Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control *** quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion ***,we design an energy controller to dynamically adjust the system energy changes caused by unknown *** designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping ***,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack *** addition,this secure control method is simple to implement because it avoids complicated mathematical *** effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.
The multi-compartment electric vehicle routing problem(EVRP)with soft time window and multiple charging types(MCEVRP-STW&MCT)is studied,in which electric multi-compartment vehicles that are environmentally friendl...
详细信息
The multi-compartment electric vehicle routing problem(EVRP)with soft time window and multiple charging types(MCEVRP-STW&MCT)is studied,in which electric multi-compartment vehicles that are environmentally friendly but need to be recharged in course of transport process,are employed.A mathematical model for this optimization problem is established with the objective of minimizing the function composed of vehicle cost,distribution cost,time window penalty cost and charging service *** solve the problem,an estimation of the distribution algorithm based on Lévy flight(EDA-LF)is proposed to perform a local search at each iteration to prevent the algorithm from falling into local *** results demonstrate that the EDA-LF algorithm can find better solutions and has stronger robustness than the basic EDA *** addition,when comparing with existing algorithms,the result shows that the EDA-LF can often get better solutions in a relatively short time when solving medium and large-scale *** experiments show that using electric multi-compartment vehicles to deliver incompatible products can produce better results than using traditional fuel vehicles.
作者:
Wang, XiaolingSu, HoushengWang, XiaofanLiu, BoDepartment of Automation
Shanghai Jiao Tong University and Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China School of Automation
Image Processing and Intelligent Control Key Laboratory of Education Ministry of China Huazhong University of Science and Technology Wuhan430074 China College of Science
North China University of Technology Beijing100144 China
In this paper, we investigate the leader-following consensus of second-order multi-agent systems with nonlinear dynamics and time delay by employing periodically intermittent pinning control. All member agents and the...
详细信息
In this paper, an optimal guidance algorithm is proposed for atmospheric ascent. The optimal guidance algorithm updates the reference trajectory to deal with the impact of disturbance by solving an optimal control pro...
详细信息
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation ex...
详细信息
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation expense,privacy concerns,***,the effectiveness of TL is not always *** transfer(NT),i.e.,leveraging source domain data/knowledge undesirably reduces learning performance in the target domain,and has been a long-standing and challenging problem in *** approaches have been proposed in the literature to address this ***,there does not exist a systematic *** paper fills this gap,by first introducing the definition of NT and its causes,and reviewing over fifty representative approaches for overcoming NT,which fall into three categories:domain similarity estimation,safe transfer,and NT *** areas,including computer vision,bioinformatics,natural language processing,recommender systems,and robotics,that use NT mitigation strategies to facilitate positive transfers,are also ***,we give guidelines on NT task construction and baseline algorithms,benchmark existing TL and NT mitigation approaches on three NT-specific datasets,and point out challenges and future research *** ensure reproducibility,our code is publicized at https://***/chamwen/NT-Benchmark.
intelligent vehicles can effectively improve traffic congestion and road traffic *** cruise followingcontrol(ACFC)is a vital part of intelligent *** this paper,a new hierarchical vehicle-following control strategy is ...
详细信息
intelligent vehicles can effectively improve traffic congestion and road traffic *** cruise followingcontrol(ACFC)is a vital part of intelligent *** this paper,a new hierarchical vehicle-following control strategy is presented by synthesizing the variable time headway model,type-2 fuzzy control,feedforward+fuzzy proportion integration(PI)feedback(F+FPIF)control,and inverse longitudinal dynamics model of ***,a traditional variable time headway model is improved considering the acceleration of the lead ***,an interval type-2 fuzzy logic controller(IT2 FLC)is designed for the upper structure of the ACFC system to simulate the driver's operating *** reduce the nonlinear influence and improve the tracking accuracy for the desired acceleration,the control strategy of F+FPIF is given for the lower control ***,the lower control method proposed in this paper is compared with the fuzzy PI control and the traditional method(no lower controller for tracking desired acceleration)***,the proportion integration differentiation(PID),linear quadratic regulator(LQR),subsection function control(SFC)and type-1 fuzzy logic control(T1 FLC)are respectively compared with the IT2 FLC in control performance under different ***,the simulation results show the effectiveness of IT2 FLC for the upper structure and F+FPIF control for the lower structure.
Generative adversarial network(GAN)has achieved great success in many fields such as computer vision,speech processing,and natural language processing,because of its powerful capabilities for generating realistic *** ...
详细信息
Generative adversarial network(GAN)has achieved great success in many fields such as computer vision,speech processing,and natural language processing,because of its powerful capabilities for generating realistic *** this paper,we introduce GAN into the field of electromagnetic signal classification(ESC).ESC plays an important role in both military and civilian ***,in many specific scenarios,we can’t obtain enough labeled data,which cause failure of deep learning methods because they are easy to fall into ***,semi-supervised learning(SSL)can leverage the large amount of unlabeled data to enhance the classification performance of classifiers,especially in scenarios with limited amount of labeled *** present an SSL framework by incorporating GAN,which can directly process the raw in-phase and quadrature(IQ)signal *** to the characteristics of the electromagnetic signal,we propose a weighted loss function,leading to an effective classifier to realize the end-to-end classification of the electromagnetic *** validate the proposed method on both public RML2016.04c dataset and real-world Aircraft Communications Addressing and Reporting System(ACARS)signal *** experimental results show that the proposed framework obtains a significant increase in classification accuracy compared with the state-of-the-art studies.
A directional filter algorithm for intensity synthetic aperture radar (SAR) image based on nonsubsampled contourlet transform (NSCT) and immune clonal selection (ICS) is presented. The proposed filter mainly foc...
详细信息
A directional filter algorithm for intensity synthetic aperture radar (SAR) image based on nonsubsampled contourlet transform (NSCT) and immune clonal selection (ICS) is presented. The proposed filter mainly focuses on exploiting different features of edges and noises by NSCT. Furthermore, ICS strategy is introduced to optimize threshold parameter and amplify parameter adaptively. Numerical experiments on real SAR images show that there are improvements in both visual effects and objective indexes.
This paper proposes a new second-order continuous-time multi-agent model and analyzes the controllability of second-order multi-agent system with multiple leaders based on the asymmetric *** paper considers the more g...
详细信息
This paper proposes a new second-order continuous-time multi-agent model and analyzes the controllability of second-order multi-agent system with multiple leaders based on the asymmetric *** paper considers the more general case:velocity coupling topology is different from location coupling *** sufficient and necessary conditions are presented for the controllability of the system with multiple *** addition,the paper studies the controllability of the system with velocity damping *** results are given to illustrate the correctness of theoretical results.
Aiming at the problems of my country's current camellia fruit picking mainly relying on manual picking, large labor and low efficiency, the development and promotion of camellia fruit picking equipment and technol...
详细信息
暂无评论