This paper studies network LQR problems with system matrices being spatially-exponential decaying (SED) between nodes in the network. The major objective is to study whether the optimal controller also enjoys a SED st...
详细信息
ISBN:
(纸本)9798350328066
This paper studies network LQR problems with system matrices being spatially-exponential decaying (SED) between nodes in the network. The major objective is to study whether the optimal controller also enjoys a SED structure, which is an appealing property for ensuring the optimality of decentralized control over the network. We start with studying the open-loop asymptotically stable system and show that the optimal LQR state feedback gain K is 'quasi'-SED in this setting, i.e. vertical bar vertical bar Left inverted perpendicularKrightinverted perpendicular(ij)vertical bar vertical bar similar to O (e -beta/poly ln(N) dist(i,j)). The decaying rate beta depends on the decaying rate and norms of system matrices and the open-loop exponential stability constants. Then the result is further generalized to unstable systems under a stabilizability assumption. Building upon the 'quasi'-SED result on K, we give an upper-bound on the performance of kappa-truncated local controllers, suggesting that distributed controllers can achieve near-optimal performance for SED systems. We develop these results via studying the structure of another type of controller, disturbance response control, which has been studied and used in recent online control literature;thus as a side result, we also prove the 'quasi'-SED property of the optimal disturbance response control which serves as a contribution on its own merit.
This paper proposes efficient ways for constructing the energy-delay Pareto front in cache-enabled integrated access and backhauling (IAB) heterogeneous wireless network. More specifically, an improved non-dominated s...
详细信息
ISBN:
(纸本)9781538674628
This paper proposes efficient ways for constructing the energy-delay Pareto front in cache-enabled integrated access and backhauling (IAB) heterogeneous wireless network. More specifically, an improved non-dominated sorting genetic algorithm ii (NSGA-ii) is proposed which is coupled with the operator parameter control ability based on reinforcement learning, to solve the energy-delay trade-off in the multi-objective optimization problem. To estimate the effectiveness of the proposed scheme, key performance indicators that cover the convergence and distribution of the Pareto front solution set are conducted and analyzed. A wide set of numerical investigations show that the proposed algorithm can provide a more evenly distributed result than the state of the art techniques with a 15% gain compared to the nominal case which is the weighted-sum method. Furthermore, and maybe more importantly, the undesirable large gaps between solutions in the Pareto front which are caused by the weighting coefficient choices are avoided. By enabling the operator parameter control ability, the exploration and exploitation process of the proposed algorithm can be balanced, which prevents the frequently faced problems of early convergence and being trapped at a local optimum in the genetic algorithm. The proposed technique can have significant implications in improving the avoidable choices regarding the network operation, and compared with the traditional NSGA-ii, the proposed algorithm can provide a near-optimal solution set with 20% more diversity.
In this paper, we propose a novel approach to improve instance segmentation and classification tasks by incorporating SegmentAnything [1] before using graph neural network frameworks. Before experimentation, we ensure...
详细信息
ISBN:
(纸本)9798350366235;9798350366242
In this paper, we propose a novel approach to improve instance segmentation and classification tasks by incorporating SegmentAnything [1] before using graph neural network frameworks. Before experimentation, we ensure comprehensive data labeling using SegmentAnything for instance segmentation and Grounding DINO [2] for class annotation. Our study aims to evaluate the effectiveness of this integration by conducting a comparative analysis with the state-of-the-art Vision Transformer model [3]. Surprisingly, our experiments reveal that while the vision transformer has demonstrated remarkable performance in various tasks, it underperforms compared to our proposed approach on the same dataset. Our findings underscore the efficacy of integrating SegmentAnything with graph neural networks for instance segmentation and classification tasks, emphasizing the pivotal of those networks in advancing computer vision methodologies.
Imminent Throughput (ITP), the number of vehicles in a movement that can pass through an intersection given a unit of effective green time, serves as a crucial control input in many real-time optimization-based contro...
详细信息
ISBN:
(纸本)9798350399462
Imminent Throughput (ITP), the number of vehicles in a movement that can pass through an intersection given a unit of effective green time, serves as a crucial control input in many real-time optimization-based control schemes. The accuracy of ITP prediction can significantly influence controlperformance. If a movement with a green signal cannot discharge as many vehicles as predicted by the controller, its performance may be significantly reduced. However, most existing studies have focused on the design of control schemes while neglecting the importance of precise ITP prediction. These studies either assume that ITP can be accurately predicted or use traditional indices (e.g., saturation flow rate) or heuristic methods to predict ITP, resulting in relatively low accuracy. This paper proposes the use of a Deep Neural network (DNN) to predict ITP and demonstrates that the DNN with Multiple Classifications (NN-C) models can predict ITP with higher accuracy, lower mean absolute error, and lower root mean squared error than other prediction methods (regression, decision tree, and heuristic methods). Experiments also show that controlperformance can be improved with more accurate ITP predictions using the NN-C.
