Science topic

Robustness - Science topic

Explore the latest publications in Robustness, and find Robustness experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Robustness (10,000)
Sorted by most recent
Article
Full-text available
Freelisting is a widely-used ethnographic data elicitation and analysis technique that can help researchers quickly and systematically collect and quantify qualitative cultural data. The paper discusses the value of freelisting for IS researchers who conduct qualitative and/or quantitative research. Specifically, the paper provides an overview of f...
Article
Full-text available
In this paper, stochastic planar stick–slip motions are investigated using a slider-on-belt model where the coefficient of friction (COF) of the contact interface is modelled as a random field. New three-variable stick–slip transition criteria are proposed to improve the accuracy and robustness of the algorithm. Stochastic analyses are performed co...
Article
Full-text available
Conventional protection schemes have essentially been developed for power systems dominated by synchronous generators. High penetration of power-electronic interfaced renewable energy sources (PEIRESs) can adversely impact the reliability of protection systems, thereby increasing the risk of widespread disturbances. This paper proposes a robust wid...
Article
Full-text available
As an indispensable non-destructive testing technique, digital image correlation (DIC) has been increasingly applied to various engineering areas concerning deformation characterization. Inspired by artificial intelligence-related technologies, we here develop a new convolutional neural network-based theoretical framework for DIC analyses, hereafte...
Article
Full-text available
The main aim of the current study is to examine the effect of Chief Executive Officer (CEO) characteristics on earnings management proxied by discretionary accruals. The study used 1,957 firm-year observations listed in Bursa Malaysia for the period from 2012 to 2016. Panel data method is used to examine the established hypotheses. The results show...
Article
Full-text available
Our paper investigates the nexus between the CBOE Volatility Index (VIX) and the market leverage of firms listed on the US stock market. Analyzing the yearly database of non-financial US firms from 2000 to 2019, we find that an increase in the VIX index has a positive impact on the leverage of the corporate market. We also find robust evidence that...
Article
Full-text available
Plants have diverse leaf shapes that have evolved to adapt to the environments they have experienced over their evolutionary history. Leaf shape and leaf size can greatly influence the growth rate, competitive ability, and productivity of plants. However, researchers have long struggled to decide how to properly quantify the complexity of leaf shap...
Article
Full-text available
Because of their elastic links and joints, high-speed parallel robots for pick-and-place operations inevitably suffer from residual vibrations that significantly degrade their positioning accuracy. An effective approach based on the input shaping technique is presented in this paper for suppressing the residual vibration in these parallel robots. A...
Article
Full-text available
Cylindrical shell is a fundamental building block of many engineering structures. They are usually designed to be the primary load-carrying components to withstand different combinations of environmental loads. This paper presents a fibre-based approach to modelling the progressive collapse of cylindrical shells under combined axial compression and...
Article
Full-text available
We report the case of a breast cancer survivor, diagnosed with an underlying CHEK2 c.1100delC heterozygosity, who developed a papillary thyroid cancer 5 years later. A CHEK2 c.1100delC (likely) pathogenic variant is associated with an increased risk of breast, prostate and colorectal cancer and therefore risk-specific screening will be offered. Cur...
Article
Full-text available
Tin selenide (SnSe) is considered a robust candidate for thermoelectric applications due to its very high thermoelectric figure of merit, ZT, with values of 2.6 in p-type and 2.8 in n-type single crystals. Sn has been replaced with various lower group dopants to achieve successful p-type doping in SnSe with high ZT values. A known, facile, and powe...
Article
Full-text available
Objective This study aimed to determine the steady-state errors of oral-based temperature sensors, that are embedded in mouthguards, using a robust assessment process. Materials and methods Four electronic boards with temperature sensors were encapsulated in mouthguards made from ethylene-vinyl acetate (EVA). The error and time to reach steady-sta...
Article
Full-text available
To improve transportation capacity, dual overhead crane systems (DOCSs) are playing an increasingly important role in the transportation of large/heavy cargos and containers. Unfortunately, when trying to deal with the control problem, current methods fail to fully consider such factors as external disturbances, input dead zones, parameter uncertai...
