In this paper, a new dynamic event-triggering (DET) adaptive dynamic programming (ADP) is developed to deal with the robust control problem of an uncertain system with the matching condition. First, this paper transfo...
详细信息
Policy gradient algorithms have been shown to converge to the optimal controller in a linear quadratic regulator (LQR) design problem. Calculating policy gradients using the true system such as for a robot may, howeve...
详细信息
Channel controlled automatic retransmission request (CC-ARQ) has shown potential in reducing complexity and bit error rate (BER) in wireless links. In this paper, we design an ARQ protocol transmission scheme for OCDM...
详细信息
The efficient distribution of function blocks across programmable logic controllers (PLCs) is critical to improving the performance of distributed automation systems. This paper presents a novel randomized greedy opti...
详细信息
ISBN:
(数字)9798331540319
ISBN:
(纸本)9798331540326
The efficient distribution of function blocks across programmable logic controllers (PLCs) is critical to improving the performance of distributed automation systems. This paper presents a novel randomized greedy optimization algorithm to minimize communication latency and maximize resource utilization by optimizing the allocation of function blocks across multiple PLCs in compliance with the IEC 61499 standard. Simulations demonstrate the effectiveness of the approach in achieving substantial performance improvements in distributed control applications. The results highlight the flexibility and scalability of the proposed optimization method, particularly in environments with varying PLC configurations.
Event-triggered control is a most popular paradigm for transferring feedback information in an economical"as needed"*** study of event-triggered control can be traced back to the *** significant advances on ...
详细信息
Event-triggered control is a most popular paradigm for transferring feedback information in an economical"as needed"*** study of event-triggered control can be traced back to the *** significant advances on the topic of control over networks and the topic of nonlinear control systems over the last two decades,event-triggered control has quickly emerged as a major theoretical subject in control *** of event-triggered control are wide-spread ranging from embedded control systems and industrial control processes to unmanned systems and cyber-physical transportation *** this paper,we first review developments in the synthesis of event-triggered sampling *** event triggering mechanisms,such as static event trigger,dynamic event trigger,time-regularized event trigger,and event trigger with positive threshold offsets,are systematically ***,we study how to design a stabilizing controller that is robust with respect to the sampling ***,we review some recent results in the directions of self-triggered control,event-triggered tracking control and cooperative control,and event-triggered control of stochastic systems and partial differential equation *** applications of event-triggered control are also discussed.
Remote sensing image classification faces two major challenges: the intra-class variability and inter-class similarity. Consequently, it is more challenging for classification neural networks to extract discriminant f...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
We formulate natural gradient variational inference (VI), expectation propagation (EP), and posterior linearisation (PL) as generalisations of Newton's method for optimising the parameters of a Bayesian posterior ...
详细信息
We formulate natural gradient variational inference (VI), expectation propagation (EP), and posterior linearisation (PL) as generalisations of Newton's method for optimising the parameters of a Bayesian posterior distribution. This viewpoint explicitly casts inference algorithms under the framework of numerical optimisation. We show that common approximations to Newton's method from the optimisation literature, namely Gauss-Newton and quasi-Newton methods (e.g., the BFGS algorithm), are still valid under this 'Bayes-Newton' framework. This leads to a suite of novel algorithms which are guaranteed to result in positive semi-definite (PSD) covariance matrices, unlike standard VI and EP. Our unifying viewpoint provides new insights into the connections between various inference schemes. All the presented methods apply to any model with a Gaussian prior and nonconjugate likelihood, which we demonstrate with (sparse) Gaussian processes and state space models.
This paper investigates a distributed cooperative control strategy for large-scale heterogeneous energy storage devices aggregated to form a Virtual Storage Plant (VSP) that behaves in a similar fashion as centralized...
详细信息
暂无评论