This paper concerns the optimal model reference adaptive control problem for unknown discrete-time nonlinear systems. For such problem, it is challenging to improve online learning efficiency and guaranteeing robustne...
详细信息
This paper concerns the optimal model reference adaptive control problem for unknown discrete-time nonlinear systems. For such problem, it is challenging to improve online learning efficiency and guaranteeing robustness to the uncertainty. To this end, we develop an online adaptive critic robust control method. In this method, a critic network and a new supervised action network are constructed to not only improve the real-time learning efficiency, but also obtain the optimal control performance. By combining the designed compensation control term, robustness is further guaranteed by compensating the uncertainty. The comparative simulation study is conducted to show the superiority of our developed method.
Fitness landscape analysis (FLA) is quite important in evolutionary computation. In this paper, we propose a novel FLA method, the nearest-better network (NBN), which uses the nearest-better relationship to simplify t...
详细信息
The presence of downhole faults compromises the safety and also leads to increased maintenance costs in complex geological drilling processes. In order to achieve timely and accurate detection of downhole faults, a sy...
详细信息
The presence of downhole faults compromises the safety and also leads to increased maintenance costs in complex geological drilling processes. In order to achieve timely and accurate detection of downhole faults, a systematic fault detection method is proposed based on the Multivariate Generalized Gaussian Distribution (MGGD) and the Kullback Leibler Divergence (KLD). Uncorrelated components are obtained from the original drilling process signals using the principle component analysis; then, the distribution of components is estimated using the MGGD; afterwards, the KLD is calculated based on a deduced analytic formula; last, the downhole faut is detected by comparing the calculated KLD with the alarm threshold obtained from normal data. The effectiveness and practicality of the proposed method are demonstrated by application to a real drilling process.
Drilling is an important means of obtaining resources. It is important to determine appropriate drilling states adjustment priority to guide operation of the drilling. However, the priority of drilling states adjustme...
详细信息
Drilling is an important means of obtaining resources. It is important to determine appropriate drilling states adjustment priority to guide operation of the drilling. However, the priority of drilling states adjustment is difficult to determine because of the influence of multiple parameters. In this paper, a priority comprehensive evaluation method is developed to solve this problem. Firstly, support vector regression (SVR) method and long short-term memory (LSTM) neural network are introduced to build rate of penetration (ROP) prediction model and mud pit volume (MPV) prediction model, respectively. Then, the comprehensive evaluation vector is obtained by fuzzy comprehensive evaluation method based on analysis of formation drillability, rock characteristic, pump pressure variation, ROP and MPV fluctuations. Finally, the drilling states adjustment priority is determined by the principle of maximum membership and comprehensive analysis method. The simulation based on actual drilling data indicates that the proposed method can determine the adjustment priority and guide the operation of the drilling process.
Grinding is an energy-consuming process in mineral processing industry. Improving grinding processing capacity per unit power consumption is an effective means to reduce grinding production cost. In this paper, a new ...
详细信息
Grinding is an energy-consuming process in mineral processing industry. Improving grinding processing capacity per unit power consumption is an effective means to reduce grinding production cost. In this paper, a new index for evaluating the effective processing throughput of SAG milling is proposed. The production process model is established by BP neural network (BPNN). Through combining the process mechanism and production constraints, the genetic algorithm is adopted to optimize the operating parameters of the SAG milling process to maximize the effective throughput, thus improving the grinding efficiency. The experimental results showed that through optimization of effective throughput function proposed in this paper, the SAG mill processing capacity has been increased by 4% and the operating power drawn reduced by 1.12%. It has important guiding significance for the actual production process.
This paper presents an action recognition method based on 2D human body node data in video. This method uses the pose estimation algorithm to detect the human body node data in each frame of video information. We get ...
详细信息
This paper presents an action recognition method based on 2D human body node data in video. This method uses the pose estimation algorithm to detect the human body node data in each frame of video information. We get the two-dimensional coordinates and confidence data of the nodes, and optimize the arrangement of these data into a 3D array form similar to ***, we use the classical two-dimensional convolutional neural network to carry out classification training. The test on UCF-101 data set shows that this method can indeed improve the accuracy of action recognition based on RGB information to a certain extent, and reduce the training cost.
In recent years,deep learning based object detection has achieved great *** methods typically assume that large amount of labeled training data is available,meanwhile,training and test data are independent and identic...
详细信息
In recent years,deep learning based object detection has achieved great *** methods typically assume that large amount of labeled training data is available,meanwhile,training and test data are independent and identically ***,the two assumptions are not always hold in *** many applications,it is prohibitively expensive and time-consuming to obtain large quantities of labeled *** computer graphics technology to generate a large number of labeled data provides a solution to this ***,direct transfer across domains from synthesis to reality often performs poorly due to the presence of domain *** adaptive object detection are concerned with accounting for these types of *** this paper,we present an introduction to these ***,we briefly introduce the object detection and domain ***,the synthetic object detection datasets and related software tools are ***,we present a categorization of approaches,divided into discrepancy-based methods,adversarial discriminative methods,reconstruction-based methods and ***,we also discuss some potential deficiencies of current methods and several open problems which can be explored in future work.
This paper investigates the design and detection problems of stealthy false data injection (FDI) attacks against networked controlsystems from the different perspectives of an attacker and a defender, respectively. F...
This paper investigates the design and detection problems of stealthy false data injection (FDI) attacks against networked controlsystems from the different perspectives of an attacker and a defender, respectively. First, a Kalman filter-based output tracking control system is presented, where stealthy FDI attacks are designed for its feedback and forward channels so as to destroy the system performance while bypassing a traditional residual-based detector. Second, to successfully detect such two-channel stealthy attacks, an active data modification scheme is proposed, by which the measurement and control data are amended before transmitting them through communication networks. Theoretical analysis is then carried out for both ideal and practical cases to evaluate the effectiveness of the detection scheme. An interesting finding is that the attacks designed based on a false model obtained from those modified data can remain stealthy. Finally, simulation results are provided to validate the proposed attack design and detection schemes.
Recently,unmanned aerial vehicles are widely used in surveillance,aerial photography,power grid line inspections and other *** order to deploy the YOLOv3[1] algorithm on drones,it is necessary to adopt the YOLOv3 algo...
详细信息
Recently,unmanned aerial vehicles are widely used in surveillance,aerial photography,power grid line inspections and other *** order to deploy the YOLOv3[1] algorithm on drones,it is necessary to adopt the YOLOv3 algorithm with fewer parameters and a simpler *** paper implements the model compression of YOLOv3 based on methods such as sparseness,pruning,and knowledge *** paper implements the sparseness of the network by adding L1 regular expressions on the convolutional *** that,redundant channels and layers are removed through channel pruning and layer *** sparse and pruning,the mAP lost a *** using knowledge distillation after pruning,it attempts to recover mAP lost in sparseness and *** this method,the YOLOv3 algorithm can be deployed on embedded platforms such as RK3399 *** evaluate the model on the visdrone2019 *** experimental results show that after model compression,YOLOv3 is more suitable for deployment on embedded platforms.
Recent work has shown that the activation function of the convolutional neural network can meet the Lipschitz condition, then the corresponding convolutional neural network structure can be constructed according to th...
详细信息
暂无评论