This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
As global digitization continues to grow, technology becomes more affordable and easier to use, and social media platforms thrive, becoming the new means of spreading information and news. Communities are built around...
详细信息
As global digitization continues to grow, technology becomes more affordable and easier to use, and social media platforms thrive, becoming the new means of spreading information and news. Communities are built around sharing and discussing current events. Within these communities, users are enabled to share their opinions about each event. Using Sentiment Analysis to understand the polarity of each message belonging to an event, as well as the entire event, can help to better understand the general and individual feelings of significant trends and the dynamics on online social networks. In this context, we propose a new ensemble architecture, EDSAEnsemble (Event Detection Sentiment Analysis Ensemble), that uses Event Detection and Sentiment Analysis to improve the detection of the polarity for current events from Social Media. For Event Detection, we use techniques based on Information Diffusion taking into account both the time span and the topics. To detect the polarity of each event, we preprocess the text and employ several Machine and Deep Learning models to create an ensemble model. The preprocessing step includes several word representation models: raw frequency, TFIDF, Word2Vec, and Transformers. The proposed EDSA-Ensemble architecture improves the event sentiment classification over the individual Machine and Deep Learning models. Authors
In telecommunication, speech signals need to be coded to ensure good transmission quality of the signals to far receivers. The objective of the codec system is to compress the signals to as few bits as possible while ...
详细信息
The aim of the work was to identify factors affecting the total revenue of regional small enterprises operating in the field of ground passenger transportation, and to evaluate the efficiency of these enterprises. Thi...
详细信息
Sensors are the foundation to facilitate smart cities, smart grids, and smart transportation, and distance sensors are especially important for sensing the environment and gathering information. Researchers have devel...
详细信息
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriv...
详细信息
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriving from the opponents’best response(BR),is technically the optimal strategy for the ***,computing an SSE strategy may be difficult since it needs to solve a mixed-integer program and has exponential complexity in the number of *** this end,the authors propose an equalizer ZD strategy,which can unilaterally restrict the opponent’s expected *** authors first study the existence of an equalizer ZD strategy with one-to-one situations,and analyze an upper bound of its performance with the baseline SSE *** the authors turn to multi-player models,where there exists one player adopting an equalizer ZD *** authors give bounds of the weighted sum of opponents’s utilities,and compare it with the SSE ***,the authors give simulations on unmanned aerial vehicles(UAVs)and the moving target defense(MTD)to verify the effectiveness of the proposed approach.
This paper investigates an important class of information-flow security property called opacity for stochastic controlsystems. Opacity captures whether a system's secret behavior (a subset of the system's beh...
详细信息
We present a lightweight magnetic field simultaneous localisation and mapping (SLAM) approach for drift correction in odometry paths, where the interest is purely in the odometry and not in map building. We represent ...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
This study presents the architecture and performance evaluation of a high-capacity free-space optical (FSO) communication system that makes use of dense wavelength division multiplexing (DWDM) and a 1.28 Tb/s link. Th...
详细信息
暂无评论