decomposition feature-map...
The fractional-order (FO) nonlinear differential system with state-dependent (SD) delayed impulses (DI) is considered in this brief. are related to the state of and delays SD. A novel lemma for monotonicity solution Caputo's FO derivative equation given. By means linear matrix inequality (LMI) several comparative arguments, criteria uniform stability, asymptotical Mittag-Leffler stability obtained. Compared other works on integer-order (IO) impulsive systems SD or fixed delays, how impose...
The space‐time spectral collocation method was initially presented for the 1‐dimensional sine‐Gordon equation. In this article, we introduce a solving 2‐dimensional nonlinear Riesz space fractional diffusion equations. is based on Legendre‐Gauss‐Lobatto discretizing spatial and time first‐order system of ordinary differential Optimal priori error estimates in L 2 norms semidiscrete formulation uniqueness approximate solution are derived. has accuracy both time, numerical results confirm statement.
Enterprise marketing has the characteristics of importance and distribution, so a distributed intelligent decision support system is needed to decision. On basis sufficiently analyzing necessity feasibility for using multi-intelligent-agent technology develop system, this paper designs three-layer structure composed customer layer, core layer resource layer. Then article discusses information flow between agents puts forward utilize communication mechanism based on messages cooperation...
This paper is dedicated to exploring the global Mittag-Leffler stability of fractional-order complex-valued (CV) neural networks (NNs) with asynchronous time delays, which generates exponential integer-order (IO) CVNNs. Here, delays mean that there are different in nodes. Two new inequalities concerning product two functions and one novel lemma on a fractional derivative given rigorous theoretical proof. By utilizing three norms, several conditions concluded guarantee existence uniqueness an...
摘要: 寻求专利保护是企业发展的基本专利战略。一类由互补性专利组成的伞型专利组合是通过挖掘同一产品系统存在或潜在的更多技术问题而形成的具有互补技术特征的系列专利方案,通过更大的专利权利保护范围实现对同一产品系统的全方位保护。预期失效分析(Antucupatory failure determination, AFD)作为在发明问题解决算法(Algorithm for inventive-problem solving,...
This paper is concerned with the problem of $H_{\infty}$ state estimation for a class delayed static neural networks. The purpose to design delay-dependent estimator such that dynamics error system globally exponentially stable prescribed performance. Some improved conditions are established by using delay partitioning method and free-matrix-based integral inequality. gain matrix optimal performance index obtained via solving convex optimization subject LMIs (linear inequality). Numerical...
According to the tedious design conditions and difficulty determine optimal plan in underground foundation engineering field at present, genetic algorithm was proposed applied into of conventional reinforced concrete strip foundation.The coding method, operation procedure penalty function were improved according specific issues.The project cost selected as objective function, bending resistance, shearing resistance detailing requirements ruled by specification constraint condition,...
Abstract Let $f(z)=\sum\limits_{j=0}^{\infty} a_j z^j$ be a transcendental entire function and let $f_\omega(z)=\sum\limits_{j=0}^{\infty}\chi_j(\omega) random function, where $\chi_j(\omega)$ are independent identically distributed variables defined on probability space $(\Omega, \mathcal{F}, \mu)$ . In this paper, we first define family of functions, which includes Gaussian, Rademacher Steinhaus functions. We prove that, for almost all functions in the any constant C > 1, there exist...
Network coding in cyclic networks meets more problems than acyclic networks. Recently, S.-Y.R.Li et al.proposed a framework of convolutional network (CNC) as well its four properties for with theoretic fundamentals discrete valuation ring (DVR). The properties, multicast (CM), broadcast (CB), dispersion (CD) and basic code (BCNC), are notions increasing strength this order regard to linear independence among the global encoding kernels. existence BCNC then implies ofthe rest. That is, is...
We propose a spot-size converter (SSC) by exploiting the high-efficiency mode conversion capability that long-period grating (LPG) possesses. Our proof-of-concept LPG-based SSC, fabricated with optical polymer material on silicon nitride (Si <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">3</sub> N xmlns:xlink="http://www.w3.org/1999/xlink">4</sub> ) platform, has length of ∼700 μm, can improve coupling efficiency between LP <italic...