Regularization of control policies using entropy can be instrumental in adjusting predictability levels of real-world systems. Applications benefiting from such approaches range from cybersecurity, which aims at maxim...
详细信息
Neural networks (NN) have been successfully applied to approximate various types of complex control laws, resulting in low-complexity NN -based controllers that are fast to evaluate. However, when approximating contro...
详细信息
State feedback control has been designed to control the angular position and velocity of electronic throttle valve (ETV) system based on PD-framework control. In this study, two control schemes are adopted, linear and...
详细信息
The paper is devoted to the problem of energy flows studying in a universal multilevel inverter, when an output voltage with a complex and controlled harmonic composition of the curve is forming. It is intended for mu...
详细信息
In this paper,a comparative study for kernel-PCA based linear parameter varying(LPV)model approximation of sufficiently nonlinear and reasonably practical systems is carried *** matrix inequalities(LMIs)to be solved i...
详细信息
In this paper,a comparative study for kernel-PCA based linear parameter varying(LPV)model approximation of sufficiently nonlinear and reasonably practical systems is carried *** matrix inequalities(LMIs)to be solved in LPV controller design process increase exponentially with the increase in a number of scheduling *** kernel functions are used to obtain the approximate LPV model of highly coupled nonlinear *** error to norm ratio of original and approximate LPV models is introduced as a measure of accuracy of the approximate LPV *** examples conclude the effectiveness of kernel-PCA for LPV model approximation as with the identification of accurate approximate LPV model,computation complexity involved in LPV controller design is decreased exponentially.
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriv...
详细信息
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriving from the opponents’best response(BR),is technically the optimal strategy for the ***,computing an SSE strategy may be difficult since it needs to solve a mixed-integer program and has exponential complexity in the number of *** this end,the authors propose an equalizer ZD strategy,which can unilaterally restrict the opponent’s expected *** authors first study the existence of an equalizer ZD strategy with one-to-one situations,and analyze an upper bound of its performance with the baseline SSE *** the authors turn to multi-player models,where there exists one player adopting an equalizer ZD *** authors give bounds of the weighted sum of opponents’s utilities,and compare it with the SSE ***,the authors give simulations on unmanned aerial vehicles(UAVs)and the moving target defense(MTD)to verify the effectiveness of the proposed approach.
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
This paper deals with the problem of controller and observer design for the nonlinear, highly coupled constrained boiler-Turbine-generator system. The input vector (control valve state) has upper and lower limits, whi...
详细信息
In this paper,we consider a networked game with coupled constraints and focus on variational Nash equilibrium *** distributed algorithm design,we eliminate the coupled constraints by employing local Lagrangian functio...
详细信息
In this paper,we consider a networked game with coupled constraints and focus on variational Nash equilibrium *** distributed algorithm design,we eliminate the coupled constraints by employing local Lagrangian functions and construct exact penalty terms to attain multipliers'optimal consensus,which yields a set of equilibrium conditions without any coupled constraint and consensus ***,these conditions are only based on strategy and multiplier variables,without auxiliary ***,we present a distributed order-reduced dynamics that updates the strategy and multiplier variables with guaranteed *** with many other distributed algorithms,our algorithm contains no auxiliary variable,and therefore,it can save computation and communication.
In 2017 the Russian government approved a programme, Russian Federation Digital Economy, the main goal of which is to create an ecosystem with large scale use of digital format data in all fields of social and economi...
详细信息
暂无评论