This paper investigates and contrasts the use of different Bayesian networks and a fuzzy integral for real-time sensor fusion using sonar and rangefinder laser values on an ActivMedia robot. Bayesian networks have bec...
详细信息
This paper investigates and contrasts the use of different Bayesian networks and a fuzzy integral for real-time sensor fusion using sonar and rangefinder laser values on an ActivMedia robot. Bayesian networks have become increasingly popular because of their ability to capitalize on the conditional probabilities present in an influence chain. The Choquet fuzzy integral, which has primarily been used for statistical analysis, has a great power of description. Comparison of the two methods indicates that noise within the sensor network can drastically affect the accuracy of the results, especially those obtained using the Bayesian network.
Survivability and reliability are critical for the operation of shipboard power system both in normal and damage conditions. This paper presents a novel dynamic reconfiguration approach for shipboard power system by u...
详细信息
Survivability and reliability are critical for the operation of shipboard power system both in normal and damage conditions. This paper presents a novel dynamic reconfiguration approach for shipboard power system by using multi-agent system. With the similar topology of the shipboard power system, the multi-agent system is generalized to constraint satisfaction problem (CSP). The environment- reactive rules-agents (ERA) approach, which is multi-agent oriented, is used to support the organization formation behavior in dynamic reconfiguration. The effectiveness of the proposed approach is illustrated by test results in a reduced shipboard power system.
A novel polarization-frequency-multiplexing scheme is implemented to suppress noise in a fiber-based Gaussian-modulated coherent-state quantum key distribution system. The achievable secrete key rate is 0.30 bit/pulse...
详细信息
ISBN:
(纸本)9781557528599
A novel polarization-frequency-multiplexing scheme is implemented to suppress noise in a fiber-based Gaussian-modulated coherent-state quantum key distribution system. The achievable secrete key rate is 0.30 bit/pulse with a 5 km-fiber and 0.05 bit/pulse with a 20 km-fiber.
Quantum-key-distribution (QKD) systems can send quantum signals over more than 100km standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attack—namely,...
详细信息
Quantum-key-distribution (QKD) systems can send quantum signals over more than 100km standard optical fiber and are widely believed to be secure. Here, we show experimentally a technologically feasible attack—namely, the time-shift attack—against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (∼4%) to break the security of the system. Eve’s success is due to the well-known detection efficiency loophole in the experimental testing of Bell’s inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD systems.
We describe various results related to the random-party distillation of multiparty entangled states—that is, conversion of such states into entangled states shared between fewer parties, where those parties are not p...
详细信息
We describe various results related to the random-party distillation of multiparty entangled states—that is, conversion of such states into entangled states shared between fewer parties, where those parties are not predetermined. In previous work we showed that certain output states (namely Einstein-Podolsky-Rosen pairs) could be reliably acquired from a prescribed initial multipartite state [namely the W state |W⟩=13(|100⟩+|010⟩+|001⟩)] via random-party distillation that could not be reliably created between predetermined parties. Here we provide a more rigorous definition of what constitutes “advantageous” random-party distillation. We show that random-party distillation is always advantageous for W-class three-qubit states (but only sometimes for Greenberger-Horne-Zeilinger class states). We show that the general class of multiparty states known as symmetric Dicke states can be readily converted to many other states in the class via random-party distillation. Finally we show that random-party distillation is provably not advantageous in the limit of multiple copies of pure states.
The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropp...
详细信息
The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.
Brain emotional learning based intelligent controller (BELBIC) is based on computational model of limbic system in the mammalian brain. In recent years, this model was applied in many linear and nonlinear control appl...
Brain emotional learning based intelligent controller (BELBIC) is based on computational model of limbic system in the mammalian brain. In recent years, this model was applied in many linear and nonlinear control applications. Previous studies show that this controller has fast response, simple implementation and robustness with respect to disturbances. It is also possible to define emotional signal based on control application objectives. But in the previous studies, internal instability of this controller was not considered and control task were done in limited time period. In this article mathematical description of BELBIC is investigated and improved to avoid internal instability. Simulation and implementation of improved model was done on level plant. The obtained results showed that instability of model has been solved in the new model without loss of performance by using Integral Anti Windup (IAW).
This paper presents a new method to solve unit commitment problem with operating constraints using a hybrid ant system/priority list method (HASP). The proposed methodology employs ant system in cooperating with the p...
详细信息
This paper presents a new method to solve unit commitment problem with operating constraints using a hybrid ant system/priority list method (HASP). The proposed methodology employs ant system in cooperating with the priority list method to find unit commitment solution as means of mutually combining the advantages of them in that a flexibility of the priority list method is reinforced, while AS algorithm can gain the benefit of using bias information for improving its performance during search process. The simulation results show that the proposed HASP is capable of obtaining satisfactory solution within reasonable computational time.
Testable second moment stability conditions for discrete-time supervisory control systems were recently developed using the Hybrid Jump Linear Systems (HJLSpsilas) framework. These tests are extended here to sampled-d...
详细信息
Testable second moment stability conditions for discrete-time supervisory control systems were recently developed using the Hybrid Jump Linear Systems (HJLSpsilas) framework. These tests are extended here to sampled-data supervisory control systems using the new sampled-data HJLS (SD-HJLS) framework. It is shown first that the p-moment stability of SD-HJLSpsilas equipped with ideal sample and hold operators is equivalent to that of their associated HJLSpsilas. Then, the second moment stability analysis tools developed for HJLSpsilas are extended to SD-HJLSpsilas. Finally, the results are illustrated through a Monte Carlo simulation of a simple example.
As a way to reduce the on-line computational burden, explicit solution to the problem of optimal control for some classes of hybrid systems can be found by reformulating the problem as multi-parametric MILP problems. ...
详细信息
As a way to reduce the on-line computational burden, explicit solution to the problem of optimal control for some classes of hybrid systems can be found by reformulating the problem as multi-parametric MILP problems. The main contribution of this paper is the introduction of an approximation algorithm for solving a general class of mp-MILP problems. The algorithm wisely selects those binary sequences which make important improvement in the objective function if considered. It is shown that considerable reduction in computational complexity could be achieved by introduction of adjustable level of suboptimality. So a family of suboptimal controllers would be obtained for which the level of error and complexity can be adjusted by a tuning parameter. Several important theoretical results about approximate solutions to the mp-MILP problem are presented. It is shown that no part of the parameter space is lost during the approximation. Also it is proved that the error in the achieved approximate solutions is monotonically increasing function of the tuning parameter. The reduced complexity achieved by the proposed approach is clarified through an illustrative example.
暂无评论