This study investigates the transition control problem for a double inverted pendulum system, which has one stable and three unstable equilibrium points. We propose a method for implementing transition control using a...
详细信息
Integrated sensing and communication (ISAC) is a promising solution to mitigate the increasing congestion of the wireless spectrum. In this paper, we investigate the short packet communication regime within an ISAC sy...
详细信息
The Double Track Program prepares high school students for careers or entrepreneurship through skills training, aiming to reduce post-graduation unemployment in East Java. It offers seven skill areas: multimedia, culi...
详细信息
This paper presents a data-driven variable reduction approach to accelerate the computation of large-scale transmission-constrained unit commitment(TCUC).Lagrangian relaxation(LR)and mixed-integer linear programming(M...
详细信息
This paper presents a data-driven variable reduction approach to accelerate the computation of large-scale transmission-constrained unit commitment(TCUC).Lagrangian relaxation(LR)and mixed-integer linear programming(MILP)are popular approaches to solving ***,with many binary unit commitment variables,LR suffers from slow convergence and MILP presents heavy computation *** proposed data-driven variable reduction approach consists of offline and online calculations to accelerate computational performance of the MILP-based large-scale TCUC problems.A database including multiple nodal net load intervals and the corresponding TCUC solutions is first built offline via the data-driven and all-scenario-feasible(ASF)approaches,which is then leveraged to efficiently solve new TCUC instances ***/off statuses of considerable units can be fixed in the online calculation according to the database,which would reduce the computation burden while guaranteeing good solution quality for new TCUC instances.A feasibility proposition is proposed to promptly check the feasibility of the new TCUC instances with fixed binary variables,which can be used to dynamically tune parameters of binary variable fixing strategies and guarantee the existence of feasible UC solutions even when system structure *** tests illustrate the efficiency of the proposed approach.
In this paper, we present a novel approach for joint activity detection (AD), channel estimation (CE), and data detection (DD) in uplink grant-free non-orthogonal multiple access (NOMA) systems. Our approach employs a...
详细信息
In recent years, reinforcement learning (RL)-based controller design methods have emerged as a powerful alternatives to traditional methods, providing a novel paradigm that overcomes limitations associated with the ne...
详细信息
This paper presents the development of improved synergetic current control for the injected current of an inverter in the grid-connected microgrid and the distributed generation system(DGS). This paper introduces new ...
详细信息
This paper presents the development of improved synergetic current control for the injected current of an inverter in the grid-connected microgrid and the distributed generation system(DGS). This paper introduces new formulas of the macro-variable functions for integral synergetic control(SC)and integral fast terminal SC, which both have an integral term to guarantee zero steady-state error. The proposed integral SC and integral fast terminal SC achieve a seamless performance such as the fast convergence, minimal overshoot, zero steady-state error, and chattering-free operation. To demonstrate the meritorious performance of the proposed scheme for injected current control, it is compared with the performance of a proportional-integral(PI) controller and advanced exponential sliding mode control(SMC). Finally, the practicality of the proposed scheme is justified by experimental results obtained through rapid control prototyping(RCP) using the dSPACESCALEXIO platform.
In this paper, a new block diagonal chaotic model (BDC) is investigated due to higher necessity of advanced secure data transmission method in wireless medium and considerable limitation on computational storage space...
详细信息
Modern automobiles are equipped with connectivity features to enhance the user's *** is one such communication technology that is used to pair a personal device with an automotive infotainment *** pairing,the user...
详细信息
Modern automobiles are equipped with connectivity features to enhance the user's *** is one such communication technology that is used to pair a personal device with an automotive infotainment *** pairing,the user could access the personal information on the phone through the automotive head unit with minimum distraction while ***,such connectivity introduces a possibility for privacy ***,performing an in-depth analysis of the system with privacy constraints is extremely important to prevent unauthorized access to personal *** this work,we perform a systematic analysis of the Bluetooth network of an automotive infotainment unit to exploit security and privacy-related *** model the identifed threat with respect to privacy constraints of the system,emphasize the severity of attacks through a standardized rating metric and then provide potential countermeasures to prevent the *** perform System Theoretic Process Analysis for Privacy as a part of the systematic analysis and use the Common Vulnerability Scoring System to derive attack *** identifed vulnerabilities are due to design flaws and assumptions on Bluetooth protocol implementation on automotive infotainment *** then elicit the vulnerability by performing a privacy attack on the Automotive system in an actual *** use Android Open-Source Project to report our findings and propose defense strategies.
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ...
详细信息
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and protectable events,in order to make the proposed methodology applicable to various practical systems and employ two existing works of DES security:Degree of opacity and state ***,the authors consider that all protectable events are observable,and some observable events are *** addition,protectable events cannot be protected once they are *** such a constraint,the goal is to figure out which events to conceal and which transitions to protect so that the prescribed requirements of degree of opacity and state protection are *** this work the authors decide which events to conceal as all transitions of a given event label are concealed or not *** proposed problem formulation also requires a solution to only involve absolutely necessary protectable events in order for the system to avoid superfluous protection *** authors first examine a general version of our security problem with an intuitive algorithm to compute acceptable solutions,and then present a special version which results in a reduced computation time compared to the general version.
暂无评论