The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectab...
详细信息
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectability where a given set of state pairs needs to be(eventually or periodically)distinguished in any estimate of the state of the *** authors adopt the ALTER sensor attack model from previous work and formulate four notions of CA-detectability in the context of this attack model based on the following attributes:strong or weak;eventual or *** authors present verification methods for strong CA-detectability and weak *** authors present definitions of strong and weak periodic CA-detectability that are based on the construction of a verifier automaton called the augmented *** development also resulted in relaxing assumptions in prior results on D-detectability,which is a special case of CA-detectability.
This study investigates a safe reinforcement learning algorithm for grid-forming(GFM)inverter based frequency *** guarantee the stability of the inverter-based resource(IBR)system under the learned control policy,a mo...
详细信息
This study investigates a safe reinforcement learning algorithm for grid-forming(GFM)inverter based frequency *** guarantee the stability of the inverter-based resource(IBR)system under the learned control policy,a modelbased reinforcement learning(MBRL)algorithm is combined with Lyapunov approach,which determines the safe region of states and *** obtain near optimal control policy,the control performance is safely improved by approximate dynamic programming(ADP)using data sampled from the region of attraction(ROA).Moreover,to enhance the control robustness against parameter uncertainty in the inverter,a Gaussian process(GP)model is adopted by the proposed algorithm to effectively learn system dynamics from *** simulations validate the effectiveness of the proposed algorithm.
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition...
详细信息
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies.
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial succe...
A silicon solar cell with a power conversion efficiency (PCE)of 4% was born in Bell Lab in 1954, seven decades ago. Today,silicon solar cells have reached an efficiency above 25%and achieved pervasive commercial success [1]. In spite of the steady improvement in efficiency, the interest and enthusiasm in search for new materials and innovative device architectures for newgeneration solar cells have never diminished or subsided;
Millimeter-wave(mmWave)Non-Orthogonal Multiple Access(NOMA)with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile *** this pap...
详细信息
Millimeter-wave(mmWave)Non-Orthogonal Multiple Access(NOMA)with random beamforming is a promising technology to guarantee massive connectivity and low latency transmissions of future generations of mobile *** this paper,we introduce a cost-effective and energy-efficient mmWave-NOMA system that exploits sparse antenna arrays in the *** analysis shows that utilizing low-weight and small-sized sparse antennas in the Base Station(BS)leads to better outage probability *** also introduce an optimum low complexity Equilibrium Optimization(EO)-based algorithm to further improve the outage *** simulation and analysis results show that the systems equipped with sparse antenna arrays making use of optimum beamforming vectors outperform the conventional systems with uniform linear arrays in terms of outage probability and sum rates.
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of v...
详细信息
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of view,leading to limited performance and increased size and *** particular,simultaneously achieving a wide field of view and large aperture for light collection is desirable but challenging to realize in a compact ***,we demonstrate a wide field of view(greater than 60°)meta-optic doublet eyepiece with an entrance aperture of 2.1 *** the design wavelength of 633 nm,the meta-optic doublet achieves comparable performance to a refractive lens-based eyepiece *** meta-doublet eyepiece illustrates the potential for meta-optics to play an important role in the development of high-quality monochrome near-eye displays and night vision systems.
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher...
详细信息
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inherent biases and computational burdens, especially when used to relax the rank function, making them less effective and efficient in real-world scenarios. To address these challenges, our research focuses on generalized nonconvex rank regularization problems in robust matrix completion, low-rank representation, and robust matrix regression. We introduce innovative approaches for effective and efficient low-rank matrix learning, grounded in generalized nonconvex rank relaxations inspired by various substitutes for the ?0-norm relaxed functions. These relaxations allow us to more accurately capture low-rank structures. Our optimization strategy employs a nonconvex and multi-variable alternating direction method of multipliers, backed by rigorous theoretical analysis for complexity and *** algorithm iteratively updates blocks of variables, ensuring efficient convergence. Additionally, we incorporate the randomized singular value decomposition technique and/or other acceleration strategies to enhance the computational efficiency of our approach, particularly for large-scale constrained minimization problems. In conclusion, our experimental results across a variety of image vision-related application tasks unequivocally demonstrate the superiority of our proposed methodologies in terms of both efficacy and efficiency when compared to most other related learning methods.
Surgical tool tip localization and tracking are essential components of surgical and interventional procedures. The cross sections of tool tips can be considered as acoustic point sources to achieve these tasks with d...
详细信息
Electrolysis tanks are used to smeltmetals based on electrochemical principles,and the short-circuiting of the pole plates in the tanks in the production process will lead to high temperatures,thus affecting normal **...
详细信息
Electrolysis tanks are used to smeltmetals based on electrochemical principles,and the short-circuiting of the pole plates in the tanks in the production process will lead to high temperatures,thus affecting normal *** at the problems of time-consuming and poor accuracy of existing infrared methods for high-temperature detection of dense pole plates in electrolysis tanks,an infrared dense pole plate anomalous target detection network YOLOv5-RMF based on You Only Look Once version 5(YOLOv5)is ***,we modified the Real-Time Enhanced Super-Resolution Generative Adversarial Network(Real-ESRGAN)by changing the U-shaped network(U-Net)to Attention U-Net,to preprocess the images;secondly,we propose a new Focus module that introduces the Marr operator,which can provide more boundary information for the network;again,because Complete Intersection over Union(CIOU)cannot accommodate target borders that are increasing and decreasing,replace CIOU with Extended Intersection over Union(EIOU),while the loss function is changed to Focal and Efficient IOU(Focal-EIOU)due to the different difficulty of sample *** the homemade dataset,the precision of our method is 94%,the recall is 70.8%,and the map@.5 is 83.6%,which is an improvement of 1.3%in precision,9.7%in recall,and 7%in map@.5 over the original *** algorithm can meet the needs of electrolysis tank pole plate abnormal temperature detection,which can lay a technical foundation for improving production efficiency and reducing production waste.
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions a...
详细信息
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions are firstly detected using visual primitives such as color and shape and then grouped and merged into a co-saliency map. However, co-saliency is intrinsically perceived complexly with bottom-up and top-down strategies combined in human vision. To address this problem, this study proposes a novel end-toend trainable network comprising a backbone net and two branch nets. The backbone net uses ground-truth masks as top-down guidance for saliency prediction, whereas the two branch nets construct triplet proposals for regional feature mapping and clustering, which drives the network to be bottom-up sensitive to co-salient regions. We construct a new dataset of 2019 natural images with co-saliency in each image to evaluate the proposed method. Experimental results show that the proposed method achieves state-of-the-art accuracy with a running speed of 28 fps.
暂无评论