In this paper, we investigate the simultaneous state and unknown input (SUI) filtering issue for a class of multi-sensor networked systems (MSNSs). The unknown input with no prior knowledge is introduced in the system...
详细信息
ISBN:
(纸本)9781665456579
In this paper, we investigate the simultaneous state and unknown input (SUI) filtering issue for a class of multi-sensor networked systems (MSNSs). The unknown input with no prior knowledge is introduced in the system state and output. The focus of this paper is to design the local filters with regard to the SUI, which can yield that the local upper bounds of the filtering error covariance for the SUI are derived at each instant. Moreover, the local filter gains of the SUI are designed such that the obtained upper bounds can be minimized. Finally, the proposed joint SUI algorithm is verified by using the simulation example.
In order to solve the problem that ultrasonic ranging is difficult to obtain the first wave, an ultrasonic ranging system based on cross-correlation method is designed. In this system, the signal generating unit is ma...
详细信息
ISBN:
(数字)9789881563903
ISBN:
(纸本)9781728165233
In order to solve the problem that ultrasonic ranging is difficult to obtain the first wave, an ultrasonic ranging system based on cross-correlation method is designed. In this system, the signal generating unit is mainly responsible for transmitting high frequency sound waves, and the data acquisition unit is mainly responsible for collecting and storing the sound waves. Then, according to the time delay between the collected acoustic signals, the time difference between the signals received by the signal acquisition unit is obtained, so as to measure the distance.
The computer room management system is a management system for network monitoring, bottom control, information filtering and security monitoring of computer room. It has the characteristics of multi-user and multi mod...
详细信息
ISBN:
(数字)9781728176871
ISBN:
(纸本)9781728176888
The computer room management system is a management system for network monitoring, bottom control, information filtering and security monitoring of computer room. It has the characteristics of multi-user and multi module. Scientific and intelligent management and control is the premise of efficient and stable work in computer room. Aiming at the problems of power supply security and efficiency, user authority configuration and management security of traditional computer room, a centralized management system of computer room based on Role Based of Access control(RBAC) is designed and implemented. This paper first introduces the structure and function of the system, then focuses on the detailed design of the user management subsystem of the system, and finally gives the realization and actual operation of the system. At present, the system has been successfully applied to a power room equipment, which proves the security, stability and efficiency of the system.
Extreme Learning Machine (ELM) has gained lots of research interest due to its universal approximation capability and fast learning speed. However, traditional ELMs are devised for regular Euclidean data, such as 2D g...
详细信息
ISBN:
(数字)9781728169262
ISBN:
(纸本)9781728169279
Extreme Learning Machine (ELM) has gained lots of research interest due to its universal approximation capability and fast learning speed. However, traditional ELMs are devised for regular Euclidean data, such as 2D grid and 1D sequence, and thus don't apply to non-Euclidean data, e.g., graph-structured data. To overcome this shortcoming, this paper presents a Graph Convolutional Extreme Learning Machine (termed as GCELM) for semi-supervised classification. Technically, a random graph convolutional layer is introduced to replace the random projection of original ELM, which endues ELM with the capability of dealing with graph-structured data directly. To generate a robust graph from the raw dataset, a self-representation model is adopted to construct a weighted graph. Extensive experiments on 27 UCI datasets demonstrate that GCELM outperforms many popular semi-supervised methods, and with faster learning speed. To the best of our knowledge, this is the first work that combines graph convolution with ELM.
Influence maximization aims at detecting the top-k influential users in online social networks. Almost all previous models of influence spread cannot simultaneously incorporate users' attitudes, interactions betwe...
详细信息
ISBN:
(数字)9781728190938
ISBN:
(纸本)9781728190945
Influence maximization aims at detecting the top-k influential users in online social networks. Almost all previous models of influence spread cannot simultaneously incorporate users' attitudes, interactions between users, and dynamic influences. However, in this study, we established a new model of influence spread via fluid dynamics, which reveals the time-evolving process for influence spread. We modeled the spread of influence as the process of fluid update based on three dimensions: the difference of fluid height, the temperature of fluids, and the difference of temperature. Moreover, we formulated the problem of maximizing positive influence and devised a Fluid-spread greedy algorithm to solve it. We conducted extensive comparisons between our approach and several baselines, and experimental results illustrate the effectiveness and efficiency of the Fluidspread model and algorithm.
