In this article,the problem of state estimation is addressed for discrete-time nonlinear systems subject to additive unknown-but-bounded noises by using fuzzy set-membership ***,an improved T-S fuzzy model is introduc...
详细信息
In this article,the problem of state estimation is addressed for discrete-time nonlinear systems subject to additive unknown-but-bounded noises by using fuzzy set-membership ***,an improved T-S fuzzy model is introduced to achieve highly accurate approximation via an affine model under each fuzzy ***,compared to traditional prediction-based ones,two types of fuzzy set-membership filters are proposed to effectively improve filtering performance,where the structure of both filters consists of two parts:prediction and *** the locally Lipschitz continuous condition of membership functions,unknown membership values in the estimation error system can be treated as multiplicative noises with respect to the estimation ***-time recursive algorithms are given to find the minimal ellipsoid containing the true ***,the proposed optimization approaches are validated via numerical simulations of a one-dimensional and a three-dimensional discrete-time nonlinear systems.
Sticking valves tend to cause cycles in control systems used in industry, degrading product quality and yield. Many attempts have been made to alleviate the impact of stiction. Mechanical knockers are used with succes...
详细信息
Sticking valves tend to cause cycles in control systems used in industry, degrading product quality and yield. Many attempts have been made to alleviate the impact of stiction. Mechanical knockers are used with success to knock loose the sticking components. Most other stiction compensation methods attempt to find ways to move the control output by an amount greater than the stiction band, while still getting the valve position as close as possible to the desired position. This paper shows how, instead of overcoming stiction and getting the valve position to the control output, the valve can be moved such that over time, the valve is on average at the correct position, while still moving the valve in increments that are larger than the stiction band.
In this article, influence of aluminum eddy current in the PSRM stator array on the electromagnetic properties and control performance is investigated. The eddy current density distribution model is established based ...
详细信息
This research introduces a new method, Fractional Order Sliding Mode control (FOSMC), to manage leg exoskele-tons during gait rehabilitation. This innovative algorithm utilizes fractional calculus principles to precis...
详细信息
In this work, an attempt is made for the first time to use the measurement pattern generated by morphological transformation quantified by Hausdorff fractal dimension (HFD) and classified with ensemble learning based ...
详细信息
The main focus of this research is on improving the performance of dynamic systems with actuator non-linearities and time-varying disturbances. To this end, using the concept of finite-time stability, a novel observer...
详细信息
Generative adversarial networks (GANs) can be well used for image generation. Yet their training typically requires large amounts of data, which may not be available. This paper proposes a new algorithm for effective ...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Normalizing flows (NFs) have been shown to be advantageous in modeling complex distributions and improving sampling efficiency for unbiased *** this work, we propose a new class of continuous NFs, ascent continuous no...
详细信息
Automation of ship maneuvering in limited sailing conditions usually requires 100% redundancy of thrusters (THRs) of various modifications and their locations in accordance with the matrix. The hierarchy of the motion...
详细信息
暂无评论