This paper proposes an event-triggered stochastic model predictive control for discrete-time linear time-invariant(LTI) systems under additive stochastic disturbances. It first constructs a probabilistic invariant set...
详细信息
This paper proposes an event-triggered stochastic model predictive control for discrete-time linear time-invariant(LTI) systems under additive stochastic disturbances. It first constructs a probabilistic invariant set and a probabilistic reachable set based on the priori knowledge of system *** with enhanced robust tubes, the chance constraints are then formulated into a deterministic form. To alleviate the online computational burden, a novel event-triggered stochastic model predictive control is developed, where the triggering condition is designed based on the past and future optimal trajectory tracking errors in order to achieve a good trade-off between system resource utilization and control performance. Two triggering parameters σ and γ are used to adjust the frequency of solving the optimization problem. The probabilistic feasibility and stability of the system under the event-triggered mechanism are also examined. Finally, numerical studies on the control of a heating, ventilation, and air conditioning(HVAC) system confirm the efficacy of the proposed control.
Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource *** traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenge...
详细信息
Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource *** traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and *** address these issues,this study proposes a novel two-part invalid detection task allocation *** the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous *** to the baseline method,the model achieves an approximately 4%increase in the F1 value on the public *** the second step of the framework,task allocation modeling is performed using a twopart graph matching *** phase introduces a P-queue KM algorithm that implements a more efficient optimization *** allocation efficiency is improved by approximately 23.83%compared to the baseline *** results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation.
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image ***,there has been limited research on combining deep learning neural networks with chaotic mappi...
详细信息
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image ***,there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital ***,this paper addresses this gap by studying the generation of pseudo-random sequences(PRS)chaotic signals using dual logistic chaotic *** signals are then predicted using long and short-term memory(LSTM)networks,resulting in the reconstruction of a new chaotic *** the research process,it was discovered that there are numerous training parameters associated with the LSTM network,which can hinder training *** overcome this challenge and improve training efficiency,the paper proposes an improved particle swarm optimization(IPSO)algorithm to optimize the LSTM ***,the obtained chaotic signal from the optimized model training is further scrambled,obfuscated,and diffused to achieve the final encrypted *** research presents a digital image encryption(DIE)algorithm based on a double chaotic map(DCM)and *** algorithm demonstrates a high average NPCR(Number of Pixel Change Rate)of 99.56%and a UACI(Unified Average Changing Intensity)value of 33.46%,indicating a strong ability to resist differential ***,the proposed algorithm realizes secure and sensitive digital image encryption,ensuring the protection of personal information in the Internet environment.
Traffic flow prediction plays a key role in the construction of intelligent transportation ***,due to its complex spatio-temporal dependence and its uncertainty,the research becomes very *** of the existing studies ar...
详细信息
Traffic flow prediction plays a key role in the construction of intelligent transportation ***,due to its complex spatio-temporal dependence and its uncertainty,the research becomes very *** of the existing studies are based on graph neural networks that model traffic flow graphs and try to use fixed graph structure to deal with the relationship between ***,due to the time-varying spatial correlation of the traffic network,there is no fixed node relationship,and these methods cannot effectively integrate the temporal and spatial *** paper proposes a novel temporal-spatial dynamic graph convolutional network(TSADGCN).The dynamic time warping algorithm(DTW)is introduced to calculate the similarity of traffic flow sequence among network nodes in the time dimension,and the spatiotemporal graph of traffic flow is constructed to capture the spatiotemporal characteristics and dependencies of traffic *** combining graph attention network and time attention network,a spatiotemporal convolution block is constructed to capture spatiotemporal characteristics of traffic *** on open data sets PEMSD4 and PEMSD8 show that TSADGCN has higher prediction accuracy than well-known traffic flow prediction algorithms.
This paper considers the value iteration algorithms of stochastic zero-sum linear quadratic games with unkown ***-policy and off-policy learning algorithms are developed to solve the stochastic zero-sum games,where th...
详细信息
This paper considers the value iteration algorithms of stochastic zero-sum linear quadratic games with unkown ***-policy and off-policy learning algorithms are developed to solve the stochastic zero-sum games,where the system dynamics is not *** analyzing the value function iterations,the convergence of the model-based algorithm is *** equivalence of several types of value iteration algorithms is *** effectiveness of model-free algorithms is demonstrated by a numerical example.
