In the development of linear quadratic regulator(LQR) algorithms, the Riccati equation approach offers two important characteristics——it is recursive and readily meets the existence condition. However, these attribu...
详细信息
In the development of linear quadratic regulator(LQR) algorithms, the Riccati equation approach offers two important characteristics——it is recursive and readily meets the existence condition. However, these attributes are applicable only to transformed singular systems, and the efficiency of the regulator may be undermined if constraints are violated in nonsingular versions. To address this gap, we introduce a direct approach to the LQR problem for linear singular systems, avoiding the need for any transformations and eliminating the need for regularity assumptions. To achieve this goal, we begin by formulating a quadratic cost function to derive the LQR algorithm through a penalized and weighted regression framework and then connect it to a constrained minimization problem using the Bellman's criterion. Then, we employ a dynamic programming strategy in a backward approach within a finite horizon to develop an LQR algorithm for the original system. To accomplish this, we address the stability and convergence analysis under the reachability and observability assumptions of a hypothetical system constructed by the pencil of augmented matrices and connected using the Hamiltonian diagonalization technique.
Carbon neutrality has become an important design objective worldwide. However, the on-going shift to cloud-naive era does not necessarily mean energy efficiency. From the perspective of power management, co-hosted ser...
详细信息
Carbon neutrality has become an important design objective worldwide. However, the on-going shift to cloud-naive era does not necessarily mean energy efficiency. From the perspective of power management, co-hosted serverless functions are difficult to tame. They are lightweight, short-lived applications sensitive to power capping activities. In addition, they exhibit great individual and temporal variability, presenting idiosyncratic performance/power scaling goals that are often at odds with one another. To date, very few proposals exist in terms of tailored power management for serverless platforms. In this work, we introduce power synchronization, a novel yet generic mechanism for managing serverless functions in a power-efficient way. Our insight with power synchronization is that uniform application power behavior enables consistent and uncompromised function operation on shared host machines. We also propose PowerSync, a synchronization-based power management framework that ensures optimal efficiency based on a clear understanding of functions. Our evaluation shows that PowerSync can improve the energy efficiency of functions by up to 16% without performance loss compared to conventional power management strategies.
With the rapid expansion of computer networks and information technology, ensuring secure data transmission is increasingly vital—especially for image data, which often contains sensitive information. This research p...
详细信息
The essence of music is inherently multi-modal – with audio and lyrics going hand in hand. However, there is very less research done to study the intricacies of the multi-modal nature of music, and its relation with ...
详细信息
Deep neural networks have demonstrated exceptional performance across numerous applications. However, DNNs require large amounts of labeled data to avoid overfitting. Unfortunately, the labeled data may not be availab...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surv...
详细信息
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surveillance methods for early epidemic outbreaks and the role of ML and DL in enhancing their ***,every year,a large amount of data related to epidemic outbreaks,particularly Twitter data is generated by *** paper outlines the theme of SM analysis for tracking health-related issues and detecting epidemic outbreaks in SM,along with the ML and DL techniques that have been configured for the detection of epidemic *** has emerged as a promising ML technique that adaptsmultiple layers of representations or features of the data and yields state-of-the-art extrapolation *** recent years,along with the success of ML and DL in many other application domains,both ML and DL are also popularly used in SM *** paper aims to provide an overview of epidemic outbreaks in SM and then outlines a comprehensive analysis of ML and DL approaches and their existing applications in SM ***,this review serves the purpose of offering suggestions,ideas,and proposals,along with highlighting the ongoing challenges in the field of early outbreak detection that still need to be addressed.
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
Emotion analysis is divided into emotion detection, where the system detects if there is an emotional state, and emotion recognition where the system identifies the label of the emotion. In this paper, we provide a mu...
详细信息
The flow shop scheduling problem is important for the manufacturing *** flow shop scheduling can bring great benefits to the ***,there are few types of research on Distributed Hybrid Flow Shop Problems(DHFSP)by learni...
详细信息
The flow shop scheduling problem is important for the manufacturing *** flow shop scheduling can bring great benefits to the ***,there are few types of research on Distributed Hybrid Flow Shop Problems(DHFSP)by learning assisted *** work addresses a DHFSP with minimizing the maximum completion time(Makespan).First,a mathematical model is developed for the concerned ***,four Q-learning-assisted meta-heuristics,e.g.,genetic algorithm(GA),artificial bee colony algorithm(ABC),particle swarm optimization(PSO),and differential evolution(DE),are *** to the nature of DHFSP,six local search operations are designed for finding high-quality solutions in local *** of randomselection,Q-learning assists meta-heuristics in choosing the appropriate local search operations during ***,based on 60 cases,comprehensive numerical experiments are conducted to assess the effectiveness of the proposed *** experimental results and discussions prove that using Q-learning to select appropriate local search operations is more effective than the random *** verify the competitiveness of the Q-learning assistedmeta-heuristics,they are compared with the improved iterated greedy algorithm(IIG),which is also for solving *** Friedman test is executed on the results by five *** is concluded that the performance of four Q-learning-assisted meta-heuristics are better than IIG,and the Q-learning-assisted PSO shows the best competitiveness.
暂无评论