We consider decision making problems for player interaction model in two-level organization system. We state center request consensus problem and system response in a common case of linear dependencies. We formulate b...
详细信息
Autonomous navigation of a mobile robot is a challenging task which requires ability of mapping, localization, path planning and path following. Conventional mapping methods build a dense metric map like an occupancy ...
详细信息
Decision making problems in two-level organization player interaction model are considered. Global and Russian experience in interstate economical and ecological interactions and balance relations system formation are...
详细信息
Models that are prioritized in the actions of the center can be used to analyze control schemes. The interests of active subsystems should be considered in management. Tasks of resource allocation are carried out by t...
详细信息
The Algebraic Multigrid Methods (AMG) on multiple Graphics Processing Units (GPUs) and their application to elliptic and saddle-point problems are considered in the paper. The main goal is to compare different impleme...
详细信息
In this paper, an enhanced adaptive nonlinear extended state observer (EANESO) for single-input single-output pure feedback systems in the presence of external time-varying disturbances is proposed. In this paper, a n...
详细信息
In this paper, an enhanced adaptive nonlinear extended state observer (EANESO) for single-input single-output pure feedback systems in the presence of external time-varying disturbances is proposed. In this paper, a nonlinear system with matched and mismatched disturbances is considered. The conventional extended state observer (ESO) can only be applied to systems that are in the form of integral chains. Moreover, this method has limitations in the face of mismatched disturbances. In the presence of time-varying disturbances, the traditional ESOs cannot estimate the disturbances accurately. To overcome this limitation, an EANESO is proposed in this paper. The main idea is to design the nonlinear ESO (NESO) to estimate the states of the system and multiple disturbances simultaneously. The observer gains are considered time-varying and adjusted with adaptation laws to improve the estimation accuracy and overcome the peaking phenomenon. Next, the proposed controller is designed based on output feedback to eliminate the effects of multiple disturbances and stabilize the closed-loop system. Subsequently, the stability analysis of the closed-loop system and convergence of the observer error are discussed. Finally, the proposed method is applied to the inverted pendulum system. The simulated results show good performance of the proposed method as compared with a recently published scheme in the related literature.
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Probabilistic predicting of the risks of system integrity violation for a given period is important for any networking system. Risks are depending on the expected uncertainties conditions concerning threats to each **...
详细信息
Symbolic regression methods are becoming increasingly popular and they are a worthy competitor to neural networks in many tasks. However, symbolic regression methods have the greatest promise in those problems where t...
详细信息
Dust particles emitted from smelters can be hazardous to ecosystems and humans,as they are often enriched in metallic ***,we combined multi-method mineralogical analysis with a sophisticated size sorting approach for ...
详细信息
Dust particles emitted from smelters can be hazardous to ecosystems and humans,as they are often enriched in metallic ***,we combined multi-method mineralogical analysis with a sophisticated size sorting approach for copper smelting dust to study the nanosize-effect on heavy metal distribution,which has hitherto been *** types of dust were collected from a copper flash smelter and then size-sorted using a Dekati low-pressure *** showed that all three samples could easily sort out nanoscale dust particles(<1μm,grades 10–2)and even those smaller than 100 nm(grades 5–2).Especially for electrostatic precipitators dust,the mass fraction of nanoscale dust(<1μm)could reach 10.71%.The presence of heavy metals(Pb,Zn,Cu,and As)and their mineral species in dust was examined at various particle *** was discovered that different heavy metals are enriched on nanoparticles in specific *** micron-sized particles,heavy metals are generally found in discrete phases(e.g.,CuSO_(4),PbSO_(4),and As_(2)O_(3)).In nanoscale particles,the dominant phase is Fe_(3)O_(4),while heavy metals are mostly found in lattice substitution(e.g.,CuFe_(2)O_(4)and ZnFe_(2)O_(4)).Two distinct nano-dust morphologies were found:One with irregular mesh or chain structures consisting of particles of a few nanometers,and the other with polygonal crystals in larger sizes of hundreds of *** enrichment of heavy metals in the latter morphology is more pronounced,possibly because lattice substitution of heavy metals is more likely to occur when polycrystalline particles are formed.
暂无评论