As well-known, model predictive control is closely related to optimal control. This paper studies relationships between them and provides a unified framework for optimality analysis of model predictive controllers (MP...
详细信息
As well-known, model predictive control is closely related to optimal control. This paper studies relationships between them and provides a unified framework for optimality analysis of model predictive controllers (MPC). The optimality is evaluated by comparing total performance of MPC with finite and infinite horizon optimal cost. Based on relaxed value iteration method, upper and lower bounds of optimality evaluation functions are expressed explicitly in terms of optimization horizon. These results reveal detailed characteristics on performance of closed-loop MPC systems due to using “receding horizon optimization” implementation style.
This article was originally published online on 26 August 2015 with the space missing in the name of the sixth author. The name is correct as it appears above.
This article was originally published online on 26 August 2015 with the space missing in the name of the sixth author. The name is correct as it appears above.
User request trace-oriented monitoring is an effective method to improve the reliability of cloud systems. However, there are some difficulties in getting traces in practice, which hinder the development of trace-orie...
详细信息
User request trace-oriented monitoring is an effective method to improve the reliability of cloud systems. However, there are some difficulties in getting traces in practice, which hinder the development of trace-oriented monitoring research. In this paper, we release a fine-grained user request-centric open trace data set, called Trace Bench, collected on a real world cloud storage system deployed in a real environment. During collecting, many aspects are considered to simulate different scenarios, including cluster size, request type, workload speed, etc. Besides recording the traces when the monitored system is running normally, we also collect the traces under the situation with faults injected. With a mature injection tool, 14 faults are introduced, including function faults and performance faults. The traces in Trace Bench are clustered in different files, where each file corresponds to a certain scenario. The whole collection work lasted for more than half a year, resulting in more than 360, 000 traces in 361 files. In addition, we also employ several applications based on Trace Bench, which validate the helpfulness of Trace Bench for the field of trace-oriented monitoring.
Non-negative matrix factorization (NMF) is an efficient dimension reduction method and plays an important role in many pattern recognition and computer vision tasks. However, conventional NMF methods are not robust si...
详细信息
Non-negative matrix factorization (NMF) is an efficient dimension reduction method and plays an important role in many pattern recognition and computer vision tasks. However, conventional NMF methods are not robust since the objective functions are sensitive to outliers and do not consider the geometric structure in datasets. In this paper, we proposed a correntropy graph regularized NMF (CGNMF) to overcome the aforementioned problems. CGNMF maximizes the correntropy between data matrix and its reconstruction to filter out the noises of large magnitudes, and expects the coefficients to preserve the intrinsic geometric structure of data. We also proposed a modified version of our CGNMF which construct the adjacent graph by using sparse representation to enhance its reliability. Experimental results on popular image datasets confirm the effectiveness of CGNMF.
With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a u...
详细信息
ISBN:
(纸本)9781479947249
With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a user expects to report his own location as far as possible away from his real location to protect his location privacy. On the other hand, in order to obtain high quality of service(QoS), users are required to report their locations as accurate as possible. To achieve the dedicated tradeoff between privacy requirement and QoS requirement, we propose a novel approach based on cloaking technique. We also discuss the disadvantage of the traditional general system model and propose an improved model. The basic idea of our approach is to select a sub-area from the generated cloaking area as user's reported location. The sub-area may not contain a user's real location,which prevents an adversary from performing attack with side information. Specifically, by defining an objective function with a novel location privacy metric and a QoS metric, we are able to convert the privacy issue to an optimization problem. Then, location privacy metric and QoS metric are given. To reduce the complexity of the optimization, a heuristic algorithm is *** privacy-preserving analysis and comparison with related work [8], we demonstrate the effectiveness and efficiency of our approach.
For the spatially correlated multiuser MIMO-OFDM channels, the conventional iterative MMSE-SIC detection suffers from a considerable performance loss. In this paper, we use the factor graph framework to design robust ...
详细信息
For the spatially correlated multiuser MIMO-OFDM channels, the conventional iterative MMSE-SIC detection suffers from a considerable performance loss. In this paper, we use the factor graph framework to design robust detection algorithms by clustering a group of symbols to combat the spatial correlation and using the principle of expectation propagation to improve message passing. Furthermore, as the complexity of detection becomes one of the issues in the design of large-scale multiuser MIMO-OFDM systems, we propose a low-complexity approximate message-passing algorithm by opening the channel transition node, which eliminates the expensive matrix inversions involved in the MMSE-SIC based algorithms. Finally, numerical results are presented to verify the proposed algorithms.
This paper introduces the use of two new features for speaker identification, Residual Phase Cepstrum Coefficients (RPCC) and Glottal Flow Cepstrum Coefficients (GLFCC), to capture speaker-specific characteristics fro...
详细信息
作者:
Xin CaiShaoyuan LiNing LiKang LiDepartment of Automation
Shanghai Jiao Tong University and Key Laboratory of System Control and Information Processing Ministry of Education Shanghai 200240 P. R. China School of Electronics
Electrical Engineering and Computer Science The Queen's University Belfast Belfast BT7 1NN UK
This paper addresses the problem of infinite time performance of model predictive controllers applied to constrained nonlinear systems. The total performance is compared with a finite horizon optimal cost to reveal pe...
详细信息
This paper addresses the problem of infinite time performance of model predictive controllers applied to constrained nonlinear systems. The total performance is compared with a finite horizon optimal cost to reveal performance limits of closed-loop model predictive control systems. Based on the Principle of Optimality, an upper and a lower bound of the ratio between the total performance and the finite horizon optimal cost are obtained explicitly expressed by the optimization horizon. The results also illustrate, from viewpoint of performance, how model predictive controllers approaches to infinite optimal controllers as the optimization horizon increases.
In this letter, we introduce a novel noise-robust modification method for Gaussian-based models to enhance the performance of radar high-resolution range profile (HRRP) recognition under the test condition of low sign...
详细信息
In controlling biological diseases, it is often more potent to use a combination of agents than using individual ones. However, the number of possible combinations increases exponentially with the number of agents and...
详细信息
In controlling biological diseases, it is often more potent to use a combination of agents than using individual ones. However, the number of possible combinations increases exponentially with the number of agents and their concentrations. It is prohibitive to search for effective agent combinations by trial and error as biological systems are complex and their responses to agents are often a slow process. This motivates to build a suitable model to describe the biological systems and help reduce the number of experiments. In this paper, we consider the use of fungicides to inhibit Bipolarismaydis and construct models that describe the responses to fungicide combinations. Three data-driven modeling methods, the polynomial regression, the artificial neural network and the support vector regression, are compared based on the experimental data of the inhibition rates of the southern corn leaf blight with different fungicide combinations. The analysis of the results demonstrates that the support vector regression is best suited to the construction of the response model in terms of achieving better prediction with fewer experiments.
暂无评论