This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga...
详细信息
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player game model and derive Nash equilibria in response to different types of insider *** analyzing these Nash equilibria,we provide quantitative solutions to advanced persistent threat problems pertaining to insider ***,we have conducted a comparative assessment of the optimal defense strategy and corresponding defender's costs between two types of insider ***,our findings advocate a more proactive defense strategy against inadvertent insider threats in contrast to malicious ones,despite the latter imposing a higher burden on the *** theoretical results are substantiated by numerical results,which additionally include a detailed exploration of the conditions under which different insiders adopt risky *** conditions can serve as guiding indicators for the defender when calibrating their monitoring intensities and devising defensive strategies.
作者:
Zhou, JingShang, JunChen, TongwenUniversity of Alberta
Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada Tongji University
Department of Control Science and Engineering Shanghai Institute of Intelligent Science and Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Shanghai200092 China
This paper examines the problem of optimal deception attacks against state estimation with partially secured measurements, where smart sensors transmit innovation sequences to the remote end for information fusion. Du...
详细信息
Recently, a reference derived some new higher-order output tracking properties for direct model reference adaptive control(MRAC) of linear time-invariant(LTI) systems: limt→∞ e(i)(t) = 0, i = 1,..., n*-1, wh...
详细信息
Recently, a reference derived some new higher-order output tracking properties for direct model reference adaptive control(MRAC) of linear time-invariant(LTI) systems: limt→∞ e(i)(t) = 0, i = 1,..., n*-1, where n*and e(i)(t) denote the relative degree of the system and the i-th derivative of the output tracking error, respectively. However, a naturally arising question involves whether indirect adaptive control(including indirect MRAC and indirect adaptive pole placement control) of LTI systems still has higher-order tracking properties. Such properties have not been reported in the literature. Therefore, this paper provides an affirmative answer to this question. Such higher-order tracking properties are new discoveries since they hold without any additional design conditions and, in particular, without the persistent excitation condition. Given the higher-order properties, a new adaptive control system is developed with stronger tracking features.(1) It can track a reference signal with any order derivatives being unknown.(2) It has higher-order exponential or practical output tracking properties.(3) Finally, it is different from the usual MRAC system, whose reference signal's derivatives up to the n*order are assumed to be known. Finally, two simulation examples are provided to verify the theoretical results obtained in this paper.
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming ...
详细信息
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming and labor-intensive for manual predetermination for a large-scale modern power *** improve efficiency of predetermination,this paper proposes a framework of knowledge fusion-based deep reinforcement learning(KF-DRL)for intelligent predetermination of ***,the Markov Decision Process(MDP)for GTS problem is formulated based on transient instability ***,linear action space is developed to reduce dimensionality of action space for multiple controllable ***,KF-DRL leverages domain knowledge about GTS to mask invalid actions during the decision-making *** can enhance the efficiency and learning ***,the graph convolutional network(GCN)is introduced to the policy network for enhanced learning *** simulation results obtained on New England power system demonstrate superiority of the proposed KF-DRL framework for GTS over the purely data-driven DRL method.
autonomous vehicles (AVs) are vehicles that traverse on the road without active human intervention. With a coordinator, AVs can be connected to provide high-efficiency transport services, such as AV-based public trans...
详细信息
This paper considers the problem of approximating the infinite-horizon value function of the discrete-time switched LQR *** particular,the authors propose a new value iteration method to generate a sequence of monoton...
详细信息
This paper considers the problem of approximating the infinite-horizon value function of the discrete-time switched LQR *** particular,the authors propose a new value iteration method to generate a sequence of monotonically decreasing functions that converges exponentially to the value *** method facilitates us to use coarse approximations resulting from faster but less accurate algorithms for further value iteration,and thus,the proposed approach is capable of achieving a better approximation for a given computation time compared with the existing *** numerical examples are presented in this paper to illustrate the effectiveness of the proposed method.
Phasor measurement units(PMUs)provide useful data for real-time monitoring of the smart ***,there may be time-varying deviation in phase angle differences(PADs)between both ends of the transmission line(TL),which may ...
详细信息
Phasor measurement units(PMUs)provide useful data for real-time monitoring of the smart ***,there may be time-varying deviation in phase angle differences(PADs)between both ends of the transmission line(TL),which may deteriorate application performance based on *** address that,this paper proposes two robust methods of correcting time-varying PAD deviation with unknown parameters of TL(ParTL).First,the phenomena of time-varying PAD deviation observed from field PMU data are *** general formulations for PAD estimation are then *** simplify the formulations,estimation of PADs is converted into the optimal problem with a single ParTL as the variable,yielding a linear estimation of *** latter is used by second-order Taylor series expansion to estimate PADs *** reduce the impact of possible abnormal amplitude data in field data,the IGG(Institute of Geodesy&Geophysics,Chinese Academy of Sciences)weighting function is *** using both simulated and field data verify the effectiveness and robustness of the proposed methods.
Artificial intelligence systems are usually implemented either using machine learning or expert systems. Machine learning methods are usually more accurate and applicable to a broader range of applications. Expert sys...
详细信息
暂无评论