This article investigates the finite-time leader-following formation control (LFC) problem for multiple unmanned surface vehicles (USVs) subject to disturbances and hybrid irregular (HI) output constraints. Here, the ...
详细信息
A fresh algorithm is presented for tackling the economic dispatch problem (EDP) in smart grids with directed network topology. This algorithm is based on distributed consensus and aims to minimize the total cost of po...
详细信息
In this paper, the distributed form of the zeroing neural network for solving time-varying optimal problems is put forward. Compared with traditional centralized algorithms, distributed algorithms possess better priva...
详细信息
As the advancement of sensing technology and cyber-physical equipment, the complexity and dimensionality of the data from consumer internet of things have increased dramatically. processing the complex and multi-view ...
详细信息
This paper investigates the secrecy outage performance of underlay cognitive radio networks, in which a source in a secondary system transmits its confidential information to a legitimate destination in the presence o...
详细信息
This paper investigates the secrecy outage performance of underlay cognitive radio networks, in which a source in a secondary system transmits its confidential information to a legitimate destination in the presence of an eavesdropper. Specifically, the main(the source-to-destination) and eavesdropping(the sourceto-eavesdropper) channels are assumed to be correlated. Moreover, it is also assumed that the main channel and the channel from the source to the primary user's receiver are correlated. Tight closed-form analytical expression for secrecy outage probability and the closed-form analytical expression for the probability of non-zero secrecy capacity are derived and validated by simulation results when the interference temperature limit is comparably large.
A fully distributed microgrid system model is presented in this *** the user side,two types of load and plug-in electric vehicles are considered to schedule energy for more *** charging and discharging states of the e...
详细信息
A fully distributed microgrid system model is presented in this *** the user side,two types of load and plug-in electric vehicles are considered to schedule energy for more *** charging and discharging states of the electric vehicles are represented by the zero-one variables with more *** solve the nonconvex optimization problem of the users,a novel neurodynamic algorithm which combines the neural network algorithm with the differential evolution algorithm is designed and its convergence speed is faster.A distributed algorithm with a new approach to deal with the inequality constraints is used to solve the convex optimization problem of the generators which can protect their *** results and comparative experiments show that the model and algorithms are effective.
Dear editor,Chaotic maps have good characteristics, which include randomness, sensitivity to the initial value,and unpredictability. Hence, there have been many attempts to discuss the dynamic behavior of chaotic maps...
详细信息
Dear editor,Chaotic maps have good characteristics, which include randomness, sensitivity to the initial value,and unpredictability. Hence, there have been many attempts to discuss the dynamic behavior of chaotic maps in the field of chaotic ***, the limited computation, finite memory,
In this paper, we investigate the physical-layer secrecy outage performance of underlay spectrum sharing systems over Rayleigh and log-normal fading channels in the presence of one eavesdropper. In particular, the sec...
详细信息
In this paper, we investigate the physical-layer secrecy outage performance of underlay spectrum sharing systems over Rayleigh and log-normal fading channels in the presence of one eavesdropper. In particular, the secondary transmitter sends data to the legitimate receiver under the constraints of the interference temperature at the primary receiver, while suffering the wiretap from the eavesdropper. Closed-form and approximated expressions are derived for the secrecy outage probability over Rayleigh and log-normal fading channels,respectively. The accuracy of our performance analysis is verified by simulation results.
Dear editor,Adaptive filtering algorithms have been widely applied in system identification, channel equalization, and echo cancellation over the past decades [1–3]. Generally, adaptive filtering algorithms can be ge...
详细信息
Dear editor,Adaptive filtering algorithms have been widely applied in system identification, channel equalization, and echo cancellation over the past decades [1–3]. Generally, adaptive filtering algorithms can be generalized by the least mean square(LMS)-based algorithms. According to the shape
In general, the ocean bathymetric dataset is defined on a uniform rectangular grid, whereas FVCOM employs an unstructured triangular grid. Consequently, it is necessary to interpolate the data from the nodes of the re...
In general, the ocean bathymetric dataset is defined on a uniform rectangular grid, whereas FVCOM employs an unstructured triangular grid. Consequently, it is necessary to interpolate the data from the nodes of the rectangular grid onto those of the triangular grid. The nearest neighbor method, bilinear method, and inverse distance weighting (IDW) method are three commonly utilized two-dimensional interpolation techniques, and inverse distance weighted regression (IDWR) represents a more recent interpolation approach. In this study, these methods were applied to interpolate the bathymetric data of the Hormuz Strait and the North Indian Ocean onto the FVCOM triangular grid. The experimental results demonstrate that a very small error in the interpolation of bathymetric data was achieved. Additionally, these methods were compared with the interpolation techniques provided by the MATLAB system. The comparative analysis reveals that the bilinear method can achieve a superior interpolation effect compared to the other three methods.
暂无评论