this paper addresses an event-based false data injection (FDI) tolerance problem for networked control systems (NCSs). the NCSs are said to be tolerable for attacks, if some extent of state divergence caused by attack...
详细信息
ISBN:
(纸本)9781538660058
this paper addresses an event-based false data injection (FDI) tolerance problem for networked control systems (NCSs). the NCSs are said to be tolerable for attacks, if some extent of state divergence caused by attacks can be tolerated for the studied system. Under the scenario that the measurement (sensor-to-controller) channels are jammed, the average duration of NCSs is well characterized under consideration of the FDI attacks;and the characteristic of m-tolerant for NCSs is refined, according to the specific FDI under an event-triggered control scheme. Moreover, the effects of these FDI attacks to the evolution of systems are deeply analyzed. Examples are given to show the secure feature of the proposed method.
Large-scale enterprise computing systems are growing rapidly, to address the increasing demand for data processing;however, in many cases, the computing resources in a single data center may not be sufficient for crit...
详细信息
A binary program is an executable file obtained by compiling the source code. In order to reduce the size of software or prevent reverse engineering, software publishers usually only release executable files that have...
详细信息
It is difficult to accurate identify and ascertain college students' grants. Open 'poorer than poor' funding mode lacks humanistic care. How to subsidize has always been a difficult problem in the educatio...
详细信息
By applying multi-view features of a 3D model as the whole feature descriptors to match the 3D model feature, this paper presents a modified 3D model retrieval algorithm which is based on the fusion of contour feature...
详细信息
ISBN:
(纸本)9781538660058
By applying multi-view features of a 3D model as the whole feature descriptors to match the 3D model feature, this paper presents a modified 3D model retrieval algorithm which is based on the fusion of contour features and texture features of the model. After two-dimensional depth images of the 3D model are obtained under the different views of a spherical bounding box, the contour feature and the texture features of the model images are fused for realizing the constitute of the 3D model. the experiment results show that the proposed method gains great improvement in retrieval speed and effective rate in comparison with other view-based 3D model retrieval methods.
Game confrontation is an important research direction of multi-agent system, which will form massive strategic data. How to excavate and discover useful strategies to make game confrontation more efficient becomes a m...
详细信息
ISBN:
(纸本)9781538660058
Game confrontation is an important research direction of multi-agent system, which will form massive strategic data. How to excavate and discover useful strategies to make game confrontation more efficient becomes a meaningful research direction. Firstly, this article introduces the mainstream recommendation algorithms, which are demographic-based recommendation algorithm, content-based recommendation algorithms, collaborative filtering based recommendation algorithm and combinatorial recommendation algorithm. Secondly, the implementation process of the recommendation algorithm is described, and then the most commonly used similarity calculation method for finding nearest neighbors is Jintroduced. Finally, the difficulties and solutions in the current recommendation algorithms are introduced, such as sparsity of matrix, algorithm scalability, new user cold start problem and so on. Future recommendation research direction on data diversification and further improvement of recommendation algorithm.
Epidemiological studies aim at predicting the outbreak of diseases as epidemics and pandemics. this goal is often realized using closed form expressions that significantly utilize systems of differential equations. th...
详细信息
ISBN:
(数字)9781665484220
ISBN:
(纸本)9781665484220
Epidemiological studies aim at predicting the outbreak of diseases as epidemics and pandemics. this goal is often realized using closed form expressions that significantly utilize systems of differential equations. these systems of equations are often derived by groups of researchers working in global collaborative efforts. However, groups of researchers can experience a high workload in scenarios when there is large number of non - active participating researchers in a collaborative study. In addition, data explosion and increased availability can also undermine the efforts of hardworking researchers. this is because of the high velocity and variety associated withbigdata availability. Hence, an approach that helps researchers to address these challenges is required the discussion in this research proposes a suitable solution in this regard the proposed solution introduces the notion of cognitive epidemiology and epidemiological crawlers in a novel computing framework In the proposed computing framework, crawlers and existing closed form expressions used in epidemiological studies interact Prior to this interaction, epidemiological closed form expressions are formatted in a manner to enable the incorporation of intelligence capability. the research presents execution paths and discusses the incorporation alongside the integration of the proposed mechanism in a manner suitable for integration withthe internet.
In order to better solve the problems of low efficiency and slow service startup in power grid topology analysis, this paper uses graph database technology to efficiently solve the data modeling, storage, and processi...
详细信息
ISBN:
(纸本)9781538660058
In order to better solve the problems of low efficiency and slow service startup in power grid topology analysis, this paper uses graph database technology to efficiently solve the data modeling, storage, and processing problems in power grid asset data management represented by power grid topology analysis systems. the power grid topology analysis application framework based on graph database is constructed, and the key technologies and difficulties of power grid topology analysis based on graph database are analyzed in detail from the aspects of graph database management for power grid topology management and power grid topology analysis based on a graph database in order to provide theoretical and technical support for the application of graph database technology in power grid topology analysis.
A comprehensive forecasting method of the short-term photovoltaic output is presented in this paper to forecast the short-term output of two types: the days with weak weather fluctuates (sunny days) and the days with ...
详细信息
ISBN:
(纸本)9781538660058
A comprehensive forecasting method of the short-term photovoltaic output is presented in this paper to forecast the short-term output of two types: the days with weak weather fluctuates (sunny days) and the days with strong weather fluctuations. Firstly, the support vector regression (SVR) is used to forecast and track the reconstructed irradiated intensity and temperature, the forecasted data of the radiation intensity and temperature are used as the input of the forecasting model. At last, the high nonlinear fitting of the photovoltaic output is realized by the SVR model also. through the analysis of the actual data of photovoltaic power plants, the rationality and effectiveness of this method are verified in this paper. Compared withthe traditional forecasting method using SVR only, the useful information contained in the historical data of photovoltaic output can be further explored and the accuracy of the PV output forecasting is also improved.
暂无评论