Vision-based estimation of the motion of a moving target is usually formulated as a bearing-only estimation problem where the visual measurement is modeled as a bearing vector. Although the bearing-only approach has b...
详细信息
The perceptual field of deep convolutional neural networks is limited to the local scale because of the limitations of convolution itself, which restricts the overall understanding of complex scenes. This paper propos...
详细信息
This paper introduces time-synchronized convergence in fixed-time control, where all system states converge to the origin at the same time before a fixed time instant. Sufficient Lyapunov conditions are derived for fi...
详细信息
The integration of information technology and controlengineering has significantly increased in the research field of clinical practice, including the management of medication dosing for general anesthesia. To achiev...
详细信息
The integration of information technology and controlengineering has significantly increased in the research field of clinical practice, including the management of medication dosing for general anesthesia. To achieve effective drug dosing, it is necessary to have appropriate controllers for closed loop control methods. A multitude of control mechanisms have been devised to manage hypnosis, with most of them based on pharmacokinetic-pharmacodynamic (PK-PD) models. This study presents a novel structure of a fractional order PID controller tuned for inducing hypnosis. The tuning algorithm uses a novel fractional order model instead of the classical PK-PD models. The main goal is to control the Bispectral Index by delivering Propofol during the hypnotic stage of anesthesia. Closed loop simulation results show that the proposed controller manages to ensure little undershoot and time to target for a nominal patient model. Robustness tests are also performed. The analysis shows that the proposed controller is suitable to maintain BIS signal within a safe operating range but fails to meet the time to target requirement for significant patient variability (greater than 2 orders of magnitude). Online adaptation rules are suggested as a solution.
This paper presents a distributed load shedding strategy for islanded active distribution power system,where the average consensus algorithm acts as a key tool to discover the required global information for load *** ...
详细信息
This paper presents a distributed load shedding strategy for islanded active distribution power system,where the average consensus algorithm acts as a key tool to discover the required global information for load *** privacy concerns,we propose a new differentially private average consensus algorithm,where a distributed shuffling mechanism based on the Pailler cryptosystem is established to initialize the initial states for the subsequent stage of running standard average *** the proposed algorithm,both rigorous provable differential privacy and accuracy guarantee are established,with an improved privacy/accuracy trade-off than the existing relevant ***,it is shown that given any expected differential privacy levels,the achievable mean-square computation error is inversely proportional to the network size,in contrast with the optimal error achieved in the literature that is independent of the network size.A numerical example and an application to the distributed load shedding for an IEEE 33-bus power system are used to validate the effectiveness of the proposed approach.
In recent years,Power Shell has increasingly been reported as appearing in a variety of cyber ***,because the PowerShell language is dynamic by design and can construct script fragments at different levels,state-of-th...
详细信息
In recent years,Power Shell has increasingly been reported as appearing in a variety of cyber ***,because the PowerShell language is dynamic by design and can construct script fragments at different levels,state-of-the-art static analysis based Power Shell attack detection approaches are inherently vulnerable to *** this paper,we design the first generic,effective,and lightweight deobfuscation approach for PowerShell *** precisely identify the obfuscated script fragments,we define obfuscation based on the differences in the impacts on the abstract syntax trees of PowerShell scripts and propose a novel emulation-based recovery ***,we design the first semantic-aware PowerShell attack detection system that leverages the classic objective-oriented association mining algorithm and newly identifies 31 semantic *** experimental results on 2342 benign samples and 4141 malicious samples show that our deobfuscation method takes less than 0.5 s on average and increases the similarity between the obfuscated and original scripts from 0.5%to 93.2%.By deploying our deobfuscation method,the attack detection rates for Windows Defender and VirusTotal increase substantially from 0.33%and 2.65%to 78.9%and 94.0%,***,our detection system outperforms both existing tools with a 96.7%true positive rate and a 0%false positive rate on average.
3D MRI Brain Tumor Segmentation is of great significance in clinical diagnosis and treatment. Accurate segmentation results are critical for localization and spatial distribution of brain tumors using 3D MRI. However,...
详细信息
In this paper, the ultimately bounded state estimation problem is investigated for discrete-time singularly perturbed complex networks (SPCNs) under bit rate constraints. The measurement outputs of the considered SPCN...
In this paper, the ultimately bounded state estimation problem is investigated for discrete-time singularly perturbed complex networks (SPCNs) under bit rate constraints. The measurement outputs of the considered SPCNs are transmitted to the remote estimator through a bandwidth-limited wireless network where a coding-decoding mechanism is employed. A state estimator is developed by fully considering the effects of the constrained bit rate to achieve the desired estimation performance index. The boundedness of the estimation error dynamics is analyzed with the help of the constructed Lyapunov-like functional candidate. Finally, a simulation example is used to verify the correctness of the obtained theoretical results.
Quantifying the average communication rate (ACR) of a networked event-triggered stochastic control system (NET-SCS) with deterministic thresholds is challenging due to the non-stationary nature of the system's sto...
详细信息
With the development of electrical technology, the load in the electric power system has changed a lot, especially in the dynamic load. As a result, the load shows brand new dynamic characteristics which means that th...
With the development of electrical technology, the load in the electric power system has changed a lot, especially in the dynamic load. As a result, the load shows brand new dynamic characteristics which means that the traditional load model is incapable of the Simulation and calculation of the electric power system. In this paper, a simplified composited load model-based ambient signal identification is proposed. Firstly, in order to carry out the convex optimization of the load parameters, a quasi-convexity load model is introduced. Then, the power characteristics of several kinds of dynamic load such as electronic load, single phase motor, static load, and so on, under ambient signal is discussed, after which the load is divided into two parts--equivalent static load and motor load. Afterwards, the time-varying load makes it necessary to model the load under large disturbance. The composite load model will be more suitable for the study of the dynamic load.
暂无评论