Article
Full-text available
We show that any Algebraic Branching Program (ABP) computing the polynomial ∑i=1nxin has at least Ω(n2) vertices. This improves upon the lower bound of Ω(nlogn), which follows from the classical result of Strassen (1973a) and Baur & Strassen (1983), and extends the results in Kumar (2019), which showed a quadratic lower bound for homogeneous ABPs c...
Article
Full-text available
The inherently stochastic nature of community detection in real-world complex networks poses an important challenge in assessing the accuracy of the results. In order to eliminate the algorithmic and implementation artifacts, it is necessary to identify the groups of vertices that are always clustered together, independent of the community detectio...
Article
Full-text available
As a concept challenging the growth paradigm, degrowth is put into practice in different ways. Ones of which are degrowth-oriented cooperatives: organisations composed of producers and consumers that intend to keep a locally oriented focus and embrace more responsible economic practices to promote socio-ecological sustainability. Despite their flou...
Article
Full-text available
Admittance reshaping is a widely used strategy to address the converters low-frequency stability issues in weak grid, caused by the PLL and its interaction with the dc and ac voltage control. However, the asymmetric control of the $d$- and $q$-axis current references and the coupling between the converter ac and dc side restricts the damping capabi...
Article
Full-text available
The interactions between emotion and attention are complex due to the multifaceted nature of attention. Adding to this complexity, the COVID-19 pandemic has altered the emotional landscape, broadly heightening health and financial concerns. Can the heightened concerns about COVID-19 impair one or more of the components of attention? To explore the...
Article
Full-text available
We report that recently synthesized NaZnBi is a new dual topological insulator, with Z2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\Bbb Z}_2$$\end{document} indice...
Article
Full-text available
Stimulated Raman adiabatic passage (STIRAP) is a widely used protocol to realize high-fidelity and robust quantum control in various quantum systems. However, further application of this protocol in superconducting qubits is limited by population leakage caused by the only weak anharmonicity. Here, we introduce an optimally controlled shortcut-to-a...
Article
Full-text available
Forced disturbances (FDs) with non-stationary frequencies can sequentially resonate from electromechanical modes (EMs) to sub/super synchronous modes (SSMs) and thus lead to non-stationary forced oscillations (FOs). Previous FO damping controllers designed for specified frequency bands may not be able to suppress the non-stationary FOs. This paper...
Article
Full-text available
Parameter estimation is a pivotal task, where quantum technologies can enhance precision greatly. We investigate the time-dependent parameter estimation based on deep reinforcement learning, where the noise-free and noisy bounds of parameter estimation are derived from a geometrical perspective. We propose a physical-inspired linear time-correlated...
Article
Full-text available
Using an online, medical image labeling app, 803 individuals rated images of skin lesions as either "melanoma" (skin cancer) or "nevus" (a skin mole). Each block consisted of 80 images. Blocks could have high (50%) or low (20%) target prevalence and could provide full, accurate feedback or no feedback. As in prior work, with feedback, decision crit...
Article
Full-text available
Cylindrical shell is a fundamental building block of many engineering structures. They are usually designed to be the primary load-carrying components to withstand different combinations of environmental loads. This paper presents a fibre-based approach to modelling the progressive collapse of cylindrical shells under combined axial compression and...
Article
Full-text available
Low efficiency has seriously restricted the application of prime editing (PE) systems in plants. In this study, we develop an enhanced plant prime editor 2 system, enpPE2, by stacking various optimization strategies, including updating the PE architecture to PEmax and expressing engineered pegRNA with a structured motif under the control of a compo...
Article
Full-text available
Plasma production experiments in helium at Uragan-2M have been performed to investigate the role of the hydrogen minority in helium. The experiments presented here were carried on with a controlled minority hydrogen concentration. The hydrogen minority allowed one to increase plasma density more than three times as compared with pure helium. The ob...
Article
Full-text available
To enable large-scale application of polygenic risk scores (PRSs) in a computationally efficient manner, we translate a widely used PRS construction method, PRS–continuous shrinkage, to the Julia programming language, PRS.jl. On nine different traits with varying genetic architectures, we demonstrate that PRS.jl maintains accuracy of prediction whi...
Article
Full-text available
Rao algorithms that include three algorithms are very simple and parameter-less algorithms with effective and desirable performance. This paper modifies these three algorithms, merges them, and establishes a powerful group algorithm. In the first optimization step, the suggested algorithm is tested on 30 standard CEC2014 functions with 50 dimension...
