作者:
Shang, JunZhang, HanwenZhou, JingChen, TongwenTongji University
Shanghai Research Institute for Intelligent Autonomous Systems National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Department of Control Science and Engineering Shanghai200092 China University of Science and Technology Beijing
Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education School of Automation and Electrical Engineering Beijing100083 China University of Alberta
Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada
This study addresses linear attacks on remote state estimation within the context of a constrained alarm rate. Smart sensors, which are equipped with local Kalman filters, transmit innovations instead of raw measureme...
This study addresses linear attacks on remote state estimation within the context of a constrained alarm rate. Smart sensors, which are equipped with local Kalman filters, transmit innovations instead of raw measureme...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
This study addresses linear attacks on remote state estimation within the context of a constrained alarm rate. Smart sensors, which are equipped with local Kalman filters, transmit innovations instead of raw measurements through a wireless communication network. This transmission is vulnerable to malicious data interception and manipulation by attackers. The aim of this research is to identify the optimal attack strategy that degrades the system performance while adhering to stealthiness constraints. A notable innovation of this paper is the direct association of the attack’s stealthiness with the alarm rate, diverging from traditional approaches that rely on the covariance of the innovation or the Kullback–Leibler divergence, which are conventional metrics that have been extensively explored in previous studies. Our findings reveal that the optimal attack strategy exhibits some structural characteristics in systems of low dimensions. The performance of the proposed attack strategy is demonstrated through numerical examples.
In this study, operational strategies are investigated for an air-based photovoltaic-thermal (PV-T) system integrated with a domestic air-to-water heat pump. The PV-T system is used to simultaneously generate electric...
详细信息
ISBN:
(数字)9798350375923
ISBN:
(纸本)9798350375930
In this study, operational strategies are investigated for an air-based photovoltaic-thermal (PV-T) system integrated with a domestic air-to-water heat pump. The PV-T system is used to simultaneously generate electricity and heat ambient air, which serves as the heat source for the heat pump. By utilising a variable-speed fan to regulate airflow, the PV-T system outlet temperature is adjusted, and the focus is on how different outlet temperatures impact the PVT system electrical and thermal efficiency, heat pump performance, and overall electricity requirements for heating. The performance of the integrated system is assessed for a case study of a household application in north Italy. The optimal PV-T outlet temperature is found to be between 30 – 35 °C, resulting in only 5% less electricity production than an equivalent PV system with equal nominal electricity capacity, while reducing overall electricity required for heating by over 15% compared to PV-integrated heat pumps.
The use of therapeutic peptides for the treatment of cancer has received tremendous attention in recent years. Anticancer peptides (ACPs) are considered new anticancer drugs which have several advantages over chemistr...
详细信息
This paper illustrates three agent technologies deployed in the Unmanned Aerial Vehicle (UAV) target tracking domain. These capabilities enable: (1) coordination of the tracking of multiple targets among a set of UAVs...
详细信息
Autonomy is a very complex concept. This discussion develops a definition for one dimension of autonomy: decision-making control. The development of this definition draws salient features from previous work. Each stag...
ISBN:
(纸本)3540424229
Autonomy is a very complex concept. This discussion develops a definition for one dimension of autonomy: decision-making control. The development of this definition draws salient features from previous work. Each stage in the development of this definition is highlighted by bold text.
Presents a method for the 3D visualization of the structure of radial basis function networks. This method allows the visualization of basis function characteristics (centers and widths) along with second level weight...
详细信息
Presents a method for the 3D visualization of the structure of radial basis function networks. This method allows the visualization of basis function characteristics (centers and widths) along with second level weights. Network properties can be displayed simultaneously with the training data or test data in the same input space. Principal component analysis is used to transform the input data so that its most salient dimensions can be visualized. This method also allows changes made while graphically editing the network structure, in transformed space, to be projected back into the original input space.
The use of multi-agent systems to model and control complex domains is increasing. The application of multi-agent systems to distributed real-world domains motivates the development of domain independent agent archite...
详细信息
暂无评论