This paper investigates the performance of three active disturbance-rejection methods: disturbance-observer-based(DOB) control, active disturbance rejection control(ADRC), and equivalent-input-disturbance-based(...
详细信息
This paper investigates the performance of three active disturbance-rejection methods: disturbance-observer-based(DOB) control, active disturbance rejection control(ADRC), and equivalent-input-disturbance-based(EID) control. Compared to the classic feedback control, these methods provide an additional degree of freedom to reject disturbances effectively. First, the disturbance-rejection mechanism of each of the methods is analyzed. For a proper design, the transfer function from disturbances to the output of a system approximates zero using these methods. This implies the effect of disturbances is blocked to the ***, the three methods are applied to the position control of a ball-and-beam system for comparison. The simulation results show that all these methods are insensitive to disturbances and robust to system uncertainties. And the error of the system output is smaller for the EID method than for the DOB and ADRC methods.
Position control of a planar single-link flexible-link manipulator always faces huge challenges due to the underactuated characteristic of the system and the vibration of the flexible link. Since the system state vari...
详细信息
Position control of a planar single-link flexible-link manipulator always faces huge challenges due to the underactuated characteristic of the system and the vibration of the flexible link. Since the system state variables related to the vibration is underactuated, this paper considers enhancing the dynamic coupling of this system. An enhanced dynamic coupling model is established by making equivalent transformation for the real dynamic model of the system. This enhanced dynamic coupling model makes the vibration variables appear as active variables in the proposed energy-based controller. Therefore, the proposed controller achieves good vibration suppression effect. The stability analysis is presented to prove that the proposed controller can effectively achieve the position control objective, and the simulation results further demonstrate the superiority of the proposed control method.
Cyber-Physical-Social systems bridge the gap between social resource organization and distribution, and give birth to Society 5.0, which represents a transformative vision aimed at realizing the human-centric paradigm...
详细信息
Cyber-Physical-Social systems bridge the gap between social resource organization and distribution, and give birth to Society 5.0, which represents a transformative vision aimed at realizing the human-centric paradigm for more efficient and effective sustainable development. In this paper, we discuss the decentralized paradigm in fostering human needs-driven smart services, in line with Maslow’s hierarchy of needs theory. Societies 5.0 is committed to optimizing the use of natural, artificial, and social resources by enhancing democratic participation and ensuring that decision-making processes are more transparent, reliable, and aligned with the needs of the populace in sustainable ways. Moreover, our discussion extends to how Society 5.0’s principles correlate with the United Nations Sustainable Development Goals (SDGs), providing a framework that supports health, education, and poverty reduction, among other targets. This approach also aligns with the Human Development Index (HDI), reinforcing the notion that technological progress in Society 5.0 does not overshadow but rather complements and enhances human values, paving a synergistic path towards sustainable development that is both advanced and fundamentally human-centric.
The short-term hydrothermal scheduling (STHS) is a complex non-linear, non-convex and high-dimensional mathematical optimization problem. Due to the fact that the original chimp optimization algorithm (ChOA) is likely...
详细信息
Neimark-Sacker bifurcation of a delay differential equation modeling two-enterprise interaction mechanism is investigated. For the demands of computer simulation applications, the discrete-time two-enterprise interact...
详细信息
Neimark-Sacker bifurcation of a delay differential equation modeling two-enterprise interaction mechanism is investigated. For the demands of computer simulation applications, the discrete-time two-enterprise interaction model is proposed by using the forward Euler scheme. By discussing the characteristic equation of linearized part, the local stability criterion of the positive fixed point is presented. Time lag is selected as the bifurcation parameter. Then it is demonstrated that variation of time lag may result in Neimark-Sacker bifurcation. Furthermore, derivations for the directions and stability of Neimark-Sacker bifurcation are also given. Finally, we simulate the main results.
暂无评论