Recent years have seen a rising interest in distributed optimization problems because of their widespread applications in power grids, multi-robot control, and regression *** the last few decades, many distributed alg...
Recent years have seen a rising interest in distributed optimization problems because of their widespread applications in power grids, multi-robot control, and regression *** the last few decades, many distributed algorithms have been developed for tackling distributed optimization problems. In these algorithms, agents over the network only have access to their own local functions and exchange information with their neighbors.
In this paper, we study the distributed identification problem of dynamic systems described by stochastic regression models with colored noise. To deal with challenges brought by the colored noise, we provide estimate...
详细信息
The semi-tensor product(STP)of matrices is generalized to multidimensional arrays,called the compound product of *** product is first defined for three-dimensional hypermatrices with compatible orders and then extende...
详细信息
The semi-tensor product(STP)of matrices is generalized to multidimensional arrays,called the compound product of *** product is first defined for three-dimensional hypermatrices with compatible orders and then extended to general *** different types of hyperdeterminants are introduced and certain properties are *** Lie groups and Lie algebras corresponding to the hypermatrix products are ***,these results are applied to dynamical systems.
For continuous-time switched linear autonomous systems,this work addresses the stabilization problem under safety-critical *** an origin-symmetric region that any state trajectory should be stayed,we seek to design a ...
详细信息
For continuous-time switched linear autonomous systems,this work addresses the stabilization problem under safety-critical *** an origin-symmetric region that any state trajectory should be stayed,we seek to design a switching law to achieve both stability and *** main approach is to characterize,both theoretically and algorithmically,the safe initial set that any initial state within the set could stay in the given safety region with a properly designed switching ***,we develop a design procedure that could approximate the safe initial set with the help of the pathwise state feedback switching strategy.A third-order example is presented to validate the effectiveness of the proposed methodology.
作者:
Guo, XinxiangMu, YifenYang, XiaoguangUniversity of Chinese Academy of Sciences
The Key Laboratory of Systems and Control Institute of Systems Science Academy of Mathematics and Systems Science Chinese Academy of Sciences School of Mathematical Sciences Beijing100190 China Institute of Systems Science
Academy of Mathematics and Systems Science Chinese Academy of Sciences The Key Laboratory of Systems and Control Beijing100190 China Institute of Systems Science
Academy of Mathematics and Systems Science Chinese Academy of Sciences The Key Laboratory of Management Decision and Information System Beijing100190 China
In this paper, we consider the n × n two-payer zero-sum repeated game in which one player (player X) employs the popular Hedge (also called multiplicative weights update) learning algorithm while the other player...
详细信息
In this paper,we present some properties of scattering data for the derivative nonlinear Schr?dinger equation in Hs(R)(s≥1/2) starting from the Lax *** show that the reciprocal of the transmission coefficient can b...
详细信息
In this paper,we present some properties of scattering data for the derivative nonlinear Schr?dinger equation in Hs(R)(s≥1/2) starting from the Lax *** show that the reciprocal of the transmission coefficient can be expressed as the sum of some iterative integrals,and its logarithm can be written as the sum of some connected iterative *** provide the asymptotic properties of the first few iterative integrals of the reciprocal of the transmission ***,we provide some regularity properties of the reciprocal of the transmission coefficient related to scattering data in Hs(R).
Data privacy is an important issue in controlsystems,especially when datasets contain sensitive information about *** this paper,the authors are concerned with the differentially private distributed parameter estimat...
详细信息
Data privacy is an important issue in controlsystems,especially when datasets contain sensitive information about *** this paper,the authors are concerned with the differentially private distributed parameter estimation problem,that is,we estimate an unknown parameter while protecting the sensitive information of each ***,the authors propose a distributed stochastic approximation estimation algorithm in the form of the differentially private consensus+innovations(DP-CI),and establish the privacy and convergence property of the proposed ***,it is shown that the proposed algorithm asymptotically unbiased converges in mean-square to the unknown parameter while differential privacy-preserving holds for finite number of ***,the exponentially damping step-size and privacy noise for DP-CI algorithm is *** estimate approximately converges to the unknown parameter with an error proportional to the step-size parameter while differential privacy-preserving holds for all *** tradeoff between accuracy and privacy of the algorithm is effectively ***,a simulation example is provided to verify the effectiveness of the proposed algorithm.
For mitigating the libration angle fluctuation of the tethered satellite system,this paper discusses how to make the uniform velocity-deceleration separation scheme achieve the best ***,a judgment condition is establi...
详细信息
For mitigating the libration angle fluctuation of the tethered satellite system,this paper discusses how to make the uniform velocity-deceleration separation scheme achieve the best ***,a judgment condition is established to determine the tether state by comparing the tether length and the relative distance of the sub-satellite and the parent *** on the tethered satellite system dynamics equation and Clohessy-Wiltshire equation,dynamic models are given for four cases of tether ***,the influence of the uniform velocity-deceleration separation scheme on the libration angle is analyzed by taking the libration angle at the separation ending time and the mean absolute value of the libration angle as index ***,the optimality problem of the uniform velocity-deceleration separation scheme is formulated as an optimization problem with constraints,and an approximate solution algorithm is given by combining the back propagation neural network and Newton-Raphson method of multiple initial ***,the effectiveness of the proposed method is verified by a numerical simulation.
The modeling and control of networks over finite lattices are studied via the algebraic state space *** the semi-tensor product of matrices, we obtain the algebraic state space representation(ASSR) of the dynamics of(...
The modeling and control of networks over finite lattices are studied via the algebraic state space *** the semi-tensor product of matrices, we obtain the algebraic state space representation(ASSR) of the dynamics of(control) networks over finite lattices. Basic properties concerning networks over sublattices and product lattices are investigated, which shows the application of the analysis of lattice structure in the model reduction and control design of networks. Then, algorithms are developed to recover the lattice structure from the structure matrix of a network over a lattice, and to construct comparability graphs over a finite set to verify whether a multiple-valued logical network is defined over a lattice. Finally, numerical examples are presented to illustrate the results.
In ASIACCS 2015, Nu nez, et al. proposed a proxy re-encryption scheme, named NTRURe Encrypt, based on NTRU, which allows a proxy to translate ciphertext under the delegator’s public key into a re-encrypted ciphertext...
详细信息
In ASIACCS 2015, Nu nez, et al. proposed a proxy re-encryption scheme, named NTRURe Encrypt, based on NTRU, which allows a proxy to translate ciphertext under the delegator’s public key into a re-encrypted ciphertext that can be decrypted correctly by delegatee’s private key. Because of the potential resistance to quantum algorithm, high efficiency and various applications in real life,NTRURe Encrypt has drawn lots of attention and its security has been widely discussed and *** PQCrypto2019, Liu, et al. proposed two key recovery attacks against it. However, their first attack heavily relies on a weaken decryption oracle, and the second attack needs to collect about 260ciphertexts from the same message by theoretical analysis, which makes both of the attacks unrealistic. In this paper, inspired by the broadcast attack against NTRU, the authors find out that for NTRURe Encrypt the delegator and the delegatee can efficiently recover each other’s private key in polynomial time without any unrealistic assumptions. In addition, the authors also show how to fix NTRURe Encrypt to resist the proposed attacks. As a by-product, the authors also show how to commit broadcast attacks against NTRU 2001 with even dg, which was thought infeasible before.
暂无评论