A novel approach to constructing high-dimensional asynchronous spectra (nD-Asyn) is proposed. Three theorems relevant to 1D slices of nD-Asyn are revealed. nD-Asyn is used to analyze bilinear data from mixtures containing multiple components obtained via hyphenated techniques. The spectral contribution of different components can be removed in a stepwise manner by increasing the dimensions of asynchronous spectra. As a result, the spectra of different components can be faithfully recovered even if the time-related profiles of different components severely overlap. Moreover, correct results can still be obtained via the nD-Asyn even if a considerable level of noise and baseline drift are present. The nD-Asyn approach is compared with MCR-ALS using different constraints in analyzing the data for a simulated and also for a real system. The nD-Asyn produced correct spectrum of every component. Only when complete constraints obtained from nD-Asyn method is utilized in the MCR-ALS calculation, correct spectra of all the components can be obtained. Thus, nD-Asyn can be used alone or in conjunction with MCR-ALS to analyze bilinear data containing contributions of multiple components.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1016/j.saa.2019.03.008 | DOI Listing |
Sci Rep
December 2024
Engineering Research Center for Metallurgical Automation and Measurement Technology of Ministry of Education, Wuhan University of Science and Technology, Wuhan, 430081, China.
This paper mainly studies the issue of fractional parameter identification of generalized bilinear-in-parameter system(GBIP) with colored noise. Hierarchical fractional least mean square algorithm based on the key term separation principle(K-HFLMS) and multi-innovation hierarchical fractional least mean square algorithm based on the key term separation principle (K-MHFLMS) are presented for the effective parameter estimation of GBIP system. The K-MHFLMS expands the scalar innovation into the vector innovation by making full use of the system input and output data information at each recursive step.
View Article and Find Full Text PDFSci Rep
December 2024
School of Civil and Hydraulic Engineering, Chongqing University of Science & Technology, Chongqing, 400074, China.
The CRTS (China Railway Track System) II slab ballastless track is widely utilized in high-speed railway construction owing to its excellent structural integrity. However, its interfacial performance deteriorates under high-temperature conditions, leading to significant damage in structural details. Furthermore, the evolution of its performance under these conditions has not been comprehensively studied.
View Article and Find Full Text PDFSci Rep
December 2024
School of Electronic and Nanoscale Engineering, University of Glasgow, Glasgow, G12 8QQ, UK.
In the era of the Internet of Things (IoT), the transmission of medical reports in the form of scan images for collaborative diagnosis is vital for any telemedicine network. In this context, ensuring secure transmission and communication is necessary to protect medical data to maintain privacy. To address such privacy concerns and secure medical images against cyberattacks, this research presents a robust hybrid encryption framework that integrates quantum, and classical cryptographic methods.
View Article and Find Full Text PDFJ Chem Phys
November 2024
Department of Chemistry, University of North Carolina Charlotte, 9201 University City Boulevard, Charlotte, North Carolina 28223, USA.
Experimental demonstrations of modified chemical structure and reactivity under strong light-matter coupling have spurred theoretical and computational efforts to uncover underlying mechanisms. Ab initio cavity quantum electrodynamics (QED) combines quantum chemistry with cavity QED to investigate these phenomena in detail. Unitary transformations of ab initio cavity QED Hamiltonians have been used to make them more computationally tractable.
View Article and Find Full Text PDFSensors (Basel)
October 2024
National Frontiers Science Center for Industrial Intelligence and Systems Optimization, Northeastern University, Shenyang 110819, China.
To address the deficiencies in privacy-preserving expressive query and verification mechanisms in outsourced key-value stores, we propose EKV-VBQ, a scheme designed to ensure verifiable Boolean queries over encrypted key-value data. We have integrated blockchain and homomorphic Xor operations and pseudo-random functions to create a secure and verifiable datastore, while enabling efficient encrypted Boolean queries. Additionally, we have designed a lightweight verification protocol using bilinear map accumulators to guarantee the correctness of Boolean query results.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!