Under the condition of large inertia load,the stability of the servo system is more sensitive to the response speed and more likely to produce overshoot *** order to realize the requirements of high-precision and fast...
详细信息
Under the condition of large inertia load,the stability of the servo system is more sensitive to the response speed and more likely to produce overshoot *** order to realize the requirements of high-precision and fast-response control of permanent magnet synchronous motor(PMSM)under large inertia load,an improved feedforward control strategy based on position impulse compensation and PD iterative algorithm is proposed to improve the response speed of the PMSM servo system and reduce the overshoot *** paper analyzes the mathematical models of the speed servo system and position servo system of the PMSM,calculates position overshoot impulse of the PMSM servo system,and improves the traditional feedforward control strategy to reversely compensate when the position is about to ***,in order to further reduce the position overshoot,the PD iterative control algorithm is superimposed without increasing the complexity of the *** input signal is continuously corrected through multiple runs to achieve a smoother response *** effectiveness of the proposed feedforward control strategy is verified by simulation and experiment.
The integration of distributed generations(DG),such as wind turbines and photovoltaics,has a significant impact on the security,stability,and economy of the distribution network due to the randomness and fluctuations ...
详细信息
The integration of distributed generations(DG),such as wind turbines and photovoltaics,has a significant impact on the security,stability,and economy of the distribution network due to the randomness and fluctuations of DG *** distribution network reconfiguration(DNR)technology has the potential to mitigate this problem ***,due to the non-convex and nonlinear characteristics of the DNR model,traditional mathematical optimization algorithms face speed challenges,and heuristic algorithms struggle with both speed and *** problems hinder the effective control of existing distribution *** address these challenges,an active distribution network dynamic reconfiguration approach based on an improved multi-agent deep deterministic policy gradient(MADDPG)is ***,taking into account the uncertainties of load and DG,a dynamic DNR stochastic mathematical model is ***,the concept of fundamental loops(FLs)is defined and the coding method based on loop-coding is adopted for MADDPG action ***,the agents with actor and critic networks are equipped in each FL to real-time control network ***,a MADDPG framework for dynamic DNR is ***,simulations are conducted on an improved IEEE 33-bus power system to validate the superiority of *** results demonstrate that MADDPG has a shorter calculation time than the heuristic algorithm and mathematical optimization algorithm,which is useful for real-time control of DNR.
In this paper, we explore a distributed online convex optimization problem over a time-varying multi-agent network. The network aims to minimize a global loss function through local computation and communication with ...
详细信息
In this paper, we explore a distributed online convex optimization problem over a time-varying multi-agent network. The network aims to minimize a global loss function through local computation and communication with neighboring agents. To effectively handle the optimization problem which involves highdimensional and structural constraint sets, we develop a distributed online multiple Frank-Wolfe algorithm that circumvents the expensive computational cost associated with projection operations. The dynamic regret bounds are established as O(T1-γ+ HT) with the linear oracle number O(T1+γ), which depends on the horizon(total iteration number) T, the function variation HT, and the tuning parameter 0 < γ < *** particular, when the prior knowledge of HTand T is available, the bound can be enhanced to O(1 +HT). Moreover, we explore the significant advantages provided by the multiple iteration technique and reveal a trade-off between dynamic regret bound, computational cost, and communication cost. Finally,the performance of our algorithm is validated and compared through the distributed online ridge regression problems with two constraint sets.
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre...
详细信息
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability *** security architectures mainly use information security technology,which cannot meet the active security protection requirements of *** order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of *** adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and *** adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.
This paper presents a comprehensive framework for analyzing phase transitions in collective models such as theVicsek model under various noise types. The Vicsek model, focusing on understanding the collective behavior...
详细信息
This paper presents a comprehensive framework for analyzing phase transitions in collective models such as theVicsek model under various noise types. The Vicsek model, focusing on understanding the collective behaviors of socialanimals, is known due to its discontinuous phase transitions under vector noise. However, its behavior under scalar noiseremains less conclusive. Renowned for its efficacy in the analysis of complex systems under both equilibrium and nonequilibriumstates, the eigen microstate method is employed here for a quantitative examination of the phase transitions inthe Vicsek model under both vector and scalar noises. The study finds that the Vicsek model exhibits discontinuous phasetransitions regardless of noise type. Furthermore, the dichotomy method is utilized to identify the critical points for thesephase transitions. A significant finding is the observed increase in the critical point for discontinuous phase transitions withescalation of population density.
This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance ru...
详细信息
This work presents an adaptive tracking guidance method for robotic fishes. The scheme enables robots to suppress external interference and eliminate motion jitter. An adaptive integral surge line-of-sight guidance rule is designed to eliminate dynamics interference and sideslip issues. Limited-time yaw and surge speed observers are reported to fit disturbance variables in the model. The approximation values can compensate for the system's control input and improve the robots' tracking ***, this work develops a terminal sliding mode controller and third-order differential processor to determine the rotational torque and reduce the robots' run jitter. Then, Lyapunov's theory proves the uniform ultimate boundedness of the proposed method. Simulation and physical experiments confirm that the technology improves the tracking error convergence speed and stability of robotic fishes.
