Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer an...
详细信息
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer and process trillions and zillions of bytes using the current cloud-device architecture.
This paper investigates the anomaly-resistant decentralized state estimation(SE) problem for a class of wide-area power systems which are divided into several non-overlapping areas connected through transmission lines...
详细信息
This paper investigates the anomaly-resistant decentralized state estimation(SE) problem for a class of wide-area power systems which are divided into several non-overlapping areas connected through transmission lines. Two classes of measurements(i.e., local measurements and edge measurements) are obtained, respectively, from the individual area and the transmission lines. A decentralized state estimator, whose performance is resistant against measurement with anomalies, is designed based on the minimum error entropy with fiducial points(MEEF) criterion. Specifically, 1) An augmented model, which incorporates the local prediction and local measurement, is developed by resorting to the unscented transformation approach and the statistical linearization approach;2) Using the augmented model, an MEEF-based cost function is designed that reflects the local prediction errors of the state and the measurement;and 3) The local estimate is first obtained by minimizing the MEEF-based cost function through a fixed-point iteration and then updated by using the edge measuring information. Finally, simulation experiments with three scenarios are carried out on the IEEE 14-bus system to illustrate the validity of the proposed anomaly-resistant decentralized SE scheme.
In the process of ethylene production, the operating data of ethylene cracking furnace not only has the problems of time variability, non-gauss, strong noise, and outlier influence but also the collected data is incom...
详细信息
Autonomous driving detection technology in real-world road scenarios faces numerous challenges, including variable weather conditions and complex road environments. Therefore, developing an object detection model with...
详细信息
ISBN:
(数字)9798331519254
ISBN:
(纸本)9798331519261
Autonomous driving detection technology in real-world road scenarios faces numerous challenges, including variable weather conditions and complex road environments. Therefore, developing an object detection model with robust domain adaptation is crucial. In this paper, we investigate the use of image style transfer techniques to leverage target domain images for enhancing model performance. Experimental results show that our proposed approach significantly improves detection efficacy. Notably, our method outperforms the Oracle results in tasks such as transitioning from Cityscapes to Foggy Cityscapes, highlighting its effectiveness in addressing domain adaptation challenges.
Outsourcing the design of deep neural networks may incur cybersecurity threats from the hostile designers. This paper studies a new covert channel attack that leaks the inference results over the air through a hostile...
详细信息
This paper describes a Rogowski coil integrator for pulsed high current measurements. Based on the principle and equivalent model of Rogowski coil, this paper designs an impulse composite integrator that is compatible...
详细信息
ISBN:
(数字)9798350363265
ISBN:
(纸本)9798350363272
This paper describes a Rogowski coil integrator for pulsed high current measurements. Based on the principle and equivalent model of Rogowski coil, this paper designs an impulse composite integrator that is compatible with the coil sensitivity, bandwidth and phase by comparing the shortcomings of the first-order RC integrator and the classical active integrator at the design stage. The integrator consists of a passive part and an active part. The passive part is used for mid-frequency integration, which reduces the gain of the coil. The active part is used for low-frequency integration, which has a lifting effect on the system gain. In addition to this, the overall sensitivity can be changed by adjusting the gain coefficient between the frequency band of the passive integrator and the active integrator. Finally, the circuit simulation was carried out using MULTISIM to verify the effectiveness of the integrator design.
In view of the low detection efficiency of traditional aerial image-based self-explosive insulators and the need to manually extract the features of self-explosive insulators, a self-explosive insulator detection algo...
详细信息
We consider a perimeter defense problem in a planar conical environment comprising a turret that has a finite range and non-zero startup time. The turret seeks to defend a concentric perimeter against N ≥ 2 intruders...
We consider a perimeter defense problem in a planar conical environment comprising a turret that has a finite range and non-zero startup time. The turret seeks to defend a concentric perimeter against N ≥ 2 intruders. Upon release, each intruder moves radially towards the perimeter with a fixed speed. To capture an intruder, the turret's angle must be aligned with that of the intruder's angle and must spend a specified startup time at that orientation. We address offline and online versions of this optimization problem. Specifically, in the offline version, we establish that in general parameter regimes, this problem is equivalent to solving a Travelling Repairperson Problem with Time Windows (TRP-TW). We then identify specific parameter regimes in which there is a polynomial time algorithm that maximizes the number of intruders captured. In the online version, we present a competitive analysis technique in which we establish a fundamental guarantee on the existence of at best (N – 1)-competitive algorithms. We also design two online algorithms that are provably 1 and 2-competitive in specific parameter regimes.
Object tracking is an important and challenging task. The changes of the object itself and the complex background can affect tracking performance. Siamese networks based object tracking are widely adopted due to their...
详细信息
ISBN:
(数字)9798331506100
ISBN:
(纸本)9798331506117
Object tracking is an important and challenging task. The changes of the object itself and the complex background can affect tracking performance. Siamese networks based object tracking are widely adopted due to their advantages in efficient similarity measurement, end-to-end learning, and modular design. However, existing object tracking algorithms based on Siamese networks do not extract object features sufficiently, resulting in lower tracking accuracy. And excessive parameter settings adversely affect real-time performance. Therefore, we propose a new algorithm, SiamBRR, which can more accurately and quickly track objects. We first introduce the Res2Net residual network into the Siamese network framework as the backbone feature extraction network to fully extract features. Then, we use the EMA to enhance feature representation. Furthermore, our proposed border region reppoints accurately locate the object border while avoiding the need for extensive parameter settings. Finally, we conducted experiments on three challenging public datasets: VOT2018, VOT2019, and OTB100. The experimental results illustrate that the proposed SiamBRR outperforms other advanced trackers in tracking accuracy.
The paper presents a family of novel light blob shape descriptors for use in selected active safety algorithms used in Advanced Driver Assistance Systems (ADAS). One of the motivations was to obtain a descriptor that ...
详细信息
暂无评论