In this paper, we discuss the problem of learning state observers for Recurrent Neural network (RNN) black-box models of dynamical systems. State observers are indeed key to designing state-feedback control laws, such...
详细信息
Grid-based voltage source inverters frequently utilize the droop control technique combined with inner/outer voltage and current regulation mechanisms to ensure a dependable electricity supply. This study seeks to int...
详细信息
ISBN:
(纸本)9798331541613;9798331541606
Grid-based voltage source inverters frequently utilize the droop control technique combined with inner/outer voltage and current regulation mechanisms to ensure a dependable electricity supply. This study seeks to introduce a Cascade-Forward Neural network (CFNN) control approach designed to lead inverter-based grids when operating in grid-connected or islanded modes, focusing on improving the transient state performance of the CFNN technique. The suggested approach involves utilizing the inverter in a bidirectional manner, suitable for a diverse array of battery energy storage systems and distributed generation setups. The proposed strategy leverages CFNN to grasp the inverter's non-linear model, enabling precise monitoring of demand and reference power across various operational scenarios within smart grid applications. Furthermore, the approach redefines the grid control concept, guiding the inverter according to optimal parameters that encompass power demand, reference power, equipment dimensions, and external disturbances. Notably, this method circumvents the need for any manual tuning procedures. Furthermore, incorporating dynamic elements into the approach improves the protection system's responsiveness. This ensures continuous power supply during faults, enabling a more effective and rapid response, enhancing system resilience, and reducing downtime. This dual advantage of better power supply and heightened protection system sensitivity highlights the proposed method's significance in fortifying the reliability of power systems.. To assess the efficacy of the suggested CFNN controller, its power tracking, operational capabilities, and dynamic response are assessed via multiple experimental trials employing the hardware-in-the-loop (HIL) approach across various scenarios. The outcomes of these tests are meticulously compared to a well-established conventional strategy, affirming the effectiveness of the proposed method.
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navig...
详细信息
ISBN:
(纸本)9798350311259
Advanced Persistent Threats (APTs) have been a major challenge in securing both Information Technology (IT) and Operational Technology (OT) systems. APT is a sophisticated attack that masquerade their actions to navigates around defenses, breach networks, often, over multiple network hosts and evades detection. It also uses "low-and-slow" approach over a long period of time. Resource availability, integrity, and confidentiality of the operational cyber-physical systems (CPS) state and control is highly impacted by the safety and security measures in place. A framework multi-stage detection approach termed "APT(DASAC)" to detect different tactics, techniques, and procedures (TTPs) used during various APT steps is proposed. Implementation was carried out in three stages: (i) Data input and probing layer - this involves data gathering and pre-processing, (ii) Data analysis layer;applies the core process of "APT(DASAC)" to learn the behaviour of attack steps from the sequence data, correlate and link the related output and, (iii) Decision layer;the ensemble probability approach is utilized to integrate the output and make attack prediction. The framework was validated with three different datasets and three case studies. The proposed approach achieved a significant attacks detection capability of 86.36% with loss as 0.32%, demonstrating that attack detection techniques applied that performed well in one domain may not yield the same good result in another domain. This suggests that robustness and resilience of operational systems state to withstand attack and maintain system performance are regulated by the safety and security measures in place, which is specific to the system in question.
Pushing is an essential motor skill involved in several manipulation tasks, and has been an important research topic in robotics. Recent works have shown that Deep Q-networks (DQNs) can learn pushing policies (when, w...
详细信息
ISBN:
(纸本)9781665491907
Pushing is an essential motor skill involved in several manipulation tasks, and has been an important research topic in robotics. Recent works have shown that Deep Q-networks (DQNs) can learn pushing policies (when, where to push, and how) to solve manipulation tasks, potentially in synergy with other skills (e.g. grasping). Nevertheless, DQNs often assume a fixed setting and task, which may limit their deployment in practice. Furthermore, they suffer from sparse-gradient backpropagation when the action space is very large, a problem exacerbated by the fact that they are trained to predict state-action values based on a single reward function aggregating several facets of the task, rendering the model training challenging. To address these issues, we propose a multi-head target-parameterized DQN to learn robotic manipulation tasks, in particular pushing policies, and make the following contributions: i) we show that learning to predict different reward and task aspects can be beneficial compared to predicting a single value function where reward factors are not disentangled;ii) we study several alternatives to generalize a policy by encoding the target parameters either into the network layers or visually in the input;iii) we propose a kernelized version of the loss function, allowing to obtain better, faster and more stable training performance. Extensive experiments on simulations validate our design choices, and we show that our architecture learned on simulated data can achieve high performance in a real-robot setup involving a Franka Emika robot arm and unseen objects.