Direct current(DC) microgrid consists of many parallel power converters that share load currents through the inductance of DC/DC converters. Usually, the inductance parameters are dependent on the physical implementat...
详细信息
Direct current(DC) microgrid consists of many parallel power converters that share load currents through the inductance of DC/DC converters. Usually, the inductance parameters are dependent on the physical implementation of the system, and their values may not match their nameplates. Such disparities could lead to unequal response characteristics of the system, which can potentially reduce the performances of the DC microgrid operation. This paper proposes a robust control strategy for inductive parametric uncertainties of DC/DC converters using an optimal control method with integral action. To achieve such a goal, the system model parameters with nominal values are transformed into parametric unmatched uncertainties to form a robust control problem, which is then transformed into a linear quadratic regulator problem. The inductance uncertainties are stabilized with the uncertainty dynamic algebraic Riccati equation(UDARE) using state feedback gain under linear quadratic regulator. The closed-loop control with integral action is adopted to achieve a steady-state error of zero on the DC-link voltage at any uncertainty of the inductive parameter, which subsequently ensures the equal load current sharing. Off-line simulations and real-time validations based on OpalRT have been conducted to demonstrate the effectiveness and robustness of the proposed robust control strategy.
Large models have recently played a dominant role in natural language processing and multimodal vision-language learning. However, their effectiveness in text-related visual tasks remains relatively unexplored. In thi...
详细信息
Large models have recently played a dominant role in natural language processing and multimodal vision-language learning. However, their effectiveness in text-related visual tasks remains relatively unexplored. In this paper, we conducted a comprehensive evaluation of large multimodal models, such as GPT4V and Gemini, in various text-related visual tasks including text recognition, scene text-centric visual question answering(VQA), document-oriented VQA, key information extraction(KIE), and handwritten mathematical expression recognition(HMER). To facilitate the assessment of optical character recognition(OCR) capabilities in large multimodal models, we propose OCRBench, a comprehensive evaluation benchmark. OCRBench contains 29 datasets, making it the most comprehensive OCR evaluation benchmark available. Furthermore, our study reveals both the strengths and weaknesses of these models, particularly in handling multilingual text, handwritten text, non-semantic text, and mathematical expression *** importantly, the baseline results presented in this study could provide a foundational framework for the conception and assessment of innovative strategies targeted at enhancing zero-shot multimodal *** evaluation pipeline and benchmark are available at https://***/Yuliang-Liu/Multimodal OCR.
This study investigates the controllability of a general heterogeneous networked sampled-data system(HNSS) consisting of nonidentical node systems, where the inner coupling between any pair of nodes can be described b...
详细信息
This study investigates the controllability of a general heterogeneous networked sampled-data system(HNSS) consisting of nonidentical node systems, where the inner coupling between any pair of nodes can be described by a unique *** signals on control and transmission channels are sampled and held by zero-order holders, and the control sampling period of each node can be different. Necessary and sufficient controllability conditions are developed for the general HNSS, using the Smith normal form and matrix equations, respectively. The HNSS in specific topology or dynamic settings is discussed subsequently with easier-to-verify conditions derived. These heterogeneous factors have been determined to independently or jointly affect the controllability of networked sampled-data systems. Notably, heterogeneous sampling periods have the potential to enhance the overall controllability, but not for systems with some special dynamics. When the node dynamics are heterogeneous,the overall system can be controllable even if it is topologically uncontrollable. In addition, in several typical heterogeneous sampled-data multi-agent systems, pathological sampling of single-node systems will necessarily cause overall uncontrollability.
The two-dimensional Logistic memristive hyperchaotic map(2D-LMHM)and the secure hash SHA-512 are the foundations of the unique remote sensing image encryption algorithm(RS-IEA)suggested in this *** proposed map is for...
详细信息
The two-dimensional Logistic memristive hyperchaotic map(2D-LMHM)and the secure hash SHA-512 are the foundations of the unique remote sensing image encryption algorithm(RS-IEA)suggested in this *** proposed map is formed from the improved Logistic map and the memristor,which has wide phase space and hyperchaotic range and is exceptionally excellent to be utilized in specific *** proposed image algorithm uses the permutation-assignment-diffusion *** generates two position matrices in a progressive manner to achieve an efficient random exchange of pixel positions,assignment is carried through on the image pixels of the permutated image to entirely remove the original image information,strengthening the relationship between permutation and diffusion,and loop diffusion in two different directions can use subtle changes of pixels to affect the whole *** random key and plain-image SHA-512 hash values are used to produce an additional key,which is then utilized to figure out the permutation parameters and the initial value of a chaotic *** experimental results with the average NPCR=99.6094%(NPCR:number of pixels change rate),average UACI=33.4638%(UACI:unified average changing intensity),100%pass rate of the targets in the test set,the average correlation coefficient is 0.00075,and the local information entropy is 7.9025,which shows that the algorithm is able to defend against a variety of illegal attacks and provide more trustworthy protection than some of the existing state-of-the-art algorithms.
暂无评论