Article
Full-text available
This paper leverages on the establishment of Italian Institute of Technology (IIT) as a policy change useful to understand the causal effect of public-funded research centres on the regional innovative capacity. By relying on the Synthetic Control Method (SCM) approach and Italian NUTS-3 panel data, empirical results suggest that the establishment...
Article
Full-text available
Noiseless quantum channels are critical to share a pure maximally entangled state for performing an ideal teleportation protocol. However, in reality the shared entanglement severely degraded due to decoherence. In this paper, we propose a quantum teleportation channel protection scheme to enhance the teleportation fidelity in presence of decoheren...
Article
Full-text available
The current research questions if service recovery has differential effects on complainers depending on the way that they initially complain, being privately (e.g., emails, phone call) or publicly (e.g., social media, blogs). Using four studies, the current research offers several core contributions. First, building on justice theory, our findings...
Article
Full-text available
In this paper, we assess the role of investment in research and development (R&D) and economic policy uncertainty (EPU) in Sri Lanka’s economic growth experience. We do this by first determining which endogenous growth theories best explain the evolution of total factor productivity (TFP) in the country. Using historical time series data (1980–2018...
Article
Full-text available
The multi-scale variability of global sea surface temperature (GSST), which is often dominated by secular trends, significantly impacts global and regional climate change. Previous studies were mainly carried out under linear assumptions. Even if the nonlinear evolution patterns have been discussed based on annual-mean data, the conclusions are sti...
Article
Full-text available
This study examines the impact of communication on investors’ trading frequency based on a unique dataset drawn from a Chinese social trading platform. We find robust evidence that real-account portfolio owners on the platform trade more frequently under the influence of the comments posted by their leaders (the owners of portfolios they have follo...
Article
Full-text available
Hybrid simulation is used to investigate the dynamic response of a system by combining numerical and physical substructures. To ensure high fidelity results, it is necessary to conduct hybrid simulation in real-time. One challenge in real-time hybrid simulation originates from high-dimensional nonlinear numerical substructures and, in particular, f...
Article
Full-text available
Multi-qubit controlled gates are frequently used in quantum information processing. Although they can be built with gates from the universal set of one- and two-qubit gates, this procedure typically becomes very demanding as the number of such gates rapidly grows with the size of the computational problem. Thus, finding a way to realize them with f...
Article
Full-text available
Starting from Fliess's model-free control (MFC) technique developed 15 years ago, this article aims to provide a systematic framework for characterizing, benchmarking, and generalizing this emerging control technique, with a particular focus on power electronics (PE). It examines the performance of MFC in terms of dynamic response, stability, and r...
Conference Paper
Full-text available
A robust system should perform well under random failures or targeted attacks, and networks have been widely used to model the underlying structure of complex systems such as communication, infrastructure, and transportation networks. Hence, network robustness becomes critical to understanding system robustness. In this paper, we propose a spectral...
Article
Full-text available
State of Charge (SOC), state of health (SOH), and remaining useful life (RUL) are the crucial indexes used in the assessment of electric vehicle (EV) battery management systems (BMS). The performance and efficiency of EVs are subject to the precise estimation of SOC, SOH, and RUL in BMS which enhances the battery reliability, safety, and longevity....
Article
Full-text available
Using discrete beam elements (DBE) to simulate the mechanical properties of assemble joints, the refined analysis model of fabricated single-layer grid shell structures for progressive collapse simulation was established. Based on the component sensitivity and vulnerability, the evaluation indexes of component importance and structural robustness w...
Article
Full-text available
In their review of venture creation process research, Davidsson and Gruenhagen (2021) identified two distinct types of process research: process as a journey through qualitative changes in content and process as a directional and temporal journey toward a goal. We revisit their findings with more robust methodology and find that these two are indee...
Article
Full-text available
Fictitious domain methods, such as the Finite Cell Method (FCM), allow for an efficient and accurate simulation of complex geometries by utilizing higher-order shape functions and an unfitted discretization based on rectangular elements. Since the mesh does not conform to the geometry, cut elements arise that are intersected by domain boundaries. F...
Article
Full-text available
Recently, non-invasive ultrasonic-based detection has emerged as a powerful tool to estimate the state-of-charge (SOC) and state-of-health (SOH) of lithium-ion batteries with a promising accuracy and efficiency. However, the currently available non-invasive methodology is highly sensitive to experimental setups and conditions, leading to unpredicta...
