Along with the increasing of wind power penetration, the sub-synchronous oscillation phenomena may happen in wind power integrated system. This paper studies the sub-synchronous oscillation phenomena of doubly-fed ind...
详细信息
This paper investigates the consensus tracking problem for networked controlsystems consisting of multiple simplependulums driven by corresponding DC motors.A distributed adaptive consensus control algorithm is devel...
详细信息
ISBN:
(纸本)9781509009107
This paper investigates the consensus tracking problem for networked controlsystems consisting of multiple simplependulums driven by corresponding DC motors.A distributed adaptive consensus control algorithm is developed to guarantee the state tracking for each simple-pendulum with nonlinear *** dynamic model of networked simple-pendulums driven by DC motors is obtained first,and the mathematical description of consensus tracking control problem for multi-agent system is ***,fully distributed consensus tracking protocol without any global information is designed by using adaptive controltechnology to adjust the coupling weights between neighboring ***,simulation results demonstrate the effectiveness of the proposed consensus tracking control algorithm.
With the large-scale grid-connected operation of solar photovoltaic (PV) power systems in recent years, the accurate assessment of its reliability level has received increasing focus. This study obtained a probability...
详细信息
With the large-scale grid-connected operation of solar photovoltaic (PV) power systems in recent years, the accurate assessment of its reliability level has received increasing focus. This study obtained a probability model for system power output by analysing the structural characteristics of the PV power system and by examining its component failure mode and the effect of the component failure mode on the output power. The algorithmic model for the reliability evaluation of the PV power system was established based on the sequential Monte Carlo method, the weather conditions, component ageing, and light intensity. Finally, the six states model and their reliability indices of the PV power system were studied considering the resource constraint and the structural characteristics of the PV power system. The results showed that the model can fully reflect the actual operation reliability of a PV power system.
Using meso-scale meteorological model FDDA,this study presented a high-definition modeling of a rainstorm process during July 19-21,2016 in the North China *** meso-scale meteorological model captured the precipitatio...
详细信息
Using meso-scale meteorological model FDDA,this study presented a high-definition modeling of a rainstorm process during July 19-21,2016 in the North China *** meso-scale meteorological model captured the precipitation distribution of the observed rainstorm over North China Plain,showing that the FDDA model has strong ability to simulate and forecast *** modeling study also revealed the mechanism of rainfall formation with 3-dimensional structures of atmospheric *** subtropical high pressure peripheral warm and wet air flow and the coexistence of cold shear affect the development of convection in the rainfall *** to the vapor transport of low-level jet stream,the rainfall area has sufficient water vapor supply.A convergence of the south-easterly and northerly airstreams triggered a strong convection for the summer rainstorm in North China *** study provided us the valuable information for further development of a high-definition modeling of rainstorm process.
For large-scale plant-wide processes with multiple operating conditions,a distributed Gaussian mixture modeling and monitoring mechanism is *** overcome the deficient prior modeling knowledge for complex process,a two...
详细信息
ISBN:
(纸本)9781467397155
For large-scale plant-wide processes with multiple operating conditions,a distributed Gaussian mixture modeling and monitoring mechanism is *** overcome the deficient prior modeling knowledge for complex process,a two-dimensional probabilistic topic model based technique named Bayesian co-clustering method is developed to simultaneously conduct the sub-block division and operating mode *** the obtained sub-blocks and operating modes,a global Gaussian mixture model is first built and then several local Gaussian mixture models are extracted and applied for distributed monitoring of plant-wide *** conducting distributed modeling and monitoring,both global and local process changes can be reflected and the fault region can be localized more easily for further *** feasibility and effectiveness of the proposed method is confirmed through the Tennessee Eastman benchmark process.
Process nonlinearity and state shifting are two of the main factors that cause poor performance of online *** soft sensor is the common practice to ensure high predictive *** this paper,the movingwindow method is intr...
详细信息
Process nonlinearity and state shifting are two of the main factors that cause poor performance of online *** soft sensor is the common practice to ensure high predictive *** this paper,the movingwindow method is introduced to the supervised latent factor analysis model to capture the state shifting feature of *** make the moving window strategy
The security issue in cyber-physical systems has attracted growing interests in the last decades. This paper considers how false data injection attack can degrade the estimation quality of a remote state estimation sy...
详细信息
ISBN:
(纸本)9781509045839
The security issue in cyber-physical systems has attracted growing interests in the last decades. This paper considers how false data injection attack can degrade the estimation quality of a remote state estimation system. In this system, smart sensors measure a dynamic process and send preprocessed data through a communication network to a remote estimator to estimate the process. It is assumed that there are malicious attackers in the communication network, who are able to obtain and falsify all the data sent by the sensors. It is common that the remote estimator is equipped with a residue-based detector to detect potential attacks. We propose a class of deception attack and analyze its feasibility. We show that the proposed attack enables the attacker to inject false data into the remote estimator without being detected. We derive a criterion to judge the optimality of performance of this type of attack in the sense of maximizing the estimation error covariance. Furthermore, we find that a simple linear attack strategy, which flips the sign of intercepted signal, satisfies the optimality criterion. We present numerical examples to illustrate our theoretical results.
An algorithm for identification of single-input single-output Box-Jenkins models is presented. It consists of four steps: firstly a high order ARX model is estimated;secondly, the input-output data is filtered with th...
详细信息
The effects of proton (E = 100 keV, F = 54×1015 cm–2) exposure on the reflective spectra of Al2O3 hollow particles in wavelength range from 250 to 2500 nm have been investigated. Hollow particles were obtained b...
The effects of proton (E = 100 keV, F = 54×1015 cm–2) exposure on the reflective spectra of Al2O3 hollow particles in wavelength range from 250 to 2500 nm have been investigated. Hollow particles were obtained by deposition nanoparticles on polystyrene balls in chitosan solution with subsequent heat treatment. X-ray photoelectron spectra of the material were analyzed for the O1s peak before and after irradiation. It has been established that radiation stability of the hollow particles is higher than that of Al2O3 microparticles. This effect is caused by the low concentration of color centers in the hollow particle due to lack of material in the bulk of particles.
Spreading is a ubiquitous process in the social, biological and technological systems. Therefore, identifying influential spreaders, which is important to prevent epidemic spreading and to establish effective vaccinat...
详细信息
暂无评论