This paper proposes a distributed proportional plus damping (P+d) control algorithm to solve the leader-follower problem in which a network of heterogeneous robots, modeled in the operational space, has to be regulate...
详细信息
This paper investigates the fault-tolerant shape control (FTSC) problem for stochastic distribution systems. The available information for the addressed problem is the input and the measurable output Probability Densi...
详细信息
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed t...
详细信息
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.
This paper proposes a simple, non-iterative way of calculating low-complexity controlled contractive sets, and shows how such set can be used for controller design for systems with state and input constraints. The res...
This paper proposes a simple, non-iterative way of calculating low-complexity controlled contractive sets, and shows how such set can be used for controller design for systems with state and input constraints. The result is a low complexity controller, suitable for implementation in embedded control systems with modest computational power and available memory.
Usage of wireless sensor networks in various applications such as home automation, intelligent cars and infrastructures, military environment and critical factory monitoring and control is constantly increasing. WSN s...
详细信息
Usage of wireless sensor networks in various applications such as home automation, intelligent cars and infrastructures, military environment and critical factory monitoring and control is constantly increasing. WSN security is a real challenge for researchers and industry specialists since WSN are now used even in critical environments. In this paper the authors will assess the security risks of a WSN from an existing gas compressor station.
Data dissemination in opportunistic networks poses a series of challenges, since there is no central entity aware of all the nodes' subscriptions. Each individual node is only aware of its own interests and those ...
详细信息
ISBN:
(纸本)9781479909117
Data dissemination in opportunistic networks poses a series of challenges, since there is no central entity aware of all the nodes' subscriptions. Each individual node is only aware of its own interests and those of a node that it is contact with, if any. Thus, dissemination is generally performed using epidemic algorithms that flood the network, but they have the disadvantage that the network overhead and congestion are very high. In this paper, we propose ONSIDE, an algorithm that leverages a node's online social connections (i.e. friends on social networks such as Facebook or Google+), its interests and the history of contacts, in order to decrease congestion and required bandwidth, while not affecting the overall network's hit rate and the delivery latency. We present the results of testing our algorithm using an opportunistic network emulator and three mobility traces taken in different environments.
It is well known that in most bilateral teleoperation systems, variable time-delays arise in the communications. Motivated by this fact, the present work reports the extension to the (asymmetric) variable time-delays ...
详细信息
It is well known that in most bilateral teleoperation systems, variable time-delays arise in the communications. Motivated by this fact, the present work reports the extension to the (asymmetric) variable time-delays case of the adaptive controller for bilateral teleoperators with uncertain parameters and constant time-delays, reported in Nuño et al (2010) [Nuño, E., Ortega, R. and Basañez, L. (2010). An adaptive controller for nonlinear teleoperators. automatica, 46(1), 155–159]. Compared to the previous work, the stability analysis does not rely on the cascade interconnection structure of the local and remote nonlinear dynamics and the linear interconnection map. Instead, the paper employs a different Lyapunov candidate function that incorporates a strictly positive term, the local and remote position error. With the only assumption that a bound of the time-delays is known, the paper also presents a sufficient condition that ensures the asymptotic convergence of position errors and velocities to zero. Some simulations, in free space and interacting with a stiff wall, illustrate the performance of the proposed control scheme in the presence of variable time–delays.
This work proposes a policy iteration procedure for the synthesis of optimal and globally stabilizing control policies for Linear Time Invariant (LTI) Asymptotically Null-controllable with Bounded Inputs (ANCBI) syste...
详细信息
ISBN:
(纸本)9781479917730
This work proposes a policy iteration procedure for the synthesis of optimal and globally stabilizing control policies for Linear Time Invariant (LTI) Asymptotically Null-controllable with Bounded Inputs (ANCBI) systems. This class includes systems with eigenvalues on the imaginary axis (possibly repeated) but no pole with positive real part. The proposed policy iteration relies on a class of piecewise quadratic Lyapunov functions which is non-differentiable, but continuous, and polynomial in both the state and the deadzone functions of the input signals. The second step of the policy iteration is based on a piecewise control policy improvement. An important aspect of the proposed piecewise policy is that at each step of the iteration the computed policy is globally stabilizing and the existence of an improving value function is guaranteed as well. The solution to the inequalities which is required to hold at each step of the policy iteration, is obtained by solving Sum-of-Squares Programs (SOSP) that can be efficiently implemented with semidefinite programming (SDP) solvers.
The present paper introduces a procedure to recover an inverse parametric linear or quadratic programming problem from a given polyhedral partition over which a continuous piecewise affine function is defined. The sol...
The present paper introduces a procedure to recover an inverse parametric linear or quadratic programming problem from a given polyhedral partition over which a continuous piecewise affine function is defined. The solution to the resulting parametric linear problem is exactly the initial piecewise affine function over the given original parameter space partition. We provide sufficient conditions for the existence of solutions for such inverse problems. Furthermore, the constructive procedure proposed here requires at most one supplementary variable in the vector of optimization arguments. The principle of this method builds upon an inverse map to the orthogonal projection, known as a convex lifting. Finally, we show that the theoretical results has a practical interest in Model Predictive control (MPC) design. It is shown that any linear Model Predictive controller can be obtained through a reformulated MPC problem with control horizon equal to two prediction steps.
The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only regio...
详细信息
The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV) quantum communication protocols (e.g., QKD, quantum coin tossing, weak-coherent-state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.
暂无评论