Article
Full-text available
The accurate arithmetical models of solar photovoltaic (PV) modules plays a vital role in the performance, operation, and control of the PV systems as a part of renewable generation. Therefore, the proposed paper develops a novel robust Honey Badger Algorithm (HBA) and African Vulture Optimization algorithm (AVOA) that have been utilized for deduci...
Article
Full-text available
This paper considers fault estimation (FE) and fault-tolerant control (FTC) for linear parameter varying systems with actuator and sensor faults, uncertainties, and disturbances. The inevitable coupling between the FE and FTC functions needs to be taken into account in the design to ensure the overall FE-based FTC closed-loop system performance and...
Article
Full-text available
Position sensorless control of interior permanent magnet synchronous motors (IPMSMs) is of great importance for the sake of the cost reduction and robustness improvement. An improved position sensorless method based on adjustable high-frequency (HF) square-wave voltage injection has been proposed for the IPMSM drive under zero- and low-speed region...
Article
Full-text available
High-fidelity contact detection between arbitrarily shaped convex polyhedral blocks is an important problem. The common plane (CP) and GJK algorithms are fast but still have some drawbacks in identifying accurate contact points and planes. The Direct Search (DS) method can ascertain the contact points and planes accurately but is limited by its loc...
Conference Paper
Full-text available
Advancing speech emotion recognition (SER) depends highly on the source used to train the model, i.e., the emotional speech corpora. By permuting different design parameters, researchers have released versions of corpora that attempt to provide a "better-quality" source for training SER. In this work, we focus on studying communication modes of col...
Conference Paper
Full-text available
Authenticating Internet of Things (IoT) devices is still a challenge, especially in deployments involving low-cost constrained nodes. The cited class of IoT devices hardly support dynamic re-keying solutions, hence being vulnerable to several attacks. To provide a viable general-purpose solution, in this paper we propose MAG-PUF, a novel lightweigh...
Cover Page
Full-text available
Dear Colleagues, Research has provided us with an increased understanding of how similar human and nonhuman primates are with regard to our behavioral, psychological, and affective capabilities and needs. This knowledge has prompted concerns about the use of nonhuman primates in laboratory research where their welfare may be compromised. However,...
Article
Full-text available
Point cloud upsampling is to densify a sparse point set acquired from 3D sensors, providing a denser representation for the underlying surface. Existing methods divide the input points into small patches and upsample each patch separately, however, ignoring the global spatial consistency between patches. In this paper, we present a novel method PC2...
Conference Paper
Full-text available
Iterative learning control (ILC) is a powerful technique for tracking performance improvement by adding the iteratively updated learning signal to the feedforward loop of a repetitively operated system. To increase the robustness to uncertainties and noises, usually a low-pass filter is needed in the learning law which can result in a final steady-...
Conference Paper
Full-text available
Detecting malware by analyzing raw bytes of programs using deep neural networks, also referred to as end-to-end malware detection, is considered as a new promising approach to simplify feature selection in static analysis while still provide accurate detection. Unfortunately, recent studies show that evasion attacks can modify raw bytes of malware...
Article
Full-text available
Previous work involving integro-difference equations of a single species in a homogenous environment has emphasized spreading behavior in unbounded habitats. We show that, under suitable conditions, a simple scalar integro-difference equation incorporating a strong Allee effect and overcompensation can produce solutions where the population persist...
Article
Full-text available
A volcanic eruption is usually preceded by seismic precursors, but their interpretation and use for forecasting the eruption onset time remain a challenge. A part of the eruptive processes in open conduits of volcanoes may be similar to those encountered in geysers. Since geysers erupt more often, they are useful sites for testing new forecasting m...
Article
Full-text available
This paper proposes a data-driven robust fault detection scheme for linear systems with full-order sensors but unknown system internal parameters. Considering the disturbances during practical system operation, the robust fault detection index is incorporated to design the residual generator for fault detection. The key parameters of the robust ind...
Article
Full-text available
As the number of women in leadership positions continues to rise, it is important to closely examine the gender pay gap at the executive level. Prior studies examining the gender pay gap in executive positions have typically focused on annual salary. The nature of an executive compensation package, however, offers the opportunity for a gender pay g...