This paper presents new theoretical results on the multistability analysis of a class of recurrent neural networks with nonmonotonic activation functions and mixed time delays. Several sufficient conditions are derive...
详细信息
This work proposes an online policy iteration procedure for the synthesis of sub-optimal control laws for uncertain Linear Time Invariant (LTI) Asymptotically Null-controllable with Bounded Inputs (ANCBI) systems. The...
详细信息
ISBN:
(纸本)9781467386838
This work proposes an online policy iteration procedure for the synthesis of sub-optimal control laws for uncertain Linear Time Invariant (LTI) Asymptotically Null-controllable with Bounded Inputs (ANCBI) systems. The proposed policy iteration method relies on: a policy evaluation step with a piecewise quadratic Lyapunov function in both the state and the deadzone functions of the input signals;a policy improvement step which guarantees at the same time close to optimality (exploitation) and persistence of excitation (exploration). The proposed approach guarantees convergence of the trajectory to a neighborhood around the origin. Besides, the trajectories can be made arbitrarily close to the optimal one provided that the rate at which the the value function and the control policy are updated is fast enough. The solution to the inequalities required to hold at each policy evaluation step can be efficiently implemented with semidefinite programming (SDP) solvers. A numerical example illustrates the results.
The paper investigates the expressive power of the temporal query language LH. We show that First-Order Logic is unable to formulate queries such as temporal connectivity, which can be naturally expressed by LH. The p...
详细信息
The paper investigates the expressive power of the temporal query language LH. We show that First-Order Logic is unable to formulate queries such as temporal connectivity, which can be naturally expressed by LH. The paper describes in detail our application of the Ehrenfeucht-Fräýsse method, which is used to examine limitations in the expressive power of First-Order Logic.
Measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks, is the most promising solution to the security issues in practical quantum key distribution syst...
详细信息
Measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks, is the most promising solution to the security issues in practical quantum key distribution systems. Although several experimental demonstrations of MDI-QKD have been reported, they all make one crucial but not yet verified assumption, that is, there are no flaws in state preparation. Such an assumption is unrealistic and security loopholes remain in the source. Here we present a MDI-QKD experiment with the modulation error taken into consideration. By applying the loss-tolerant security proof by Tamaki et al. [Phys. Rev. A 90, 052314 (2014)], we distribute secure keys over fiber links up to 40 km with imperfect sources, which would not have been possible under previous security proofs. By simultaneously closing loopholes at the detectors and a critical loophole—modulation error in the source, our work shows the feasibility of secure QKD with practical imperfect devices.
This paper proposes a complex system optimization method to solve economic emission load dispatch. First, a real-world economic emission load dispatch is modeled as a complex system problem, and the optimization objec...
详细信息
This paper proposes a complex system optimization method to solve economic emission load dispatch. First, a real-world economic emission load dispatch is modeled as a complex system problem, and the optimization objectives include economic load dispatch, emission load dispatch and transmission network loss. Then a called BBO/complex method is introduced, which extends biogeography-based optimization to a multi-archipelago environment to suit the structure of complex systems. Finally, the proposed method is applied to the economic emission load dispatch, and the results show that it can obtain good performance for economic emission load dispatch studied in this paper, and it is a competitive algorithm for solving complex system optimization problem.
This article presents a qualitative analysis of different methods proposed for the diagnosis of broken rotor bars using the stator current during start-up operation. The slip dependent components, caused by the asymme...
详细信息
This article presents a qualitative analysis of different methods proposed for the diagnosis of broken rotor bars using the stator current during start-up operation. The slip dependent components, caused by the asymmetry, which is created by the breakage of rotor bar(s) and especially the left sideband harmonic (LSH) component, can create a distinctive pattern in a time-frequency plane. Short Time Fourier Transform, Wavelet analysis, and Wigner-Ville Distribution are evaluated using signals from motors operating in real industrial settings. The corresponding analysis presents the pros and the cons of these approaches for their potential application under realistic industrial conditions using the larger number of real life cases encountered in the literature.
The service-oriented environment offers the opportunity to create new applications, by combining existing applications offered as services, in order to react to the business' increasing pressure of quickly deliver...
详细信息
The service-oriented environment offers the opportunity to create new applications, by combining existing applications offered as services, in order to react to the business' increasing pressure of quickly delivering new applications. With a large number of web services offering the same functionality, choosing the web services that meet best the client's quality of service (QoS) requirements is a very important task. We introduce a QoS-aware end to end web service composition approach that handles all the stages from the web service discovery step, to the actual binding of the services. This approach uses our method of expressing nonfunctional preferences, which requires minimal effort on the part of the clients, but offers great flexibility in managing trade-offs. We define a QoS preferences ontology and use it in our semantic web service selection to choose an initial candidate list of services for every task in the orchestration model. Then, one concrete service is chosen from each candidate list and is boand to the corresponding task. This step involves computing and comparing the aggregated QoS of the resulting composite services. The selection is performed using a genetic algorithm.
In this paper we propose a novel approach to color image retrieval. Color information is modeled using Gaussian mixtures and incorporates the information on the spatial distribution of the color image pixels utilizing...
详细信息
Sensors play an important role in the control loop. Often they are considered to be a part of the plant and the interaction between the plant and sensor is disregarded. In this paper we investigate stability propertie...
详细信息
In this paper, we propose a design method of an inverse LQ regulator for neutral systems with a time-varying delay, in which the resulting system is assured to have a pre-assigned degree of exponential stability. Usin...
详细信息
暂无评论