This paper deals with the problem of designing a robust static output feedback controller for polytopic systems. The current research that tackled this problem is mainly based on LMI method, which is conservative by nature. In this paper, a novel approach is proposed, which considers the design space of the controller parameters and iteratively partitions the space to small simplexes. Then, by assessing the stability in each simplex, the solution space for design parameters is directly determined. It has been theoretically proved that, if there exists a feasible solution in the design space, the algorithm can find it. To validate the result of the proposed approach, comparative simulation examples are given to illustrate the performance of the design methodology as compared to those of previous approaches. 相似文献
A new, efficient and recoverable heterogeneous catalyst was successfully synthesized by functionalization of mesoporous silica FSM-16. The FSM-16/CPTMS-Rh- 相似文献
Silicon - The characterization of ion beam current density distribution and beam uniformity is crucial for improving broad-beam ion source technologies. The design of the broad ion beam extraction... 相似文献
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods. 相似文献
Most of the commonly used hydrological models do not account for the actual evapotranspiration (ETa) as a key contributor to water loss in semi-arid/arid regions. In this study, the HEC-HMS (Hydrologic Engineering Center Hydrologic Modeling System) model was calibrated, modified, and its performance in simulating runoff resulting from short-duration rainfall events was evaluated. The model modifications included integrating spatially distributed ETa, calculated using the surface energy balance system (SEBS), into the model. Evaluating the model’s performance in simulating runoff showed that the default HEC-HMS model underestimated the runoff with root mean squared error (RMSE) of 0.14 m3/s (R2?=?0.92) while incorporating SEBS ETa into the model reduced RMSE to 0.01 m3/s (R2?=?0.99). The integration of HECHMS and SEBS resulted in smaller and more realistic latent heat flux estimates translated into a lower water loss rate and a higher magnitude of runoff simulated by the HECHMS model. The difference between runoff simulations using the default and modified model translated into an average of 95,000 m3 runoff per rainfall event (equal to seasonal water requirement of ten-hectare winter wheat) that could be planned and triggered for agricultural purposes, flood harvesting, and groundwater recharge in the region. The effect of ETa on the simulated runoff volume is expected to be more pronounced during high evaporative demand periods, longer rainfall events, and larger catchments. The outcome of this study signifies the importance of implementing accurate estimates of evapotranspiration into a hydrological model.
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method. 相似文献
The three-component reaction between amine, carbonyl compound and thioglycolic acid is now considered as a major strategy for synthesis of 1,3-thiazolidin-4-ones, which consists of the following steps: (i) condensation of aldehyde and amine which results the formation of an imine; (ii) the reaction between thioglycolic acid and the imine which is followed by an intramolecular cyclization reaction, which leads to the formation of the final product. In this way, if no suitable catalyst is employed, the completion of the reaction will not be achieved. Hence, it is of great importance to select an appropriate catalyst so that these compounds can be successfully synthesized. Herein, we employed LDHs@PpPDA as a versatile catalyst for the fabrication of novel derivatives of 1,3-thiazolidin-4-one. 相似文献
With the high availability of digital video contents on the internet, users need more assistance to access digital videos. Various researches have been done about video summarization and semantic video analysis to help to satisfy these needs. These works are developing condensed versions of a full length video stream through the identification of the most important and pertinent content within the stream. Most of the existing works in these areas are mainly focused on event mining. Event mining from video streams improves the accessibility and reusability of large media collections, and it has been an active area of research with notable recent progress. Event mining includes a wide range of multimedia domains such as surveillance, meetings, broadcast, news, sports, documentary, and films, as well as personal and online media collections. Due to the variety and plenty of Event mining techniques, in this paper we suggest an analytical framework to classify event mining techniques and to evaluate them based on important functional measures. This framework could lead to empirical and technical comparison of event mining methods and development of more efficient structures at future. 相似文献