Many systems are subject to periodic disturbances and exhibit repetitive behaviour. Model-based repetitive control employs knowledge of such periodicity to attenuate periodic disturbances and has seen a wide range of ...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
Many systems are subject to periodic disturbances and exhibit repetitive behaviour. Model-based repetitive control employs knowledge of such periodicity to attenuate periodic disturbances and has seen a wide range of successful industrial implementations. The aim of this paper is to develop a data-driven repetitive control method. In the developed framework, linear periodically time-varying (LPTV) behaviour is lifted to linear time-invariant (LTI) behaviour. Periodic disturbance mitigation is enabled by developing an extension of Willems’ fundamental lemma for systems with exogenous disturbances. The resulting Data-enabled Predictive Repetitive control (DeePRC) technique accounts for periodic system behaviour to perform attenuation of a periodic disturbance. Simulations demonstrate the ability of DeePRC to effectively mitigate periodic disturbances in the presence of noise.
The quality of a model resulting from (black-box) system identification is highly dependent on the quality of the data that is used during the identification procedure. Designing experiments for linear time-invariant ...
详细信息
Physics-guided neural networks (PGNNs) enable accurate identification of inverse system dynamics by effectively embedding a known physical model within a neural network (NN), and thereby achieve high performance when ...
详细信息
Physics-guided neural networks (PGNNs) enable accurate identification of inverse system dynamics by effectively embedding a known physical model within a neural network (NN), and thereby achieve high performance when implemented as feedforward controllers. However, training PGNNs using existing NN toolboxes is complicated. Therefore, this paper presents a MATLAB toolbox that systematically implements, trains, and validates PGNNs. Dedicated functions implement recent results that have been proposed in literature, i.e., we ensure that the PGNN converges to a value of the cost function that is strictly upperbounded by the value obtained when using only the physical model, while also imposing a form of graceful degradation when the trained PGNN is used on data that was not present in the training data. The toolbox is available at: https://***/mbolderman/PGNN-Toolbox/ .
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie...
详细信息
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achieved secure outsourced computing,but they suffer from low computational accuracy,difficult-to-handle heterogeneous distribution of data from multiple sources,and high computational cost,which result in extremely poor user experience and expensive cloud computing *** address the above problems,we propose amulti-precision,multi-sourced,andmulti-key outsourcing neural network training ***,we design a multi-precision functional encryption computation based on Euclidean ***,we design the outsourcing model training algorithm based on a multi-precision functional encryption with multi-sourced ***,we conduct experiments on three *** results indicate that our framework achieves an accuracy improvement of 6%to 30%.Additionally,it offers a memory space optimization of 1.0×2^(24) times compared to the previous best approach.
For consistent identification of a target module in a dynamic network with the local direct method, basically two prime conditions need to be satisfied: (a) a set of structural conditions on the choice of the predicto...
详细信息
For consistent identification of a target module in a dynamic network with the local direct method, basically two prime conditions need to be satisfied: (a) a set of structural conditions on the choice of the predictor model, i.e. a set of input and output node variables, and (b) conditions on data-informativity. While for conditions (a) constructive algorithms for node selection have been presented that appropriately guarantee that the identified object can indeed reveal the target module, the requirements for satisfying (b) have not yet been integrated fully. In this paper, we will present simplified path-based results for generic data-informativity, and show how they can be integrated in constructive algorithms for predictor model selection that provide consistent target module estimates. It is shown that data-informativity not only requires a sufficient number of external excitation signals to be present in the network, but also puts restrictions on the structure of the predictor model, i.e. the selection of input and output node variables. Some examples are presented to illustrate the new results.
High-fidelity models are essential for accurately capturing nonlinear system dynamics. However, simulation of these models is often computationally too expensive and, due to their complexity, they are not directly sui...
详细信息
Scaled Relative Graphs (SRGs) provide a novel graphical frequency-domain method for the analysis of nonlinear systems. However, we show that the current SRG analysis suffers from a pitfall that limit its applicability...
详细信息
Large-scale water electrolysis systems are built from a multitude of stack units. These stack units have to be controlled during operation. The question arises how process control of the system can be designed in that...
详细信息
The scale up of hydrogen production to large scale production systems demands a structured approach to control these systems. With suitable control principles, optimization for operation can be achieved whilst maintai...
详细信息
Regularization of control policies using entropy can be instrumental in adjusting predictability levels of real-world systems. Applications benefiting from such approaches range from cybersecurity, which aims at maxim...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
Regularization of control policies using entropy can be instrumental in adjusting predictability levels of real-world systems. Applications benefiting from such approaches range from cybersecurity, which aims at maximal unpredictability, to human-robot interaction, where predictable behavior is highly desirable. In this paper, we consider entropy regularization for interval Markov decision processes (IMDPs), which are uncertain MDPs where transition probabilities are only known to belong to specified intervals. Lately, IMDPs have gained significant popularity in the context of abstracting stochastic systems for control design. In this work, we address robust minimization of the linear combination of entropy and a standard cumulative cost in IMDPs, thereby establishing a trade-off between optimality and predictability. We show that optimal deterministic policies exist, and devise a value-iteration algorithm to compute them. The algorithm solves a number of convex programs at each step. Finally, through an illustrative example we show the benefits of penalizing entropy in IMDPs.
暂无评论