For hybrid closed-loop systems arising from hybrid control of nonlinear systems, we show that the sample-and-hold implementation of the hybrid controller preserves (semiglobally and practically) the stability properti...
详细信息
ISBN:
(纸本)1424401704;9781424401703
For hybrid closed-loop systems arising from hybrid control of nonlinear systems, we show that the sample-and-hold implementation of the hybrid controller preserves (semiglobally and practically) the stability properties of the closed-loop system. We provide a general model for the hybrid closed-loop system where the hybrid controller is implemented digitally and it is interfaced to the nonlinear system through sample and hold devices. We model the sample device and the digital controller/hold device as single asynchronous hybrid systems with independent timing constants and data. The main result is established by means of a Lyapunov function for the hybrid closed-loop system resulting from the interconnection of its hybrid and nonlinear subsystems
To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys—signals of different intensities—has recently been proposed. Here, we present th...
详细信息
To increase dramatically the distance and the secure key generation rate of quantum key distribution (QKD), the idea of quantum decoys—signals of different intensities—has recently been proposed. Here, we present the first experimental implementation of decoy state QKD. By making simple modifications to a commercial quantum key distribution system, we show that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber. We also show that with the same experimental parameters, not even a single bit of secure key can be extracted with a non-decoy-state protocol. Compared to building single photon sources, decoy state QKD is a much simpler method for increasing the distance and key generation rate of unconditionally secure QKD.
In this paper we study learning in cooperative object pushing systems. The proposed approach is based on the idea of learning individual skills and then mapping the required cooperative behaviors on the learned skills...
详细信息
In this paper we study learning in cooperative object pushing systems. The proposed approach is based on the idea of learning individual skills and then mapping the required cooperative behaviors on the learned skills. The control point for each individual robot is chosen so as to simplify the design of the reinforcement signal and reduce the role of delayed reward on individual learning in addition to make cooperative protocol simpler. A fuzzy Q-learning system for learning individual object pushing is proposed, together with a method for coordination among the robots to push the object cooperatively. The coordination method takes into account the dynamics of the object and the learned individual skills. The idea of the coordination protocol is based on the notion of ability and active regions defined in this paper. In effect, the cooperation protocol is mapped to a Q-value based policy. Simulation results supportively show that the robots learn individual and cooperative object pushing efficiently
In this paper, we prove that the unconditionally secure key can be surprisingly extracted from multiphoton emission part in the photon polarization-based quantum key distribution. One example is shown by explicitly pr...
详细信息
In this paper, we prove that the unconditionally secure key can be surprisingly extracted from multiphoton emission part in the photon polarization-based quantum key distribution. One example is shown by explicitly proving that one can indeed generate an unconditionally secure key from Alice’s two-photon emission part proposed by Scarani [ et al. Phys. Rev. Lett. 92, 057901 (2004)]. Which is called the Scarani-Acin-Ribordy-Gisin (SARG04) protocol. This protocol uses the same four states as in Bennett-Brassard 1984 (BB84) and differs only in the classical postprocessing protocol. It is, thus, interesting to see how the classical postprocessing of quantum key distribution might qualitatively change its security. We also show that one can generate an unconditionally secure key from the single to the four-photon part in a generalized SARG04 protocol that uses six states. Finally, we also compare the bit error rate threshold of these protocols with the one in the BB84 protocol and the original six-state protocol assuming a depolarizing channel.
In this paper we discuss a learning approach to distributed object pushing. In the proposed approach, first the required individual skills for single-robot object pushing are learned using a fuzzy reinforcement learni...
详细信息
In this paper we discuss a learning approach to distributed object pushing. In the proposed approach, first the required individual skills for single-robot object pushing are learned using a fuzzy reinforcement learning method. Then, the robots learn how to coordinate their actions to push the object to the desired configuration cooperatively in a distributed manner. The proposed team-level learning benefits from the knowledge, which is in the form of a Q-table, that the agent has gained in its individual learning phase by a special design of reward signal and state-action representation. Each robot learns a threshold on its Q-value using a single state reinforcement learning method and pushes the object when the Q-value of its best action in the current state is above this threshold. The reward signal is designed based on the robots' Q-tables and no external critic is needed for learning cooperation. Simulation results show that the robots learn their individual skills and a cooperation protocol to push the object cooperatively
In this paper a new adaptive under frequency load shedding algorithm is designed. The purpose of this method is to enhance the adaptability of under frequency relays and increase the security of power system during la...
详细信息
ISBN:
(纸本)0780395255
In this paper a new adaptive under frequency load shedding algorithm is designed. The purpose of this method is to enhance the adaptability of under frequency relays and increase the security of power system during large disturbances. A suitable method to design the proposed adaptive under frequency load shedding scheme is described in detail. After completing the design, it is tested on a real power system by modeling the network in a power system studies software. Simulation results indicate that the proposed method has an improved performance for large disturbances while its response is similar to the conventional scheme for small disturbances
An anti-windup controller modification is implemented in control system design for a model of the longitudinal dynamics of an air-breathing hypersonic vehicle. Anti-windup control allows the input constraints to be co...
详细信息
An aircraft model that incorporates independently adjustable engine throttles and ailerons is employed to develop an adaptive control scheme in the presence of actuator failures. This model captures the key features o...
详细信息
An aircraft model that incorporates independently adjustable engine throttles and ailerons is employed to develop an adaptive control scheme in the presence of actuator failures. This model captures the key features of aircraft flight dynamics when in the engine differential mode. Based on this model an adaptive feedback control scheme for asymptotic state tracking is developed and applied to a transport aircraft model in the presence of two types of failures during operation, rudder failure and aileron failure. Simulation results are presented to demonstrate the adaptive failure compensation scheme
Standard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The thre...
详细信息
Standard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states ∣0z⟩ and ∣1z⟩ can contribute to key generation, and the third state ∣+⟩=(∣0z⟩+∣1z⟩)∕2 is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that these QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result in the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the Bennett-Brassard 1984 (BB84) protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol, while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.
This paper is concerned with autonomous and semiautonomous landing of aircraft. This survey presents an overview of systems and techniques that can be used for this purpose, with an emphasis on computer vision systems...
详细信息
ISBN:
(纸本)1563478072
This paper is concerned with autonomous and semiautonomous landing of aircraft. This survey presents an overview of systems and techniques that can be used for this purpose, with an emphasis on computer vision systems that are appropriate for use with General Aviation (GA) class aircraft. If the runway can be located in digital images, using one or more cameras mounted on the aircraft, then this information can be used to estimate the relative position, orientation, and velocity of the aircraft. These estimates, in turn, can be used by a flight-control system to guide landing operations. Although many techniques have been developed for the analysis of high-altitude imagery, relatively few researchers have considered image analysis as an aid to aircraft landing. In one system, image intensity edges are used to detect the sides of a runway in a monocular image sequence, and these are used to estimate the 3-dimensional position and orientation of the runway. In another system, the analysis of optical flow is used to search for obstacles on a runway during an approach. Ultimately, high-speed image analysis will provide an important new source of information for use in automatic aircraft control.
暂无评论