In this article we corrected the trilinear formula for triple disjoint matrix multiplication given in the article ‘J. Laderman, V. Pan, X. H. Sha, On practical Algorithms for Accelerated Matrix Multiplication, Linear...
详细信息
This paper investigates the anomaly-resistant decentralized state estimation(SE) problem for a class of wide-area power systems which are divided into several non-overlapping areas connected through transmission lines...
详细信息
This paper investigates the anomaly-resistant decentralized state estimation(SE) problem for a class of wide-area power systems which are divided into several non-overlapping areas connected through transmission lines. Two classes of measurements(i.e., local measurements and edge measurements) are obtained, respectively, from the individual area and the transmission lines. A decentralized state estimator, whose performance is resistant against measurement with anomalies, is designed based on the minimum error entropy with fiducial points(MEEF) criterion. Specifically, 1) An augmented model, which incorporates the local prediction and local measurement, is developed by resorting to the unscented transformation approach and the statistical linearization approach;2) Using the augmented model, an MEEF-based cost function is designed that reflects the local prediction errors of the state and the measurement;and 3) The local estimate is first obtained by minimizing the MEEF-based cost function through a fixed-point iteration and then updated by using the edge measuring information. Finally, simulation experiments with three scenarios are carried out on the IEEE 14-bus system to illustrate the validity of the proposed anomaly-resistant decentralized SE scheme.
Data is information or a collection of information about something. Almost every application nowadays needs to persist data so that they can keep track of their state in case of any trouble that might appear. Database...
Data is information or a collection of information about something. Almost every application nowadays needs to persist data so that they can keep track of their state in case of any trouble that might appear. Databases are the main piece of an application for persisting data and they can be of two types: SQL or NoSQL. SQL (Structured Query Language) is a query language used to create, read, update, or delete (CRUD operations) the information in most relational databases. Data is structured in a set of tables in the relational database model, with rows as entries and columns as specific attributes of the entry. Over the years, new relational database management systems appeared. A comparison between some of the most used relational database management systems tied to a Java application using Hibernate is worth analyzing in the given context. The evaluation is done on timing for each CRUD operation by using Java Microbenchmark Harness, because these are the most used operations, for thousands and hundreds of thousands of entries. Depending on the majority type of operation, switching the database management system might help.
In the second segment of the tutorial, we transition from the granularity of local interpretability to a broader exploration of eXplainable AI (XAI) methods. Building on the specific focus of the first part, which del...
详细信息
In the second segment of the tutorial, we transition from the granularity of local interpretability to a broader exploration of eXplainable AI (XAI) methods. Building on the specific focus of the first part, which delved into Local Interpretable Model-Agnostic Explanations (LIME) and SHapley Additive exPlanations (SHAP), this section takes a more expansive approach. We will navigate through various XAI techniques of more global nature, covering counterfactual explanations, equation discovery, and the integration of physics-informed AI. Unlike the initial part, which concentrated on two specific methods, this section offers a general overview of these broader classes of techniques for explanation. The objective is to provide participants with a comprehensive understanding of the diverse strategies available for making complex machine learning models interpretable on a more global scale.
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable ...
详细信息
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable alternatives to indoor inspections. Energy service providers(ESPs) typically manage regions by dividing them into various transformer districts(TDs). The detection of electricity theft in a particular region is performed by the associated TD,
Natural calamities like earthquake and tsunami wreak havoc on life of so many people and the infrastructure, thus saving people who are trapped in the affected region has been a very difficult task for rescuers. This ...
详细信息
Motion systems are a vital part of many industrial processes. However, meeting the increasingly stringent demands of these systems, especially concerning precision and throughput, requires novel control design methods...
详细信息
In this paper, an active fault tolerant control method for spacecraft against actuator faults, uncertainties and disturbances is investigated. First, an adaptive iterative learning observer with improved adaptive law ...
In this paper, an active fault tolerant control method for spacecraft against actuator faults, uncertainties and disturbances is investigated. First, an adaptive iterative learning observer with improved adaptive law is proposed, which greatly improves the accuracy and speed of fault estimation. Then, a novel adaptive finite time prescribed performance fault tolerant controller is proposed, which has flexible performance constraints according to faults and control references, with better robustness and lower conservatism, breaking the limitation of fixed performance constraint. Next, an online optimal control allocation strategy is designed to achieve high-performance actuator allocation under saturation and fault constraints. Finally, through numerical simulation, the effectiveness and robustness of the proposed scheme are illustrated by comparing with existing methods.
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying *** to the inherent vulnerability of network-based communication,the measurement s...
详细信息
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying *** to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential *** avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption *** purpose of the addressed problem is to design an encryptiondecryption scheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is *** conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state ***,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme.
Databases are the fundamental component of an application for storing data. SQL (Structured Query Language) is a query language that is used to create, read, update, and remove records in most relational databases (CR...
详细信息
Databases are the fundamental component of an application for storing data. SQL (Structured Query Language) is a query language that is used to create, read, update, and remove records in most relational databases (CRUD operations). Because new relational database management systems have arisen, it is useful to compare some of them when linked to a Java application using Spring Data JPA. The time for each CRUD activity is analyzed for thousands and hundreds of thousands of entries. The motivation is to find the most performant combination for an application, considering its size (number of entries).
暂无评论