Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control *** quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion ***,we design an energy controller to dynamically adjust the system energy changes caused by unknown *** designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping ***,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack *** addition,this secure control method is simple to implement because it avoids complicated mathematical *** effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.
The multi-compartment electric vehicle routing problem(EVRP)with soft time window and multiple charging types(MCEVRP-STW&MCT)is studied,in which electric multi-compartment vehicles that are environmentally friendl...
详细信息
The multi-compartment electric vehicle routing problem(EVRP)with soft time window and multiple charging types(MCEVRP-STW&MCT)is studied,in which electric multi-compartment vehicles that are environmentally friendly but need to be recharged in course of transport process,are employed.A mathematical model for this optimization problem is established with the objective of minimizing the function composed of vehicle cost,distribution cost,time window penalty cost and charging service *** solve the problem,an estimation of the distribution algorithm based on Lévy flight(EDA-LF)is proposed to perform a local search at each iteration to prevent the algorithm from falling into local *** results demonstrate that the EDA-LF algorithm can find better solutions and has stronger robustness than the basic EDA *** addition,when comparing with existing algorithms,the result shows that the EDA-LF can often get better solutions in a relatively short time when solving medium and large-scale *** experiments show that using electric multi-compartment vehicles to deliver incompatible products can produce better results than using traditional fuel vehicles.
In this paper, an optimal guidance algorithm is proposed for atmospheric ascent. The optimal guidance algorithm updates the reference trajectory to deal with the impact of disturbance by solving an optimal control pro...
详细信息
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation ex...
详细信息
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation expense,privacy concerns,***,the effectiveness of TL is not always *** transfer(NT),i.e.,leveraging source domain data/knowledge undesirably reduces learning performance in the target domain,and has been a long-standing and challenging problem in *** approaches have been proposed in the literature to address this ***,there does not exist a systematic *** paper fills this gap,by first introducing the definition of NT and its causes,and reviewing over fifty representative approaches for overcoming NT,which fall into three categories:domain similarity estimation,safe transfer,and NT *** areas,including computer vision,bioinformatics,natural language processing,recommender systems,and robotics,that use NT mitigation strategies to facilitate positive transfers,are also ***,we give guidelines on NT task construction and baseline algorithms,benchmark existing TL and NT mitigation approaches on three NT-specific datasets,and point out challenges and future research *** ensure reproducibility,our code is publicized at https://***/chamwen/NT-Benchmark.
Spiking neural P systems with synapses states characterize the movement of spikes among the neurons. The number of the spikes in neurons can be represented by integers, which provide a way to represent increment, decr...
详细信息
This paper proposes a new second-order continuous-time multi-agent model and analyzes the controllability of second-order multi-agent system with multiple leaders based on the asymmetric *** paper considers the more g...
详细信息
This paper proposes a new second-order continuous-time multi-agent model and analyzes the controllability of second-order multi-agent system with multiple leaders based on the asymmetric *** paper considers the more general case:velocity coupling topology is different from location coupling *** sufficient and necessary conditions are presented for the controllability of the system with multiple *** addition,the paper studies the controllability of the system with velocity damping *** results are given to illustrate the correctness of theoretical results.
This article studies the consensus problem for multiagent systems with transmission constraints. A novel model of multiagent systems is proposed where the information transmissions between agents are disturbed by irre...
详细信息
This paper designs and implements a financial invoice recognition system based on the features of the Chinese financial invoice. By using the linear whole block moving method in each vertical segment, a new fast algor...
详细信息
This paper presents a new approach for norm bounded continuous-time uncertain switch systems such as BTT vehicle. Firstly, the flight trajectory has been divided into several intervals according to flight attitude. Me...
详细信息
In this paper, the Pneumatic Muscle (PM) as actuator is investigated. The PM model is established by using a phenomenological model consisting of a contractile element, a spring element, and a damping element in paral...
详细信息
暂无评论