This paper explores the finite-time synchronization of a class of discrete-time nonlinear singularly perturbed complex networks using a dynamic event-triggered mechanism(DETM). The DETM is designed to optimize packet ...
This paper explores the finite-time synchronization of a class of discrete-time nonlinear singularly perturbed complex networks using a dynamic event-triggered mechanism(DETM). The DETM is designed to optimize packet transmission, aiming to conserve network resources. By constructing a Lyapunov function considering singularly perturbed parameters(SPPs) and DETM information, a sufficient condition for the dynamics of synchronization error system to be finite-time stable is given. The parameters of the synchronization controller can be determined by solving a set of matrix inequalities. The effectiveness of the proposed controller is demonstrated through a numerical example.
A fault diagnosis method based on Discrete Hidden Markov Models is proposed in this paper to identify the fault causing alarm flood sequences. The proposed method consists of the following steps: First, the alarm floo...
A fault diagnosis method based on Discrete Hidden Markov Models is proposed in this paper to identify the fault causing alarm flood sequences. The proposed method consists of the following steps: First, the alarm flood data is pre-processed to ensure that all sequences are of uniform length, and a separate Discrete Hidden Markov model is trained for each fault to capture the relationship between the fault and the alarm sequences. Second, given an observation sequence, the log-likelihood probability values under different Discrete Hidden Markov models are calculated and the maximum probability is selected to determine the type of corresponding fault. Last, the feasibility of the proposed method is verified by simulation data obtained from a public industrial model. The results show that the method can effectively identify the faults that trigger alarm floods.
This paper presents an improved stability criterion and controller design scheme condition for a networked control system under denial of service(DoS) attack. Firstly, the DoS attack interval is divided into attack in...
This paper presents an improved stability criterion and controller design scheme condition for a networked control system under denial of service(DoS) attack. Firstly, the DoS attack interval is divided into attack interval and no attack interval, therefore, a switching-like event-triggered control can be established to reduce the waste of network resources and improve network efficiency. Then, the studied system is transformed into a time-delay system, and an improved stability criterion and controller design method are established by using Lyapunov-Krasovskii functional(LKF). Finally, the effectiveness of the proposed method is verified by a simulation example.
This paper uses the wave equation to explain the torsional motion of the drill-string system.S olving the wave equation with the D'Alembert method,a neutral time-delay model of the drill-string system is *** distu...
This paper uses the wave equation to explain the torsional motion of the drill-string system.S olving the wave equation with the D'Alembert method,a neutral time-delay model of the drill-string system is *** disturbance input,caused by the bit-rock interaction,is given consideration,and an equivalent-input-disturbance(EID) based controller is designed to mitigate the disturbance in the established *** the actual drilling procedure,the system input time-delay increases as the length of the drill columns *** the influence of system input time-delay in the drilling procedure is ignored,it will most likely lead to the drill-string system instability and cause serious *** essential contribution of this paper is the incorporation of input time-delay into the EID based control *** the system's input time-delay,the proposed model is more practical and has significant implications for stick-slip vibration assessment and control in drilling procedures.
Geo-hazards have become one of the main disasters endangering the safety of people's lives and property in the *** order to improve the early warning of disasters, a persistent monitoring method of multi-agent sys...
Geo-hazards have become one of the main disasters endangering the safety of people's lives and property in the *** order to improve the early warning of disasters, a persistent monitoring method of multi-agent systems is proposed in this *** ensure that the agent's energy is never exhausted, the set invariance constraint is included in the optimization problem. The goal is to minimize the difference between the actual control input of the robot and the nominal control input corresponding to the task to be performed. Moreover, the control barrier function(CBF) is used to transform the forward invariance of a subset of the robot state space into a control input constraint. The coverage control method in an uncertain environment is verified by numerical simulation. This work provides new insights into effective monitoring and early warning of geo-hazards.
In this paper, the H∞ consensus control problem for Markov jump multi-agent systems with imperfect time-varying transition probabilities is studied. Both the transition probability matrix and the higher-level transit...
详细信息
Changes in coal seam hardness cause fluctuations in the feed resistance at the drill bit during the drilling process, leading to unstable feeding speed. This paper proposes a robust dynamic output feedback controller ...
详细信息
Geological exploration is essential for economic and social progress, with lithology identification being a key technology that improves exploration precision and resource development efficiency. This paper presents a...
详细信息
ISBN:
(数字)9798350368604
ISBN:
(纸本)9798350368611
Geological exploration is essential for economic and social progress, with lithology identification being a key technology that improves exploration precision and resource development efficiency. This paper presents a real-time identification method of formation lithology in drilling process based on pre-training language model, which is divided into three stages. In this first stage, the drilling data undergoes rigorous cleaning, feature selection, and normalization to eliminate noise and anomalies. In the second stage, key model inputs such as weight on bit (WOB), rate of penetration (ROP), rotation speed (RPM), torque, and pump volume (P) are identified through detailed drilling mechanism analysis. In the last stage, a real-time identification method of formation lithology in drilling process based on pre-training language model is proposed, which realizes high-precision real-time identification in drilling process. The effectiveness of the proposed method is proved by comparison with common methods.
The multitude of advantages offered by distributed power generation units are recognized as crucial factors in enhancing the security of distribution networks. Ensuring the optimal size and placement of distributed ge...
详细信息
ISBN:
(数字)9798350367690
ISBN:
(纸本)9798350367706
The multitude of advantages offered by distributed power generation units are recognized as crucial factors in enhancing the security of distribution networks. Ensuring the optimal size and placement of distributed generation (DG) units not only enhances system security but also increases profitability. Haphazard placement of DG units may lead to adverse impacts on the power system, resulting in increased power losses and diminished voltage distribution. Therefore, to ensure the optimal size and placement of DG units, this paper proposes a method to optimize DG scheduling and operation, thereby improving voltage distribution, reducing power losses, and enhancing the overall reliability of the entire grid. To reduce power loss (PL) and improve voltage distribution (VP), an adaptive chaotic particle swarm optimization (ACPSO) algorithm is employed to determine the optimal locations and sizes of DG units. By comparing this algorithm with traditional approaches, its efficacy in enhancing performance can be discerned.
Pairwise similarity has been widely used for image classification by propagating the class information from labeled images to unlabeled images and predicting the classes of unlabeled images accordingly. Although widel...
详细信息
暂无评论