As the Industrial Internet of Things evolves, ever more data acquisition devices are integrated inside factories, silos, agriculture facilities, industrial facilities, cars and many other applications. One of the most...
详细信息
This paper is dedicated to simulation validation of cascade control structure for heating system consisting of single heat source and single heat receiver. In this structure, two Balance-Based Adaptive controllers are...
详细信息
This paper is dedicated to simulation validation of cascade control structure for heating system consisting of single heat source and single heat receiver. In this structure, two Balance-Based Adaptive controllers are applied. One of them has the conventional form while the second one (so-called distributed parameter Balance-Based Adaptive controller operating in primary loop) is derived based on simplified distributed parameter modeling of plate heat exchanger. Modeling of heating system is based on measurement data collected from real laboratory plant and the simulation validation shows significant superiority of the suggested control approach in terms of control performance.
We formulate fractional difference equations of Riemann-Liouville and Caputo type in a functional analytical framework. Main results are existence of solutions on Hilbert space-valued weighted sequence spaces and a co...
详细信息
Two anomaly detectors for control systems are analyzed with respect to their sensitivity to malicious data injection attacks. A stateless anomaly detector based on the current residual signal is compared to a cumulati...
详细信息
ISBN:
(纸本)9781509045839
Two anomaly detectors for control systems are analyzed with respect to their sensitivity to malicious data injection attacks. A stateless anomaly detector based on the current residual signal is compared to a cumulative sum detector. The worst-case impact of a stealthy time-limited data injection attack is characterized for both detectors by a non-convex optimization problem and compared to determine which detector limits the impact the most. We prove that the problem can be solved by means of a set of convex optimization problems. Simulations verify that finding the right configuration for the cumulative sum is crucial to limit the worst-case attack impact more than with a stateless anomaly detector.
Modem mobile devices, such as smartphones and tablets, are offering a wide range of entertainment applications that require an increasing amount of computational and storage resources. To address such needs, developer...
详细信息
Modem mobile devices, such as smartphones and tablets, are offering a wide range of entertainment applications that require an increasing amount of computational and storage resources. To address such needs, developers transfer the load from the mobiles to remote resources, usually in a Cloud infrastructure. The focus of our work is to find policies for balancing the load between devices and remote resources using offloading techniques. We apply these techniques on a popular artificial intelligence intensive mobile game, OpenTTD and seek to reduce the server-side load by leveraging the devices computing capabilities.
Physicians as the most important tool in the diagnosis of acute and chronic heart conditions leverage the Electrocardiogram (ECG) data. The huge volume of data that needs to be gathered;processed as well as transmitte...
详细信息
This paper addresses the problem of automaticcontrol of the blood pressure in post cardiac surgery patients. The focus of this study is on showing that reinforcement learning may be suitable for the blood pressure re...
详细信息
This paper addresses the problem of automaticcontrol of the blood pressure in post cardiac surgery patients. The focus of this study is on showing that reinforcement learning may be suitable for the blood pressure regulation in post cardiac surgery patients, using directly the clinical data, without the need of an accurate patient model. A detailed and realistic model of a hypertensive patient is successfully developed and implemented. Firstly, we use this model in order to create closed loop control with a classical PID controller. Secondly, we use the model only as a source of pseudo-clinical data with reinforcement learning.
In this article it is proposed and designed a modern control configuration of the type multicontroler-multimodel (MM) that pilots the nonlinear combustion process of the Diesel engine, needed to adjust the pressure in...
In this article it is proposed and designed a modern control configuration of the type multicontroler-multimodel (MM) that pilots the nonlinear combustion process of the Diesel engine, needed to adjust the pressure in the intake manifold and the airflow circulating through the compressor. The MM simulator developed by the authors allows the implementation of control systems represented by pairs (Mi, Ci) with the Mi candidate closest to the current operating point of the process and the paired controller Ri, for controlling the key parameters of the combustion process. The proposed configuration is built with robust controllers and thus it is able to ensure superior performance, tolerance to nonlinearities and parametric and structural perturbations in the system.
In this paper, we present some results for existence of global solutions and attractivity for mulidimensional fractional differential equations involving Riemann-Liouville derivative. First, by using a Bielecki type n...
详细信息
In this paper, simulation and practical implementation of direct power control is presented for a PWM Rectifier application. The proposed DPC control has several advantages, including the grid current very close to si...
详细信息
ISBN:
(纸本)9781509039616
In this paper, simulation and practical implementation of direct power control is presented for a PWM Rectifier application. The proposed DPC control has several advantages, including the grid current very close to sinusoidal waveforms (TDH
暂无评论