Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett...
详细信息
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this letter, targeting a more practical case, we aim to detect the oneshot DA, with the purpose of revealing the DA once it is ***, we first formulate an optimization problem to generate one-shot DAs. Then, an unsupervised data-driven approach based on a modified local outlier factor(MLOF) is proposed to detect them.
Dear editor,How to deal with uncertainties and/or disturbances is a central issue pushing the development of both controlscience and controltechnology. Among various approaches, the active disturbance rejection cont...
详细信息
Dear editor,How to deal with uncertainties and/or disturbances is a central issue pushing the development of both controlscience and controltechnology. Among various approaches, the active disturbance rejection control (ADRC) has been successfully implemented in various industrial practices because of its uniqueness in concepts, simplicity
With the development of lunar exploration, the higher resolution lunar maps are described and lunar terrain 3D models are established. The position information of lunar ground control points can be determined from the...
详细信息
ABSTRACTCracks are an important indicator of pavement health, and it is difficult to achieve pixel-level segmentation of small and thin cracks. The existing network often experiences false segmentation and missed segm...
详细信息
ABSTRACTCracks are an important indicator of pavement health, and it is difficult to achieve pixel-level segmentation of small and thin cracks. The existing network often experiences false segmentation and missed segmentation. Accordingly, a novel end-to-end U-Net-like full convolutional crack segmentation network is constructed. First, we propose a multi-layer feature fusion module to aggregate the texture and semantic features at each stage of encoder, so that the network can find smaller and thinner crack. Second, we design a novel residual structure with a pointwise convolution. Each stage of the encoder and decoder incorporates a residual structure to facilitate the fusion of feature maps with different spatial dimensions. It can also prevent the gradient vanish in the network training process. Finally, we utilise the maximum unpooling to restore spatial structure in up-sampling, which exploits the indices of maximum feature value in down-sampling. Therefore, high-frequency information is better preserved to help accurately restore the details of crack edges. To verify the proposed network performance, experiments are carried out on four open datasets, the proposed network can achieve better performance among five classical networks.
In the user selection phrase of the conventional Multiple-input-multiple-output(MIMO) scheduling schemes,the frequent user exchange deteriorates the Quality of user experience(Qo E) of the bursty data *** the channel ...
详细信息
In the user selection phrase of the conventional Multiple-input-multiple-output(MIMO) scheduling schemes,the frequent user exchange deteriorates the Quality of user experience(Qo E) of the bursty data *** the channel vector orthogonalization computation results in a high time *** address these problems,we propose an inertial scheduling policy to reduce the number of noneffective user exchange,and substitute self-organization policy for channel vector orthogonalization computation to reduce computational *** relationship between the scheduling effectiveness and the inertia of objective function is observed in the *** simulation results show that the inertial scheduling policy effectively reduce the number of potential noneffective scheduling which is inversely proportional to the Mean opinion score(MOS)that quantifies the Qo *** proposed scheduling scheme provides significant improvement in Qo E performance in the *** the proposed scheduling scheme does not consider the channel vector orthogonalization in the user selection phrase,its throughput approaches the level of the throughput-oriented scheme because of its selforganization scheduling policy.
Multi-vehicle deployment can be formulated as a cooperation formation problem using the weighted consensus *** objectives are that make adjacent vehicles keep the constant spacing and all vehicles approach the common ...
详细信息
ISBN:
(纸本)9781538629185
Multi-vehicle deployment can be formulated as a cooperation formation problem using the weighted consensus *** objectives are that make adjacent vehicles keep the constant spacing and all vehicles approach the common velocity and ***,it is preferred that vehicle platoon has fast convergence and strong robustness when disturbances *** achieve these goals,the third-order dynamics are established for vehicle platoon that are regarded as connected vehicle systems(CVSs) and distributed control protocols are designed to implement cooperation *** paper focuses on analysis of stability and stability margin for the *** sufficient and necessary conditions on stability of the CVSs are achieved using the algebraic graph theory and the Routh-Hurwitz stability *** the sufficient conditions,which are determined by the controller gains and the model parameter,but are independent on eigenvalues of the Laplacian matrix of the corresponding network topology,are *** characterize convergent speed of CVSs,the conditions on stability margin of CVSs are also *** are shown to verify validation of the results.
A correct diagnostics together with the early prediction of failure or malfunction of the system are the major issues in modern maintenance. Nowadays, the time-honored diagnostics may be inadequate and lead to omittin...
详细信息
This paper studies the synchronization of a finite number of Kuramoto oscillators in a frequency-dependent bidirectional tree network. We assume that the coupling strength of each link in each direction is equal to th...
详细信息
The main contribution of this paper is the design of an event-triggered formation control for leader-following consensus in second-order multi-agent systems(MASs)under communication *** the agents must follow the traj...
详细信息
The main contribution of this paper is the design of an event-triggered formation control for leader-following consensus in second-order multi-agent systems(MASs)under communication *** the agents must follow the trajectories of a virtual leader despite communication faults considered as smooth time-varying delays dependent on the distance between the *** matrix inequalities(LMIs)-based conditions are obtained to synthesize a controller gain that guarantees stability of the synchronization *** on the closed-loop system,an event-triggered mechanism is designed to reduce the control law update and information exchange in order to reduce energy *** proposed approach is implemented in a real platform of a fleet of unmanned aerial vehicles(UAVs)under communication faults.A comparison between a state-of-the-art technique and the proposed technique has been provided,demonstrating the performance improvement brought by the proposed approach.
In this paper,we present a new distributed protocol to achieve the synchronization of time variations and initial times *** protocol combines the design methods of controller and estimator to obtain more precise synch...
详细信息
ISBN:
(纸本)9781509046584
In this paper,we present a new distributed protocol to achieve the synchronization of time variations and initial times *** protocol combines the design methods of controller and estimator to obtain more precise synchronization with higher robustness against noisy inputs mainly generated by crystal oscillators of ***,the control input is ensured bounded while achieving the clock synchronization,which makes our protocol more applicable in *** implementation of the protocol allows sampling in the receiving end to be event-triggered with a specifically designed communication *** simulations are shown to illustrate the performance of the protocol.
暂无评论