Wind power prediction is the basis of power grid energy dispatching. However, wind instability increases the difficulty of wind power prediction. The paper proposes a wind power prediction method based on long and sho...
详细信息
Wind power prediction is the basis of power grid energy dispatching. However, wind instability increases the difficulty of wind power prediction. The paper proposes a wind power prediction method based on long and short-term memory network to improve the accuracy of wind power prediction. First, wind power sequence is decomposed by empirical mode decomposition(EMD) method, and the noise in the original sequence was removed by effective component reconstruction. Then, long shortterm memory(LSTM) with the ability of information memory predicts model of wind power sequence. The improved particle swarm optimization algorithm(IPSO) optimized the parameters of LSTM to solve the problem that the parameters of LSTM, such as the number of neurons, the learning rate and the number of iterations, are difficult to determine and thus affect the prediction accuracy of the model. Finally, the proposed EMD-IPSO-LSTM method makes rolling prediction of wind power series of actual wind farm, and the prediction results are compared with other prediction models. The results show that the prediction model has higher accuracy.
Electroencephalogram(EEG) emotion recognition has gained considerable attention due to its ability to reflect people’s inner emotional states objectively and *** extraction is a critical step in EEG emotion recogni...
详细信息
Electroencephalogram(EEG) emotion recognition has gained considerable attention due to its ability to reflect people’s inner emotional states objectively and *** extraction is a critical step in EEG emotion recognition because of non-stationarity and irregularity of EEG signals.A feature extraction method using Variational Modal Decomposition(VMD)to extract Dispersion Entropy(DispEn) is proposed in this *** EEG signal is decomposed into several components,and DispEn of each component is extracted in eight emotion-related *** method was tested on DEAP dataset in which the EEG emotional states are accessed in Valence-Arousal emotional *** emotional states(i.e.,HVHA,HVLA,LVHA,LVLA) are classified by Support Vector Machine(SVM).The experimental results show that the accuracy of emotion recognition is 77.87%,which demonstrates its effectiveness.
This paper investigates the problem of model predictive control(MPC) for systems with polytopic uncertainties under the event-triggered communication mechanism. To save network resources, a new dynamic event-trigger...
详细信息
This paper investigates the problem of model predictive control(MPC) for systems with polytopic uncertainties under the event-triggered communication mechanism. To save network resources, a new dynamic event-triggered mechanism(DETM) is proposed, which contains an adaptive internal dynamic variable(IDV) and a time-varying parameter. A "min-max"optimization problem is put forward to dealing with the MPC problem for systems with polytopic uncertainties. With the aid of a Lyapunov-like function dependent on the IDV of the DETM, an auxiliary optimization problem is devised with constraints in terms of linear matrix inequalities. By solving such an auxiliary optimization problem, sub-optimal feedback gains are obtained which ensure the input-to-state practical stability of the closed-loop system. A numerical example is provided to demonstrate the effectiveness of the devised MPC algorithm.
This paper studies a rate-based TCP-Friendly Rate control(TFRC) mechanism, which is widely used in multimedia real-time services, and analyzes its basic workflow, throughput model and calculation of key parameters. ...
详细信息
This paper studies a rate-based TCP-Friendly Rate control(TFRC) mechanism, which is widely used in multimedia real-time services, and analyzes its basic workflow, throughput model and calculation of key parameters. In order to meet the demand of real-time service for network transmission, the bandwidth-delay product(BDP) is applied to the congestion control of TFRC as the network congestion warning signal, and the improved TFRC algorithm is proposed. The simulation results show that this method can achieve good results in the network transmission of real-time services, and its friendliness and smoothness are improved to a certain extent.
During the construction of the tunnel excavation with the method of drilling and blasting,overbreak and underbreak occur ***,overbreak and underbreak affect the cost,efficiency,and safety of tunnel *** paper presents ...
详细信息
During the construction of the tunnel excavation with the method of drilling and blasting,overbreak and underbreak occur ***,overbreak and underbreak affect the cost,efficiency,and safety of tunnel *** paper presents a detection method for overbreak and underbreak of tunnels based on three-dimensional laser point ***,this paper obtains point cloud data of a tunnel by a 3 D laser scanner,preprocesses the point cloud data based on Gaussian filter,and extracts midlines of the tunnel based on random sampling consistency(RANSAC) to obtain attitude and trend information of the ***,cross-sections of the tunnel are extracted according to the midline of the ***,the position and value of the overbreak and underbreak are got according to comparing the projections of the cross-sections of the tunnel with a planned extent of the ***,this method was applied to an evaluation of overbreak and underbreak of a tunnel,and the results show that the method in this paper detects overbreak and underbreak easily,quickly,and accurately.
