In the present work is investigated the impact of ambient temperature in the range of 20°C to 50°C under a change in relative humidity RH of 20% up to 92 % on the characteristics of a highly sensitive TiO2-S...
详细信息
This paper investigates the continuous-time unconstrained optimization via dynamical gradient flow systems. For strongly convex objective functions, a gradient flow with predefined time convergence is proposed, which ...
详细信息
This paper proposes an innovative vector control method for single-phase differential Buck inverters, advancing beyond the limitations of traditional control strategies. Unlike previous methods that require a T/4 dela...
详细信息
This article addresses the practically predefined-time adaptive fuzzy tracking control problem of strict-feedback nonlinear stochastic systems, where the system under consideration includes stochastic disturbances and...
详细信息
The main focus of this research is on improving the performance of dynamic systems with actuator non-linearities and time-varying disturbances. To this end, using the concept of finite-time stability, a novel observer...
详细信息
Dear editor,Traffic jams have become an important issue in urban networks, particularly for arterial roads [1]. The need for more efficient traffic control techniques has become critical. One good solution is the so-c...
详细信息
Dear editor,Traffic jams have become an important issue in urban networks, particularly for arterial roads [1]. The need for more efficient traffic control techniques has become critical. One good solution is the so-called intelligent vehicleinfrastructure cooperation systems (i-VICS), which assumes autonomous vehicles in the traffic flow (i.e., a mixed traffic flow). The aim of i-VICS is to achieve cooperative vehicle intersection control, i.e., to enable cooperation between vehicles and traffic signals, for safe and efficient intersection operations.
This paper aims to tackle the cooperative output regulation problem of multi-agent systems with the existence of distributed denial of service attacks. The proposed solution consists of two steps. First, develop a dis...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Iterative learning control (ILC) is excellently applied to output tracking for systems that perform repetitive tasks. Classical norm optimal ILC (NOILC) approach yields optimal control inputs by minimizing a quadratic...
详细信息
Dear editor,Interest in terms of research on formation control of multiple autonomous underwater vehicles (multi-AUVs) has gained considerable attention in recent years [1–5], owing to its extensive applications in d...
详细信息
Dear editor,Interest in terms of research on formation control of multiple autonomous underwater vehicles (multi-AUVs) has gained considerable attention in recent years [1–5], owing to its extensive applications in deep sea inspection, ocean sampling and localization.
暂无评论