Abstract: The initial boundary value problem regarding vibrations of an annular membrane is considered. Nonsteady boundary conditions are specified, and there is no distributed load. This is a nonclassical formulation...
详细信息
Abstract: For a one-dimensional boundary problem associated with a linear parabolic equation in the presence of a nonlocal spatial condition, necessary and sufficient conditions for the existence of a solution are est...
详细信息
Abstract: The initial model boundary value problem regarding vibrations of a viscoelastic beam with damping of Voigt type is considered. A classical formulation of a mixed problem for a fifth-order linear partial diff...
详细信息
The motion of viscous electrically conducting incompressible liquid is investigated, in circumstances where the liquid rotates initially in a solid mass at constant speed together with a porous boundary wall (plate) u...
详细信息
Abstract: A stochastic model of the growth of household (family) savings is considered. Conditions are identified such that there exists a solution to the mixed parabolic problem for the distribution density of househ...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
The integration of human-robot interaction (HRI) technologies with industrial automation has become increasingly essential for enhancing productivity and safety in manufacturing environments. In this paper, we propose...
详细信息
To reduce key disagreement rate and increase key generation rate, this paper proposes a lightweight and robust shared secret key extraction scheme from atmospheric optical wireless channel. A conception of grouping sa...
详细信息
The dynamics of information warfare in an attacker-defender scenario pose significant challenges in today’s digital age. To address these challenges, this research models the dynamics of information warfare using mod...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
暂无评论