An adaptive backstepping control algorithm combined with RBF neural network is proposed for the control problem of electrohydraulic servo system caused by factors such as nonlinearity and parameter uncertainty. Firstl...
详细信息
An adaptive backstepping control algorithm combined with RBF neural network is proposed for the control problem of electrohydraulic servo system caused by factors such as nonlinearity and parameter uncertainty. Firstly, the complex high-order nonlinear electrohydraulic servo system is decomposed into a low-order simple system with backstepping method. And the control law with unknown nonlinear function term is obtained. Secondly, the RBF neural network is applied to approximate the nonlinear function terms in the control law, and the adaptive rate is designed using the Lyapunov stability analysis method. Finally, simulation verification is conducted on the built Simulink simulation model, and the simulation results show that the adaptive control algorithm based on the RBF neural network backstepping method can achieve tracking control of the given signal and meet the desired dynamic performance criteria. In addition, in order to deal with the sensor noise problems that may be encountered in the actual deployment, the first-order filtering algorithm is introduced and verified in the simulation, which effectively reduces the noise interference.
The rise of internet of Things (IoT) devices has led to the proliferation of smart environments worldwide. Although commodity IoT devices are employed by ordinary end users, complex environments, such as smart buildin...
详细信息
The rise of internet of Things (IoT) devices has led to the proliferation of smart environments worldwide. Although commodity IoT devices are employed by ordinary end users, complex environments, such as smart buildings, government, or private offices, or conference rooms require customized and highly reliable IoT solutions. Enterprise IoT (E-IoT) connect such environments to the internet and are professionally managed solutions usually offered by dedicated vendors As E-IoT systems require specialized training, closed-source software, and proprietary equipment to deploy. In effect, E-IoT systems present an unprecedented, under-researched, and unexplored threat vector for an attacker. In this work, we focus on E-IoT drivers, software modules used to integrate devices into E-IoT systems, as an attack mechanism. We first present PoisonIvy, a series of generalized proof-of-concept attacks used to demonstrate that an attacker can use a malicious driver to perform denial-of-service attacks, gain remote control, and abuse E-IoT system resources. To defend against E-IoT driver-based threats, we introduce Ivycide, a novel intrusion detection system used to detect unexpected E-IoT network traffic from an E-IoT system. Ivycide operates as a passive monitoring system within an E-IoT system using machine learning and signature-based classification to detect Poisonivy attacks. We evaluated the performance of Ivycide in a realistic E-IoT deployment. Our detailed evaluation results show that Ivycide achieves an average accuracy of 97% in classifying the type of Poisonivy attack and operates without modifications or operational overhead to the existing E-IoT systems.
internet access is the primary motivating factor behind the revolutionary modern digital era. Almost everything is connected to the internet because of the internet of Things (IoT) concept. However, because typical IP...
详细信息
This paper presents an optimal decision-making method for shield tunneling parameters that integrates time series prediction and multi-mode intelligent multi-objective optimization. Firstly, we have developed a decisi...
详细信息
ISBN:
(纸本)9798350372113;9798350372106
This paper presents an optimal decision-making method for shield tunneling parameters that integrates time series prediction and multi-mode intelligent multi-objective optimization. Firstly, we have developed a decision-making scheme for determining optimal tunneling parameters. To achieve this, we utilize a Long Short-term Memory network (LSTM) which learns from the extensive experience of shield drivers. Then, A comprehensive excavation performance evaluation index system considering TBM excavation specific speed and excavation specific energy has been proposed. Next, the Pareto front surfaces of each surrounding rock grade are obtained through Multi-mode discrete NSGA-ii (MNSGA-ii), and the final solution is selected based on the Technique for Order of Preference by Similarity to the Ideal Solution (TOPSIS) between the Pareto solution set and the LSTM predicted value. To evaluate the effectiveness of the proposed scheme, it is deployed in a shield machine using edge computer, then the engineering experiments were conducted. The performance of the proposed decision-making system is then tested and compared with that of the shield driver. The test results show that the proposed decision-making system can significantly improve the comprehensive tunneling performance. This demonstrates the feasibility and effectiveness of the proposed decision-making system.
The congestion control (CC) algorithm is expected to achieve consistent high performance under different network environments. Traditionally, classic CCs are designed with the methodology of inferring path conditions ...
详细信息
ISBN:
(纸本)9798400711961
The congestion control (CC) algorithm is expected to achieve consistent high performance under different network environments. Traditionally, classic CCs are designed with the methodology of inferring path conditions to guide the rate adjustment. However, this methodology suffers from wrong path condition inferences in certain cases, which mislead the rate adjustment and lead to performance degradation. To avoid wrong path condition inferences, we develop the projection-based introspective method and design the introspective congestion control (ICC) algorithm in this paper. Specifically, the rate adjustment rules are designed to possess a specialized profile such that the projection of the profile can be distinguished under unchanged path conditions. In this way, the projection, which can be distinguished from the time series of delay signals in the frequency domain, facilitates ICC to extract more information for path condition inferences. Consequently, with the introspection on the projection, ICC can avoid being misled by wrong path condition inferences and thus achieve consistent high performance under different conditions. The advantages of ICC are confirmed through extensive experiments conducted on various locally emulated scenarios, global testbeds over the internet, and the Alipay platform.
In many industrial processes, the controlsystems are the most critical components. Evaluate performance and robustness of a control loops is an important task to maintain the health of a control system and an efficie...
详细信息
ISBN:
(纸本)9783031538292;9783031538308
In many industrial processes, the controlsystems are the most critical components. Evaluate performance and robustness of a control loops is an important task to maintain the health of a control system and an efficiency in the process. In the area of control-Loop performance Monitoring (CPM), there are two groups of indices to evaluate the performance of the control loops: stochastic and deterministic. Using stochastic indices, a control engineer can calculate the performance indices of a control loop with the data in normal operation and a minimum knowledge of the process;but the problem is that to do a performance analysis is so hard, due it is necessary an advanced knowledge about the interpretation. Instead, an interpretation or analysis of deterministic indices is simpler;however, the problem with this approach is that an invasive monitoring of the plant is required to calculate the indices. In this paper, it is proposed to use an Artificial Neural network to estimate deterministic indices, considering as input the stochastic indices and some process information, taking advantage of the fact that data collection for stochastic indices is simpler.
The Physical internet (PI) is a modern logistics pattern based on resources and information sharing, modeled after the Digital internet (DI). Running a PI network demands a participatory and distributed decision-makin...
详细信息
The Physical internet (PI) is a modern logistics pattern based on resources and information sharing, modeled after the Digital internet (DI). Running a PI network demands a participatory and distributed decision-making system, requiring communication protocols between nodes and optimization algorithms. Although different in nature, the Protocols and Algorithms (P&A) of the PI are often functionally equivalent to P&A of DI. This paper presents a systematic literature review on the control methods of a PI network. The results show that P&A can be "local", designed to operate in a distributed manner;"global", designed to centrally control the PI or parts of it;or for "orchestration", designed to centrally define operational parameters while avoiding direct control. This paper also draws considerations on the maturity state of PI's P&A, comparing them with those of the DI and with the process that led to their definition.
The problem of resilient robust model predictive control (RMPC) with hard constraints based on an adaptive event-triggered mechanism for a class of polytopic uncertain systems is investigated in this article. To reduc...
详细信息
With the promotion of strategies such as 'internet plus', the deep integration of industrialization and informatization has accelerated, and industrial internet has become an important support for new economie...
详细信息
Traditional network measurement campaigns suffer from the lack of control over network infrastructure and the inability to evaluate communication performance directly, especially for the placement of highly distribute...
详细信息
暂无评论