With the development of vehicle autonomous driving technology and wireless network communication technology, the mix platoon of connected autonomous vehicles (CAVs) and connected human-driven vehicles (CHVs) is becomi...
详细信息
The integration of intrusion detection systems (IDS) is crucial for strengthening network security. Improving IDS performance requires advanced techniques for handling intrusion detection data, with machine learning p...
详细信息
We formulate the design of a taxation mechanism as a Stackelberg game assuming: a) perfect competition, with exogenous prices;b) imperfect competition, captured through a variational inequality approach, with endogeno...
详细信息
ISBN:
(纸本)9783031785993;9783031786006
We formulate the design of a taxation mechanism as a Stackelberg game assuming: a) perfect competition, with exogenous prices;b) imperfect competition, captured through a variational inequality approach, with endogenous prices. Three settings of the mechanism are considered: (i) benchmark involving no taxation, (ii) optimum tariff, (iii) optimum sanction. The expected utility maximization formulation of the game is extended further by relying on cumulative prospect theory to account for the bounded rationality of the stakeholders. We derive closed-form mappings linking the outcomes of the three settings. Additionally, we assess the impact of bounded rationality through a new performance metric, the Price of Irrationality. Numerical results are derived on a randomized instance of a gas trading game between Europe, Asia, and Russia.
作者:
Jia, HanguangSchool of Automation Science and Engineering
South China University of Technology National Key Laboratory of Science and Technology on Reliability Physics and Application of Electronic Component The Fifth Electronics Research Institute of the Ministry of Industry and Information Technology Guangzhou China
This paper proposes a new learning approach to solve control design problems involving uncertain parameters in MEMO networked controlsystems. This approach combines neural network technology with control system model...
详细信息
Until recently, researchers used machine learning methods to compensate for hardware imperfections at the symbol level, indicating that optimum radio-frequency transceiver performance is possible. Nevertheless, such a...
详细信息
ISBN:
(纸本)9798350339109
Until recently, researchers used machine learning methods to compensate for hardware imperfections at the symbol level, indicating that optimum radio-frequency transceiver performance is possible. Nevertheless, such approaches neglect the error correcting codes used in wireless networks, which inspires machine learning (ML)-approaches that learn and minimise hardware imperfections at the bit level. In the present work, we evaluate a graph neural network (GNN)-based intelligent detector's in-phase and quadrature imbalance (IQI) mitigation capabilities. We focus on a high-frequency, high-directional wireless system where IQI affects both the transmitter (TX) and the receiver (RX). The TX uses a GNN-based decoder, whilst the RX uses a linear error correcting algorithm. The bit error rate (BER) is computed using appropriate Monte Carlo simulations to quantify performance. Finally, the outcomes are compared to both traditional systems using conventional detectors and wireless systems using belief propagation based detectors. Due to the utilization of graph neural networks, the proposed algorithm is highly scalable with few training parameters and is able to adapt to various code parameters.
This paper presents a near-space communication system (NSCS) using advanced deployment strategies to gain high throughput. The airships are deployed according to the user's location, assuming robust backbone netwo...
详细信息
This paper presents a near-space communication system (NSCS) using advanced deployment strategies to gain high throughput. The airships are deployed according to the user's location, assuming robust backbone network characteristics such as signal path loss, fading factor, routing efficiency, and safety issues among bi-connected airships. Due to the independent flying nature of airships, it is very attractive to deploy them as aerial base stations and construct airborne networks to provide service for on-ground users. However, it is quite challenging to optimally deploy multiple airships for on-demand coverage while maintaining the connectivity among airships. A balance between the network parameters, i.e., capacity and coverage area, should be maintained for optimal deployment of the airships. We have derived the maximum throughput of NSCS, including system parameters, as a multiobjective optimization problem subjected to efficient routing protocol and safety constraints. A decomposition-based advanced multiobjective evolutionary algorithm (AMOEA/D) is adopted to solve the deployment optimization problem. The proposed algorithm is motivated by the non-dominated solutions that maintain population diversity over the variable space. Two designed test problems, that is, the L-shaped hotspot problem and nine hotspot problems, are also investigated. Numerical results show that the proposed method improves the system performance compared with benchmark external archive-guided MOEA/D (EGA-MOEA/D) and non-dominated sorted genetic algorithms (NSGA-ii) by 10.46% and 3.84%, respectively. This figure illustrates the system model of the near-space communication system. It consists of multiple airships with the same characteristics following identical communication protocols. All airships hover at the same altitude and serve as aerial base stations at any particular instant. The coverage area of each airship depends on its altitude and communication range. These airships can serve
暂无评论