Aiming at the requirements of high precision, strong robustness, and strong anti-disturbance ability of the anti-aircraft gun servo system, as well as the problems of internal parameter perturbation and external shoot...
详细信息
The security of Industrial controlsystems (ICSs) is critical for the operation of essential infrastructure like energy, water, and transportation. However, ICS communication protocols often lack essential security fe...
详细信息
ISBN:
(纸本)9798350367782;9798350367775
The security of Industrial controlsystems (ICSs) is critical for the operation of essential infrastructure like energy, water, and transportation. However, ICS communication protocols often lack essential security features, making them vulnerable to advanced persistent threat (APT) attacks, as evidenced by cyberattacks like Stuxnet and Triton. One potential solution is deploying Intrusion Detection systems (IDS) to monitor network traffic and detect intrusions. While Machine Learning (ML) and Deep Learning (DL) have shown promise for IDS, testing these methods in real ICS environments is impractical due to the risk of disruptions and the challenge of labeling data without altering system functionality. This study compares the performance of several ML classifiers, including Logistic Regression, Decision Tree, XGBoost, Random Forest, ANN, LightGBM, and SVM, in detecting ICS cyberattacks. The classifiers generally performed well but showed variations depending on the type of attack. For instance, Decision Tree, Random Forest, and SVM excelled in detecting DDoS attacks, while performance dropped for PortScan attacks. LightGBM outperformed others across multiple attack types, with F-scores between 0.993 and 1.000. The study highlights the importance of comprehensive, labeled datasets for improving IDS effectiveness in ICS environments.
With the rapid development of electrical engineering, electric controlsystems have entered a period of high-quality development. By focusing on fuzzy logic-based neural networks, new proposals should be submitted to ...
详细信息
Access control List (ACL) management in complex, distributed network environments poses significant challenges for organizations relying on heterogeneous infrastructures. This paper proposes a novel architecture lever...
详细信息
ISBN:
(纸本)9798331534110;9798331534103
Access control List (ACL) management in complex, distributed network environments poses significant challenges for organizations relying on heterogeneous infrastructures. This paper proposes a novel architecture leveraging Infrastructure as Code principles, containerization, and Kubernetes orchestration to automate and streamline ACL management at scale. Our solution incorporates a CI/CD pipeline for ACL generation, utilizing Capirca for platform-agnostic policy definition and Docker for consistent packaging. A Kubernetes Deployment controller manages the safe rollout of ACLs across diverse network devices, employing a phased approach with canary deployments. A Drift Detection controller ensures continuous compliance by monitoring and rectifying unauthorized changes. The architecture integrates with external systems like NetBox for efficient device inventory management. By automating the entire ACL lifecycle, our approach significantly reduces manual errors, enhances security posture, and improves operational efficiency. performance evaluation reveals strong scalability, with optimization opportunities for large-scale deployments. This work contributes to the evolving field of network security automation, offering a framework for managing network security policies in modern, complex infrastructures.
Connectivity robustness and controllability robustness play a crucial role in maintaining the stability of complex networksystems. Recently, complex networksystems have faced an increasing number of malicious attack...
详细信息
Real-time target tracking is a usual task for humans despite the neural delays during the nervous system's axonal transfer and neural processing. A plausible explanation is that the human brain employs predictive ...
详细信息
Real-time target tracking is a usual task for humans despite the neural delays during the nervous system's axonal transfer and neural processing. A plausible explanation is that the human brain employs predictive mechanisms to compensate for the delay. Inspired by the brain, this brief adopts a prediction network based on spiking neural networks (SNNs) to implement a real-time tracking task on a neuromorphic chip with low power consumption. The SNN-based prediction network outperforms the long short-term memory (LSTM) network on a small dataset and reduces 90% to 98% computations compared with LSTM. The quantized SNN-based network is deployed on a neuromorphic chip, and it takes 25ms and only 442 similar to 626nJ for a single prediction. The tracking performance of the system is also verified in real-life scenarios. Furthermore, the proposed real-time target tracking system can be easily ported to other neuromorphic platforms.
暂无评论