The risk of transmission lines overload in the power grid is increasing with the large-scale integration of fluctuating distributed renewable energies. Meanwhile, the requirement for accommodating more distributed res...
详细信息
The risk of transmission lines overload in the power grid is increasing with the large-scale integration of fluctuating distributed renewable energies. Meanwhile, the requirement for accommodating more distributed resources in the future smart grids promotes the transition from the current highly centralized control structure toward a distributed one. In this article, we propose a distributed corrective control approach to mitigate line overloads in a real-time and close-loop manner. Unlike the conventional centralized approach, only simple computation and local information exchange are required to update the local corrective control action. This makes it possible to mitigate line overloads timely and adapt to the topology changes of grids. Furthermore, the introduction of system measurements and security constraints in the proposed algorithm ensures an effective and secure corrective control without new line overloads. The performance of the proposed distributed approach is demonstrated in the IEEE 14-Bus and 118-Bus systems.
Spatiotemporal alignment is a critical problem in video-based person re-identification (reid) tasks. To address this problem, we propose a pose-guided spatiotemporal alignment (PISA) method to align video sequences fo...
详细信息
Spatiotemporal alignment is a critical problem in video-based person re-identification (reid) tasks. To address this problem, we propose a pose-guided spatiotemporal alignment (PISA) method to align video sequences for video-based person re-id. First, to perform precise temporal alignment, we align a video sequence to a series of image sets, corresponding to a series of reference pedestrian poses. Each image set is obtained by selecting the images with the same pose and high quality. Furthermore, to perform spatial alignment, we decompose a pedestrian image into human body parts, and accordingly compute the representations over the parts. Finally, we evaluate the similarity between two video sequences by aggregating the distances of the pose-corresponded image sets rather than all pairs. The experimental results on two public datasets show that the proposed method performs favorably against state-of-the-art methods, even deep learning-based approaches. (C) 2020 Elsevier Inc. All rights reserved.
Current security measures in industrial cyber-physical systems (ICPS) lack the active decision capability to defend against highly-organized cyber-attacks. In this paper, a security decision-making approach based on s...
详细信息
Current security measures in industrial cyber-physical systems (ICPS) lack the active decision capability to defend against highly-organized cyber-attacks. In this paper, a security decision-making approach based on stochastic game model is proposed to characterize the interaction between attackers and defenders in ICPSs and generate optimal defense strategies to minimize system losses. The major distinction of this approach is that it presents a practical way to build a cross-layer security game model for ICPSs by means of quantitative vulnerability analysis and time-based unified payoff quantification. A case study on a hardware-in-the-loop simulation testbed is carried out to demonstrate the feasibility of the proposed approach.
This paper concentrates on the multistability and robustness of complex-valued neural networks (CVNNs) with delays and input perturbation. Firstly, several criteria on the multiple w-type stability of CVNNs with time-...
详细信息
This paper concentrates on the multistability and robustness of complex-valued neural networks (CVNNs) with delays and input perturbation. Firstly, several criteria on the multiple w-type stability of CVNNs with time-varying delays are obtained by virtue of w-type function and the analytical method. Secondly, several sufficient conditions of robustness have been derived to guarantee the w-type stability and boundedness of delayed CVNNs with input perturbation. These obtained results improve and extend the previous results. Finally, one numerical example is provided to show the effectiveness of the theoretical results. (c) 2021 Elsevier B.V. All rights reserved.
Adversarial examples cause the deep neural network prediction error, which is a great threat to the deep neural network. How to generate more natural adversarial examples and improve the robustness of deep neural netw...
详细信息
Adversarial examples cause the deep neural network prediction error, which is a great threat to the deep neural network. How to generate more natural adversarial examples and improve the robustness of deep neural networks has received attention. In this paper, we propose an improved blackbox attack (IBBA) algorithm based on query and perturbation distribution. This algorithm only needs the top-l label of the attacked model to generate the adversarial examples. Based on the existing black-box attacks, we optimize the performance of the algorithm from two aspects: query distribution and perturbation distribution. In the aspect of query distribution, we adopt different strategies for nontargeted attack and targeted attack; in the aspect of perturbation distribution, we choose different low-frequency noise according to the difference between the targeted attack and nontargeted attack. The experimental results on imageNet show that the proposed algorithm is better than the existing algorithms in low query number, and the targeted attack is better in each specified query number.
In this brief, we investigate a class of second-order memristive neural networks (SMNNs) with mixed time-varying delays. Based on nonsmooth analysis, the Lyapunov stability theory, and adaptive control theory, several...
详细信息
In this brief, we investigate a class of second-order memristive neural networks (SMNNs) with mixed time-varying delays. Based on nonsmooth analysis, the Lyapunov stability theory, and adaptive control theory, several new results ensuring global stabilization of the SMNNs are obtained. In addition, compared with the reduced-order method used in the existing research studies, we consider the global stabilization directly from the SMNNs themselves without the reduced-order method. Finally, we give some numerical simulations to show the effectiveness of the results.
This paper tackles the Zero-Shot Sketch-Based image Retrieval (ZS-SBIR) problem from the viewpoint of cross-modality metric learning. This task has two characteristics: 1) the zero-shot setting requires a metric space...
详细信息
This paper is concerned with the problem of joint input and state estimation for linear stochastic systems with direct feedthrough. Based on the fact that each unknown input between any two time steps is always bounde...
详细信息
This paper is concerned with the problem of joint input and state estimation for linear stochastic systems with direct feedthrough. Based on the fact that each unknown input between any two time steps is always bounded, a novel improved algorithm is proposed. Compared with existing results, this algorithm can effectively enhance estimation accuracy. Moreover, the stability of the algorithm is also discussed. Finally, an illustrative example is given to demonstrate the effectiveness of the proposed approach.
This report presents UniAnimate-DiT, an advanced project that leverages the cutting-edge and powerful capabilities of the open-source Wan2.1 model for consistent human image animation. Specifically, to preserve the ro...
作者:
Wang, JianWang, XueyanYu, MingzhuHuazhong Univ Sci & Technol
Sch Artificial Intelligence & Automat Key Lab Image Proc & Intelligent Control Minist Educ Wuhan 430074 Peoples R China Shenzhen Univ
Inst Big Data Intelligent Management & Decis Coll Management Coll Civil & Transportat Engn Shenzhen 518060 Peoples R China
This paper studies a supply chain network design model with price competition. The supply chain provides multiple products for a market area in multiple periods. The model considers the location of manufacturers and r...
详细信息
This paper studies a supply chain network design model with price competition. The supply chain provides multiple products for a market area in multiple periods. The model considers the location of manufacturers and retailers and assumes a probabilistic customer behavior based on an attraction function depending on both the location and the quality of the retailers. We aim to design the supply chain under the capacity constraint and maximize the supply chain profit in the competitive environment. The problem is formulated as a mixed integer nonlinear programming model. To solve the problem, we propose two heuristic algorithms-Simulated Annealing Search (SA) and Particle Swarm Optimization (PSO)-and numerically demonstrate the effectiveness of the proposed algorithms. Through the sensitivity analysis, we give some management insights.
暂无评论