Safe, socially compliant, and efficient navigation of low-speed autonomous vehicles (AVs) in pedestrian-rich environments necessitates considering pedestrians' future positions and interactions with the vehicle an...
详细信息
Safe, socially compliant, and efficient navigation of low-speed autonomous vehicles (AVs) in pedestrian-rich environments necessitates considering pedestrians' future positions and interactions with the vehicle and others. Despite the inevitable uncertainties associated with pedestrians' predicted trajectories due to their unobserved states (e.g., intent), existing deep reinforcement learning (DRL) algorithms for crowd navigation often neglect these uncertainties when using predicted trajectories to guide policy learning. This omission limits the usability of predictions when diverging from ground truth. This work introduces an integrated prediction and planning approach that incorporates the uncertainties of predicted pedestrian states in the training of a model-free DRL algorithm. A novel reward function encourages the AV to respect pedestrians' personal space, decrease speed during close approaches, and minimize the collision probability with their predicted paths. Unlike previous DRL methods, our model, designed for AV operation in crowded spaces, is trained in a novel simulation environment that reflects realistic pedestrian behaviour in a shared space with vehicles. Results show a 40% decrease in collision rate and a 15% increase in minimum distance to pedestrians compared to the state of the art model that does not account for prediction uncertainty. Additionally, the approach outperforms model predictive control methods that incorporate the same prediction uncertainties in terms of both performance and computational time, while producing trajectories closer to human drivers in similar scenarios. IEEE
We show that a recent dissipativity approach to feedback stability analysis of potentially open-loop unstable systems, which encompasses the classical soft integral quadratic constraint (IQC) theorem, may be recovered...
详细信息
Market participants can only bid with lagged information disclosure under the existing market mechanism,which can lead to information asymmetry and irrational market behavior,thus influencing market *** promote ration...
详细信息
Market participants can only bid with lagged information disclosure under the existing market mechanism,which can lead to information asymmetry and irrational market behavior,thus influencing market *** promote rational bidding behavior of market participants and improve market efficiency,a novel electricity market mechanism based on cloudedge collaboration is proposed in this *** market information,called residual demand curve,is published to market participants in real-time on the cloud side,while participants on the edge side are allowed to adjust their bids according to the information disclosure prior to closure *** proposed mechanism can encourage rational bids in an incentive-compatible way through the process of dynamic equilibrium while protecting participants’*** paper further formulates the mathematical model of market equilibrium to simulate the process of each market participant’s strategic bidding behavior towards equilibrium.A case study based on the IEEE 30-bus system shows the proposed market mechanism can effectively guide bidding behavior of market participants,while condensing exchanged information and protecting privacy of participants.
Finding hidden order within disorder is a common interest in material science, wave physics, and mathematics. The Riemann hypothesis, stating the locations of nontrivial zeros of the Riemann zeta function, tentatively...
详细信息
Finding hidden order within disorder is a common interest in material science, wave physics, and mathematics. The Riemann hypothesis, stating the locations of nontrivial zeros of the Riemann zeta function, tentatively characterizes statistical order in the seemingly random distribution of prime numbers. This famous conjecture has inspired various connections with different branches of physics, recently with non-Hermitian physics, quantum field theory, trapped-ion qubits, and hyperuniformity. Here we develop the computing platform for the Riemann zeta function by employing classical scattering of light. We show that the Riemann hypothesis suggests the landscape of semi-infinite optical scatterers for the perfect reflectionless condition under the Born approximation. To examine the validity of the scattering-based computation, we investigate the asymptotic behaviors of suppressed reflections with the increasing number of scatterers and the emergence of multiple scattering. The result provides another bridge between classical physics and the Riemann zeros, exhibiting the design of wave devices inspired by number theory.
This paper proposes an empirical wavelet transform(EWT)based method for identification and analysis of sub-synchronous oscillation(SSO)modes in the power system using phasor measurement unit(PMU)*** phasors from PMUs ...
详细信息
This paper proposes an empirical wavelet transform(EWT)based method for identification and analysis of sub-synchronous oscillation(SSO)modes in the power system using phasor measurement unit(PMU)*** phasors from PMUs are preprocessed to check for the presence of *** the presence is established,the signal is decomposed using EWT and the parameters of the mono-components are estimated through Yoshida *** superiority of the proposed method is tested using test signals with known parameters and simulated using actual SSO signals from the Hami Power Grid in Northwest *** show the effectiveness of the proposed EWT-Yoshida method in detecting the SSO and estimating its parameters.
In this paper,a comparative study for kernel-PCA based linear parameter varying(LPV)model approximation of sufficiently nonlinear and reasonably practical systems is carried *** matrix inequalities(LMIs)to be solved i...
详细信息
In this paper,a comparative study for kernel-PCA based linear parameter varying(LPV)model approximation of sufficiently nonlinear and reasonably practical systems is carried *** matrix inequalities(LMIs)to be solved in LPV controller design process increase exponentially with the increase in a number of scheduling *** kernel functions are used to obtain the approximate LPV model of highly coupled nonlinear *** error to norm ratio of original and approximate LPV models is introduced as a measure of accuracy of the approximate LPV *** examples conclude the effectiveness of kernel-PCA for LPV model approximation as with the identification of accurate approximate LPV model,computation complexity involved in LPV controller design is decreased exponentially.
Under perfect competition,marginal pricing results in short-term efficiency and the subsequent right short-term price ***,the main reason for the adoption of marginal pricing is not the above,but investment cost *** i...
详细信息
Under perfect competition,marginal pricing results in short-term efficiency and the subsequent right short-term price ***,the main reason for the adoption of marginal pricing is not the above,but investment cost *** is,the fact that the profits obtained by infra-marginal technologies(technologies whose production cost is below the marginal price)allow them just to recover their investment *** the other hand,if the perfect competition assumption is removed,investment over-recovery or under-recovery generally occurs for infra-marginal technologies.
作者:
Kuznetsov, Andrey A.Volchanina, Maria A.Gorlov, Anton V.
Department 'Theoretical electrical engineering' Omsk Russia
Department 'Automation and control systems' Omsk Russia
'Theoretical electrical engineering' Omsk Russia
The article discusses the use of discrete wavelet transform in diagnosing power oil-filled transformers using automated acoustic monitoring tools. The article is based on the results of experiments using a simulator w...
详细信息
This study investigates the controllability of a general heterogeneous networked sampled-data system(HNSS) consisting of nonidentical node systems, where the inner coupling between any pair of nodes can be described b...
详细信息
This study investigates the controllability of a general heterogeneous networked sampled-data system(HNSS) consisting of nonidentical node systems, where the inner coupling between any pair of nodes can be described by a unique *** signals on control and transmission channels are sampled and held by zero-order holders, and the control sampling period of each node can be different. Necessary and sufficient controllability conditions are developed for the general HNSS, using the Smith normal form and matrix equations, respectively. The HNSS in specific topology or dynamic settings is discussed subsequently with easier-to-verify conditions derived. These heterogeneous factors have been determined to independently or jointly affect the controllability of networked sampled-data systems. Notably, heterogeneous sampling periods have the potential to enhance the overall controllability, but not for systems with some special dynamics. When the node dynamics are heterogeneous,the overall system can be controllable even if it is topologically uncontrollable. In addition, in several typical heterogeneous sampled-data multi-agent systems, pathological sampling of single-node systems will necessarily cause overall uncontrollability.
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
暂无评论