This report presents UniAnimate-DiT, an advanced project that leverages the cutting-edge and powerful capabilities of the open-source Wan2.1 model for consistent human image animation. Specifically, to preserve the ro...
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol *** performance degradation introduced by the heterogeneous and dynamic commun...
详细信息
In networked control systems (NCS),the control performance depends on not only the control algorithm but also the communication protocol *** performance degradation introduced by the heterogeneous and dynamic communication environment has intensified the need for the reconfigurable protocol *** this paper,a novel architecture for the reconfigurable protocol stack is proposed,which is a unified specification of the protocol components and service interfaces supporting both static and dynamic reconfiguration for existing industrial communication *** the architecture,a triple-level self-organization structure is designed to manage the dynamic reconfiguration procedure based on information exchanges inside and outside the protocol ***,the protocol stack can be self-adaptive to various environment and system requirements through the reconfiguration of working mode,routing and scheduling ***,the study on the protocol of dynamic address management is conducted for the system of controller area network (CAN).The results show the efficiency of our self-organizing architecture for the implementation of a reconfigurable protocol stack.
Column Generation (CG) technique is popularly applied in solving the crew scheduling problem of large size, which is generally modeled as an Integer Linear Programming (ILP) problem. The traditional CG algorithms for ...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
With the wide use of power conversion devices - 'nonlinear loads' - many harmonic currents are being injected into the power grid. Shunt Active Power Filters (SAPF) are the power electronic equipment to compen...
详细信息
Transient faults are hard to be detected and located due to their unpredictable nature and short duration, and they are the dominant causations of system failures, which makes it necessary to consider transient fault-...
详细信息
This paper investigates controllability of discrete-time multi-agent systems with multiple leaders on fixed networks. The leaders are particular agents playing a part in external inputs to steer other member agents. T...
详细信息
This paper investigates controllability of discrete-time multi-agent systems with multiple leaders on fixed networks. The leaders are particular agents playing a part in external inputs to steer other member agents. The followers can arrive at any predetermined configuration by regulating the behaviors of the leaders. Some sufficient and necessary conditions are proposed for the controllability of discrete-time multi-agent systems with multiple leaders. Moreover, the case with isolated agents is discussed. Numerical examples and simulations are proposed to illustrate the theoretical results we established.
Membrane computing is an emergent branch of natural computing, which is inspired by the structure and the functioning of living cells, as well as the organization of cells in tissues, organs, and other higher order st...
详细信息
Membrane computing is an emergent branch of natural computing, which is inspired by the structure and the functioning of living cells, as well as the organization of cells in tissues, organs, and other higher order structures. Tissue P systems are a class of the most investigated computing mod- els in the framework of membrane computing, especially in the aspect of efficiency. To generate an exponential resource in a polynomial time, cell separation is incorporated into such systems, thus obtaining so called tissue P systems with cell separation. In this work, we exploit the computational efficiency of this model and construct a uniform family of such tissue P systems for solving the independent set problem, a well-known NP-complete problem, by which an efficient so- lution can be obtained in polynomial time.
An automatic recognition method for steel billet images with different orientations is proposed in this paper. A crucial part of this method is to segment the image firstly, and then use the projection features of the...
详细信息
A new efficient algorithm is developed to design DNA words with equal length for DNA computing. The algorithm uses a global heuristic optimizing search approach and converts constraints to a carry number to accelerate...
详细信息
A new efficient algorithm is developed to design DNA words with equal length for DNA computing. The algorithm uses a global heuristic optimizing search approach and converts constraints to a carry number to accelerate the convergence, which can generate a DNA words set satisfying some thermodynamic and combinatorial constraints. Based on the algorithm, a software for DNA words design is developed.
暂无评论