Based on the idea of 'q—count' of certain subwords of a word and generalizing the notion of Parikh matrix of a word, the notion of Parikh q—matrix of a word over an ordered alphabet was introduced. On the ot...
Based on the idea of 'q—count' of certain subwords of a word and generalizing the notion of Parikh matrix of a word, the notion of Parikh q—matrix of a word over an ordered alphabet was introduced. On the other hand, with a two-dimensional picture array of symbols arranged in rows and columns, two kinds of upper triangular matrices, known as row and column Parikh matrices have also been introduced and investigated. Here combining these two kinds of matrices of a picture array, we introduce row/column Parikh q—matrix of an array, leading to the concept of q—ambiguity of a picture array. Results relating to q—ambiguity of picture arrays are derived in the context of these Parikh q—matrices of arrays.
In Banach Spaces, we introduce a new improved multi-step iterative algorithm for the fixed points of strongly pseudo-contractive mappings, by proving the convergence for modified Mann iterative sequence, and that the ...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
In the past nearly two decades, DNA self-assembly technology as a promising technology, a body of laboratory work has been emerged in an endless stream. Single-stranded DNA tile (SST) assembly provides a simple, modul...
详细信息
Coordinated control of multi-agent systems has widespread application in engineering such as unmanned aerial vehicles and unmanned ground vehicles. Due to the fact that input saturation can lead a control system to de...
详细信息
Coordinated control of multi-agent systems has widespread application in engineering such as unmanned aerial vehicles and unmanned ground vehicles. Due to the fact that input saturation can lead a control system to deterioration and instability, a lot of efforts have been devoted to investigating this subject of great importance. The present article offers a survey of recent developments on coordinated control of multi-agents systems subject to input saturation. Some preliminaries about graph theory, stability theory and input saturation are first provided, followed by some important results in the area, which are categorized into semi-global and global coordinated controls. Future research topics are finally discussed.
In this paper,nonnegative edge consensus of systems steered by general linear dynamics on directed network is *** the new approach,one first endows dynamics to each directed edge and then designs a distributed edge co...
详细信息
ISBN:
(纸本)9781509009107
In this paper,nonnegative edge consensus of systems steered by general linear dynamics on directed network is *** the new approach,one first endows dynamics to each directed edge and then designs a distributed edge consensus protocol guiding all edges to reach a common *** the help of line graph theory,it is proved that strongly connected network can ensure reaching nonnegative edge consensus,if the initial conditions of all edges are *** simulations are provided to verify the theoretical results.
Bus driver rostering is a world-wide problem, which is NP-hard. Two objectives exist in the problem: (1) minimizing the number of drivers;(2) minimizing excess workload of each driver and balancing excess workload amo...
详细信息
This technical note deals with a modified algebraic Riccati equation (MARE) and its corresponding inequality and difference equation, which arise in modified optimal control and filtering problems and are introduced i...
详细信息
This paper presents an adaptive differential evolution approach (DEMS for short) for the maximal synchronization between two most popular transit modes (i.e., bus and metro). Given a metro station, suppose the timetab...
详细信息
This paper addresses the robust reliable guaranteed cost control problem of positive interval systems with multiple time delays and actuator failure for a given quadratic cost function. Through constructing a Lyapunov...
详细信息
暂无评论