This paper deals with the problem of estimator-based sliding mode control against denial-of-service(DoS) attacks and discrete events via a time-delay approach. A networked system is considered an uncertain dynamical s...
详细信息
This paper deals with the problem of estimator-based sliding mode control against denial-of-service(DoS) attacks and discrete events via a time-delay approach. A networked system is considered an uncertain dynamical system with matched and mismatched perturbations and exogenous disturbance in the network environment. A network-resource-aware event-triggering mechanism is designed with aperiodically releasing system measurements. Furthermore, to describe the DoS attack duration and inter-event time, a time-delay modeling approach considers the DOS attack duration and inter-event time as a “time delay” of the measurements between the sensor and controller over the network is proposed. Consequently, an intervaltime-delay system with uncertainties is formulated. A state-observer-based sliding mode controller, by which the ideal sliding mode can be achieved, is proposed against the DoS attacks. The resulting sliding motion is proved to be robust and stable with an Lgain performance. Finally, the effectiveness and applicability of the present sliding mode control are validated in a simulated pendulum system.
We study the task of automated house design,which aims to automatically generate 3D houses from user ***,in the automatic system,it is non-trivial due to the intrinsic complexity of house designing:1)the understanding...
详细信息
We study the task of automated house design,which aims to automatically generate 3D houses from user ***,in the automatic system,it is non-trivial due to the intrinsic complexity of house designing:1)the understanding of user requirements,where the users can hardly provide high-quality requirements without any professional knowledge;2)the design of house plan,which mainly focuses on how to capture the effective information from user *** address the above issues,we propose an automatic house design framework,called auto-3D-house design(A3HD).Unlike the previous works that consider the user requirements in an unstructured way(e.g.,natural language),we carefully design a structured list that divides the requirements into three parts(i.e.,layout,outline,and style),which focus on the attributes of rooms,the outline of the building,and the style of decoration,*** the processing of architects,we construct a bubble diagram(i.e.,graph)that covers the rooms′attributes and relations under the constraint of *** addition,we take each outline as a combination of points and orders,ensuring that it can represent the outlines with arbitrary ***,we propose a graph feature generation module(GFGM)to capture layout features from the bubble diagrams and an outline feature generation module(OFGM)for outline ***,we render 3D houses according to the given style requirements in a rule-based *** on two benchmark datasets(i.e.,RPLAN and T3HM)demonstrate the effectiveness of our A3HD in terms of both quantitative and qualitative evaluation metrics.
This paper addresses the planning problem of parallel DC electric springs (DCESs). DCES, a demand-side management method, realizes automatic matching of power consumption and power generation by adjusting non-critical...
详细信息
This paper addresses the planning problem of parallel DC electric springs (DCESs). DCES, a demand-side management method, realizes automatic matching of power consumption and power generation by adjusting non-critical load (NCL) and internal storage. It can offer higher power quality to critical load (CL), reduce power imbalance and relieve pressure on energy storage systems (RESs). In this paper, a planning method for parallel DCESs is proposed to maximize stability gain, economic benefits, and penetration of RESs. The planning model is a master optimization with sub-optimization to highlight the priority of objectives. Master optimization is used to improve stability of the network, and sub-optimization aims to improve economic benefit and allowable penetration of RESs. This issue is a multivariable nonlinear mixed integer problem, requiring huge calculations by using common solvers. Therefore, particle Swarm optimization (PSO) and Elitist non-dominated sorting genetic algorithm (NSGA-II) were used to solve this model. Considering uncertainty of RESs, this paper verifies effectiveness of the proposed planning method on IEEE 33-bus system based on deterministic scenarios obtained by scenario analysis.
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
Partial-label learning(PLL) is a typical problem of weakly supervised learning, where each training instance is annotated with a set of candidate labels. Self-training PLL models achieve state-of-the-art performance b...
详细信息
Partial-label learning(PLL) is a typical problem of weakly supervised learning, where each training instance is annotated with a set of candidate labels. Self-training PLL models achieve state-of-the-art performance but suffer from error accumulation problems caused by mistakenly disambiguated instances. Although co-training can alleviate this issue by training two networks simultaneously and allowing them to interact with each other, most existing co-training methods train two structurally identical networks with the same task, i.e., are symmetric, rendering it insufficient for them to correct each other due to their similar limitations. Therefore, in this paper, we propose an asymmetric dual-task co-training PLL model called AsyCo,which forces its two networks, i.e., a disambiguation network and an auxiliary network, to learn from different views explicitly by optimizing distinct tasks. Specifically, the disambiguation network is trained with a self-training PLL task to learn label confidence, while the auxiliary network is trained in a supervised learning paradigm to learn from the noisy pairwise similarity labels that are constructed according to the learned label confidence. Finally, the error accumulation problem is mitigated via information distillation and confidence refinement. Extensive experiments on both uniform and instance-dependent partially labeled datasets demonstrate the effectiveness of AsyCo.
Defect detection in material micro-images has a significant impact on the study of the relationship between the micro-structure and macro-properties, however, material microdefects are usually relatively small and spa...
详细信息
To improve the accuracy of steel surface defect detection, this study proposes an improved multi-directional optimization model based on the YOLOv10n algorithm. First, we introduce innovations to the convolution (C2F)...
详细信息
This paper introduces 'SmogMaster: Your Smart Driving Companion, ' the Visual Editorial Quality Assurance, an intelligent Smart Driving Assistant System (SDAS) in areas with high foggy weather affected by heav...
详细信息
Infrared target detection is now applied in many fields, such as medical imaging, military detection, autonomous driving, and environmental monitoring with drones. Due to the small size of these targets, complex envir...
详细信息
End-to-end training has emerged as a prominent trend in speech recognition, with Conformer models effectively integrating Transformer and CNN architectures. However, their complexity and high computational cost pose d...
详细信息
暂无评论