In view of the loss of speed caused by the attack of the four-rotor UAV executor, an adaptive control method is designed to maintain the altitude and posture of the UAV without the attack diagnostic mechanism. Adaptiv...
详细信息
In view of the loss of speed caused by the attack of the four-rotor UAV executor, an adaptive control method is designed to maintain the altitude and posture of the UAV without the attack diagnostic mechanism. Adaptive event trigger control methods also consider the mechanism of event triggering. The main impact of attacks on UAVs is the loss of thrust from UAVs. The attack-tolerant method designed in this paper can ensure that the tracking error of multi-acting device can maintain altitude and attitude when attacked is gradually convergent. At the same time, the event trigger method reduces the use of communication resources. Simulation proves the validity of the method.
Aiming at the multi-condition problem of Continuous Annealing Processes(CAP), this paper proposes a new method based on Long Short-Term Memory(LSTM) and Gated Recurrent Unit(GRU) models to identify multiple conditions...
详细信息
Aiming at the multi-condition problem of Continuous Annealing Processes(CAP), this paper proposes a new method based on Long Short-Term Memory(LSTM) and Gated Recurrent Unit(GRU) models to identify multiple conditions in ***, this work analyzes the parameters in CAP, selects the key variables that affect the working conditions, and then selects a piece of data in the CAP work process as the training data set to train the constructed LSTMRU neural network. This method realizes the recognition of different working conditions in CAP, which saves training time, simplifies internal *** with the traditional method, this method avoids the recognition error caused by personal experience factors, and the model accuracy has greatly improved.
In this paper, we focus on the formation control problems of MAS over a directed graph with actuator and communication attacks. The considered system is composed of a leader, some followers and an attacked communicati...
详细信息
In this paper, we focus on the formation control problems of MAS over a directed graph with actuator and communication attacks. The considered system is composed of a leader, some followers and an attacked communication network. Firstly,a new distributed observer is proposed to estimate the leader information despite communication attacks. Then, for high-order nonlinear systems, we develop an adaptive control strategy to solve the actuator attack by using Nussbaum function and backstepping technique, so that the agent with actuator attacks can follow the leader’s trajectory. Finally, a simulation example is proposed to verify the results of this paper.
Alarm systems are commonly deployed in modern industrial facilities for monitoring of process ***,due to the presence of nuisance alarms and alarm floods,the efficiency of many real alarm systems is much *** that prob...
详细信息
Alarm systems are commonly deployed in modern industrial facilities for monitoring of process ***,due to the presence of nuisance alarms and alarm floods,the efficiency of many real alarm systems is much *** that problems,such as chattering alarms,redundant alarms,and false alarms,can be well solved,alarm floods are still difficult to *** an alarm flood situation,a number of alarms appear and overwhelm the plant operators;as a result,the operator may overlook the critical alarms and thus the situation may get *** paper studies the root cause analysis of alarm floods,and proposes a Few-Shot Learning(FSL) approach to diagnose faults under alarm flood situations based on alarm event sequences extracted from alarm and event(A&E) *** with the existing methods based on continuous-valued process data,the proposed method does not need to conduct feature selection or dimension reduction,and thus is more straightforward and computationally *** addition,the proposed method only requires a few shots of faulty data to train a fault diagnosis model,and thus shows better applicability in *** experimental results on the Vinyl Acetate Monomer(VAM) benchmark dataset showed the superiority of the proposed model against the state-of-the-art approaches.
3D formation drillability field is crucial for drilling optimization and control due to its vital role in describing the spatial formation environment. Conventional geostatistical and machine learning methods are intr...
详细信息
3D formation drillability field is crucial for drilling optimization and control due to its vital role in describing the spatial formation environment. Conventional geostatistical and machine learning methods are introduced to establish the ***, the modeling accuracy should be further improved to meet the high-level requirement of drilling engineering. In this paper, a novel deep learning-based spatial modeling method is proposed for 3D formation drillability field. First of all, the drilling process and its characteristics are described and analyzed. After that, long short-term memory(LSTM), a deep learning method is proposed to establish the 3D formation drillability field model. The inputs of the model are the ground and depth coordinates and the output of the model is the formation drillability. Finally, 3D modeling and final test experiments are executed and the drilling data are from Xujiawei area, Northeast China. The results show the effectiveness of proposed method in modeling accuracy compared with four conventional methods(Random forest, Support vector regression, Scattered Interpolation, and Kriging).
暂无评论