This paper studies the problem of state estimation for jump Markov linear systems with uncompensated biases. By describing the state and the measurement biases as additive random variables, a suboptimal filter has bee...
详细信息
ISBN:
(纸本)9781479901777
This paper studies the problem of state estimation for jump Markov linear systems with uncompensated biases. By describing the state and the measurement biases as additive random variables, a suboptimal filter has been developed by applying the basic interacting multiple model (IMM) approach. To derive a precise representation of the biases contributions to the state estimation, three auxiliary matrices are introduced with respect to the correlation between the state estimation errors and the biases, which helps to derive mode-conditioned estimates in the framework of the IMM. A numerical example involving tracking a maneuvering target is provided to compare the performance of the proposed filter with that of the augmented state filter.
This paper is devoted to the finite-time control problem for multiple manipulators, where unmodeled dynamics is taken into consideration. An effective coordinated control strategy is introduced, under which distribute...
详细信息
ISBN:
(纸本)9781479901777
This paper is devoted to the finite-time control problem for multiple manipulators, where unmodeled dynamics is taken into consideration. An effective coordinated control strategy is introduced, under which distributed protocols with continuous feedbacks are proposed. By applying the homogeneous theory for stability analysis, it is proven that the multi-robot system can be globally finite-time stabilized through our protocols. Numerical simulations on four manipulators with two degrees of freedom are presented to validate the effectiveness of the control strategy.
In this paper, we propose a novel impossible differential attack on 7-round AES-128. Firstly, we construct some new 2-round impossible differentials of AES, which allow us to distinguish the wrong keys from the correc...
详细信息
Since the early work of Biham and Shamir on differential fault attack against block ciphers at CRYPTO 1997, much work has been devoted to reducing the number of faults and to improving the time complexity of this atta...
详细信息
LBlock is a lightweight block cipher with 32 rounds, which can be implemented efficiently not only in hardware environment but also in software platforms. In this paper, by exploiting the structure of LBlock and the r...
详细信息
Transfer learning aims to leverage the knowledge in the source domain to facilitate the learning tasks in the tar- get domain. It has attracted extensive research interests recently due to its effectiveness in a wide ...
详细信息
Camellia is one of the most worldwide used block ciphers, which has been selected as a standard by ISO/IEC. In this paper, we propose several new 7-round impossible differentials of Camellia with 2 FL/FL-1 layers, whi...
详细信息
Due to low Signal to Noise Ratio (SNR) in general experimental environments, previous attack methods such as correlation power analysis (CPA) do not always screen out the correct key value. Sometimes the success rate ...
详细信息
When clients store large files on a remote network of unreliable distributed servers, they want to verify that their files are properly stored in the servers without any modification. This can be achieved by the techn...
详细信息
Sahai and Waters [6] proposed Attribute-Based Encryption (ABE) as a new paradigm of encryption algorithms that allow the sender to set a policy describing who can decrypt a particular ciphertext. In this paper, we fir...
详细信息
暂无评论