Because of their advantages of high energy and power density,low self-discharge rate,and long lifespan,lithium-ion batteries(LIBs)have been widely used in many applications such as electric vehicles,energy storage sys...
详细信息
Because of their advantages of high energy and power density,low self-discharge rate,and long lifespan,lithium-ion batteries(LIBs)have been widely used in many applications such as electric vehicles,energy storage systems,smart grids,***,lithium-ion battery systems(LIBSs)frequently malfunction because of complex working conditions,harsh operating environment,battery inconsistency,and inherent defects in battery ***,safety of LIBSs has become a prominent problem and has attracted wide ***,efficient and accurate fault diagnosis for LIBs is very *** paper provides a comprehensive review of the latest research progress in fault diagnosis for ***,the types of battery faults are comprehensively introduced and the characteristics of each fault are ***,the fault diagnosis methods are systematically elaborated,including model-based,data processing-based,machine learning-based and knowledge-based *** latest research is discussed and existing issues and challenges are presented,while future developments are also *** aim is to promote further researches into efficient and advanced fault diagnosis methods for more reliable and safer LIBs.
Gesture recognition has diverse application prospects in the field of human-computer ***,gesture recognition devices based on strain sensors have achieved remarkable results,among which liquid metal materials have con...
详细信息
Gesture recognition has diverse application prospects in the field of human-computer ***,gesture recognition devices based on strain sensors have achieved remarkable results,among which liquid metal materials have considerable advantages due to their high tensile strength and *** improve the detection sensitivity of liquid metal strain sensors,a sawtooth-enhanced bending sensor is proposed in this *** with the results from previous studies,the bending sensor shows enhanced resistance *** addition,combined with machine learning algorithms,a gesture recognition glove based on the sawtooth-enhanced bending sensor is also fabricated in this study,and various gestures are accurately *** the fields of human-computer interaction,wearable sensing,and medical health,the sawtooth-enhanced bending sensor shows great potential and can have wide application prospects.
As urban populations grow, smart home technology has become a key enabler for enhancing energy efficiency, comfort, and convenience in residential environments. However, existing smart home implementations often strug...
详细信息
Inspired by basic circuit connection methods,memristors can also be utilized in the construction of complex discrete chaotic *** investigate the dynamical effects of hybrid memristors,we propose two hybrid tri-memrist...
详细信息
Inspired by basic circuit connection methods,memristors can also be utilized in the construction of complex discrete chaotic *** investigate the dynamical effects of hybrid memristors,we propose two hybrid tri-memristor hyperchaotic(HTMH)mapping structures based on the hybrid parallel/cascade and cascade/parallel operations,*** the HTMH mapping structure with hybrid parallel/cascade operation as an example,this map possesses a spatial invariant set whose stability is closely related to the initial states of the *** distributions and bifurcation behaviours dependent on the control parameters are explored with numerical ***,the memristor initial offset-boosting mechanism is theoretically demonstrated,and memristor initial offset-boosting behaviours are numerically *** results clarify that the HTMH map can exhibit hyperchaotic behaviours and extreme multistability with homogeneous coexisting infinite *** addition,an FPGA hardware platform is fabricated to implement the HTMH map and generate pseudorandom numbers(PRNs)with high ***,the generated PRNs can be applied in Wasserstein generative adversarial nets(WGANs)to enhance training stability and generation capability.
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactively reconfigure wireless environments to improve both sensing and communication(S&C) performance. First, we exploit a single IRS to enable wireless sensing in the base station's(BS's) non-line-of-sight(NLoS) area. In particular, we present three IRS-enabled NLoS target sensing architectures with fully-passive, semi-passive, and active IRSs, respectively. We compare their pros and cons by analyzing the fundamental sensing performance limits for target detection and parameter estimation. Next, we consider a single IRS to facilitate integrated sensing and communication(ISAC), in which the transmit signals at the BS are used for achieving both S&C functionalities, aided by the IRS through reflective beamforming. We present joint transmit signal and receiver processing designs for realizing efficient ISAC, and jointly optimize the transmit beamforming at the BS and reflective beamforming at the IRS to balance the fundamental performance tradeoff between S&C. Furthermore, we discuss multi-IRS networked ISAC, by particularly focusing on multi-IRS-enabled multi-link ISAC, multi-region ISAC, and ISAC signal routing, respectively. Finally, we highlight various promising research topics in this area to motivate future work.
暂无评论