Active techniques have been introduced to give better detectability performance for cyber-attack diagnosis in cyber-physical systems (CPS). In this paper, switching multiplicative watermarking is considered, whereby w...
详细信息
Reliable short-term photovoltaic (PV) power forecasting is of crucial significance for the rational dispatching of power sources and the effective control of operating costs for the power grid. However, temporal misal...
详细信息
One DOF (degree of freedom) Twin Rotor multi-input multi-output system (TRMS) is one of the benchmarked dynamical systems which has striking comparability with Helicopter. Design of controllers for such complex air ve...
详细信息
Tag-based physical-layer authentication (PLA) has gained significant research interest due to its high security and low complexity compared to traditional upper-layer authentication mechanisms. However, conventional t...
详细信息
This study addresses linear attacks on remote state estimation within the context of a constrained alarm rate. Smart sensors, which are equipped with local Kalman filters, transmit innovations instead of raw measureme...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
This study addresses linear attacks on remote state estimation within the context of a constrained alarm rate. Smart sensors, which are equipped with local Kalman filters, transmit innovations instead of raw measurements through a wireless communication network. This transmission is vulnerable to malicious data interception and manipulation by attackers. The aim of this research is to identify the optimal attack strategy that degrades the system performance while adhering to stealthiness constraints. A notable innovation of this paper is the direct association of the attack’s stealthiness with the alarm rate, diverging from traditional approaches that rely on the covariance of the innovation or the Kullback–Leibler divergence, which are conventional metrics that have been extensively explored in previous studies. Our findings reveal that the optimal attack strategy exhibits some structural characteristics in systems of low dimensions. The performance of the proposed attack strategy is demonstrated through numerical examples.
This paper considers the problem of monitoring and adaptively estimating an environmental field, such as temperature or salinity, using an autonomous underwater vehicle (AUV). The AUV moves in the field and persistent...
This paper considers the problem of monitoring and adaptively estimating an environmental field, such as temperature or salinity, using an autonomous underwater vehicle (AUV). The AUV moves in the field and persistently measures environmental scalars and its position in its local coordinate frame. The environmental scalars are approximately linearly distributed over the region of interest, and an adaptive estimator is designed to estimate the gradient. By orthogonal decomposition of the velocity of the AUV, a linear time-varying system is equivalently constructed, and the sufficient conditions on the motion of the AUV are established, under which the global exponential stability of the estimation error system is rigorously proved. Furthermore, an estimate of the exponential convergence rate is given, and a reference trajectory that maximizes the estimate of the convergence rate is obtained for the AUV to track. Numerical examples verify the stability and efficiency of the system.
In face of the increasing penetration of renewable energy, compressed air energy storage (CAES) is promising in improving the flexibility of the conventional coal-fired combined heating and power plant (CHPP). In orde...
详细信息
This paper investigates the distributed time-varying formation(TVF) problems for general linear multi-agent systems(MASs) subject to matched bounded uncertainties based on an adaptive event-triggered mechanism. A TVF ...
详细信息
This paper investigates the distributed time-varying formation(TVF) problems for general linear multi-agent systems(MASs) subject to matched bounded uncertainties based on an adaptive event-triggered mechanism. A TVF protocol was designed with an event-triggered mechanism by introducing adaptive weights into the formation control protocol and triggering condition, and the large chattering phenomenon was avoided by the σ-modification adaptive law. According to the Lyapunov stability theory, proof has been established that the MASs in the presence of uncertainties can realize the expected formation that satisfies the given feasible condition. Finally, an example is provided to verify the effectiveness of the proposed algorithm.
Linear PID controllers are commonly used as an electrical component to decrease the error between anticipated set value and actual measured values for control of various benchmarked systems. The Multi-Loop Linear PID ...
详细信息
Testing the symmetries of quantum states and channels provides a way to assess their usefulness for different physical, computational, and communication tasks. Here, we establish several complexity-theoretic results t...
详细信息
暂无评论