In this paper, the stabilization a triangular system with both unknown parameters and external disturbances is investigated. Firstly, three suitable filters are proposed and used to design disturbance estimator (DE)-b...
详细信息
ISBN:
(纸本)9798350366907;9789887581581
In this paper, the stabilization a triangular system with both unknown parameters and external disturbances is investigated. Firstly, three suitable filters are proposed and used to design disturbance estimator (DE)-based controller which can asymptotically estimate the external disturbance. Secondly, and adaptive DE-based controller is proposed to realize the stabilization of such system. Finally, numerical simulation results by computer are applied to verify the validity and accuracy of the obtained theoretical results.
In this paper, an English machine translation system based on human-computer interaction enhancement algorithm is designed. The hardware part uses the sub board as the processing core. design Internet data controller....
详细信息
With the rapid increase of data in the insurance industry, traditional risk assessment methods are facing limitations, while neural network technology has attracted much attention because of its powerful pattern recog...
详细信息
This paper proposes to develop an all-condition test platform based on the Beckhoff TWINCAT control software package, GH Bladed simulation software, and the physical back-to-back test system for the development of the...
详细信息
The success of DL can be attributed to hours of parameter and architecture tuning by human experts. Neural Architecture Search (NAS) techniques aim to solve this problem by automating the search procedure for DNN arch...
详细信息
In this work, we present GitTruck@Duck;a web-powered software visualization tool that combines hierarchical file structure with configurable software evolution and collaboration metrics on adjustable time ranges. In a...
详细信息
ISBN:
(纸本)9798350395693;9798350395686
In this work, we present GitTruck@Duck;a web-powered software visualization tool that combines hierarchical file structure with configurable software evolution and collaboration metrics on adjustable time ranges. In an automated mining process, Git Truck aggregates a system's Git history using an in-memory relational database, along with an algorithm for detecting the renaming of files over time. Users can explore the Git history in a 2D hierarchical visualization of folders and files, where they encode evolution and collaboration metrics (e.g., top contributors or last change date) on the size and color of the marks that represent files. Users can gain fine-grain control over these metrics by specifying the time ranges for inspection.
In view of the lack of practical means of network performance management, this paper firstly studies the relevant technologies of network performance monitoring, and compares and analyzes the commonly used network tra...
详细信息
With the continuous progress of power system and power electronics technology, multiple power electronic devices play an increasingly important role in power systems. Due to the variety and large number of source-side...
详细信息
The complexity of modern system-on-chip (SoC) designs and the ever shortened time-to-market (TTM) makes the third-party intellectual property (3PIP) a cornerstone in the modern SoC supply chain. Various 3PIPs are invo...
详细信息
The complexity of modern system-on-chip (SoC) designs and the ever shortened time-to-market (TTM) makes the third-party intellectual property (3PIP) a cornerstone in the modern SoC supply chain. Various 3PIPs are involved in modern SoCs, performing functionality ranging from computation accelerating to sensitive data processing. The wide use of 3PIPs also raises security concerns, e.g., hardware Trojans inserted in 3PIPs may compromise the security of the whole system. While SoC integrators carefully evaluate the functionality of the acquired 3PIPs, there lack effective and low-cost solutions for third-party IP security validation in the SoC environment. Exacerbating the issue, Trojans may be located in multiple IPs and will only perform malicious tasks collaboratively. To address these limitations and to protect modern SoCs, we propose a runtime 3PIP Trojan detection framework. The new framework, named IP-Tag, is a tag-based structure to track the requests on SoC and enforce fine-grained access control in individual IPs. The proposed framework can detect and prevent illegal access and sensitive data leakage on IPs within the SoC environment. The proposed IP-Tag framework was demonstrated on an RISC-V-based SoC and also implemented on an FPGA platform for security and performance analysis. Our experimental results show that the developed IP-Tag can detect and prevent illegal access and sensitive data leakage in SoC with malicious IPs. The hardware overhead is 7.9% LUTs and 7.8% Flip-Flops and a performance overhead is 2.2%.
With the rapid development of science and technology, artificial intelligence (AI) has penetrated into every aspect of our lives. Especially in the field of intelligent controlsystem, the application of AI algorithm ...
详细信息
暂无评论