At present, in the communication between Electric Multiple Units (EMU) and locomotive network controlsystem, in order to ensure the stability of vehicle control and the accuracy and reliability of data recording, its...
详细信息
This paper addresses the problems of the H ∞ analysis and control of fractional-order singularly perturbed systems with the commensurate order 1 < ν < 2. Based on the bounded real lemma for fractional-order s...
详细信息
ISBN:
(数字)9798350387780
ISBN:
(纸本)9798350387797
This paper addresses the problems of the H
∞
analysis and control of fractional-order singularly perturbed systems with the commensurate order 1 < ν < 2. Based on the bounded real lemma for fractional-order systems and singular fractional-order systems, the sufficient conditions for the H
∞
performance analysis of fractional-order singularly perturbed systems are firstly presented in terms of -independent linear matrix inequalities (LMIs). Then, the state feedback controllers are designed, and the sufficient -independent stabilization conditions are established via bilinear matrix inequalities(BMIs). Moreover, by the provided iterative algorithm, these BMI-based conditions can be solved based on LMIs. Finally, two numerical examples are exploited to verify the effectiveness of the proposed results.
In this paper, we propose a new framework for supervisory control of discrete-event systems in tactical environments. In contrast to the standard supervisory control theory, where the environments are considered fully...
In this paper, we propose a new framework for supervisory control of discrete-event systems in tactical environments. In contrast to the standard supervisory control theory, where the environments are considered fully adversarial, we consider the possibility of the presence of attackers who have their own objectives that may not necessarily be in opposition to the specification of the supervisor. We formulate this scenario as a Stakelberg game in the leader-follower setting, where the designer proposes a supervisor, and the attacker takes a best response to the supervisor. We characterize the solution to the Stakelberg supervisory control problem as having both cooperative and antagonistic solutions. Moreover, we provide an effective algorithm for synthesizing a cooperative supervisor that enables both players to achieve their objectives. Our work makes an initial step forward from the traditional zero-sum setting of supervisory control theory to the non-zero-sum setting. Examples are provided to illustrate our results.
Online monitoring aims to evaluate or to predict, at runtime, whether or not the behaviors of a system satisfy some desired specification. It plays a key role in safety-critical cyber-physical systems. In this work, w...
详细信息
This paper studies reduced-order dynamic consensus protocols for homogeneous linear multi-agent systems using pure relative output information. By applying H∞ control theory, a separation principle-like method with a...
详细信息
Feature matching is a fundamental and critical step for many tasks of computer vision. In recent years, many methods for feature matching have been proposed. However, the image alignment algorithm used in the state-of...
详细信息
With the development of railway construction in China,the computing demand of the train controlsystem is increasing day by *** application of cloud computing technology on the rail transit signal system has become a ...
详细信息
With the development of railway construction in China,the computing demand of the train controlsystem is increasing day by *** application of cloud computing technology on the rail transit signal system has become a research hotspot in recent *** to improve the safety and availability of the safety computer platform in the cloud computing environment is the key problem when applying cloud computing to the train operation control *** the cloud platform is in an open network environment,fac-ing many security vulnerabilities and malicious network attacks,it is necessary to monitor the operation of computer programmes through edge safety ***,this paper encrypts the logical monitoring method,and then proposes a secure computer de fence model based on the dynamic heterogeneous redundancy *** the continuous time Markov chain(CTMC)is used to quantitatively solve the stable probability of the system,and the influence of different logical monitoring methods on the anti-attack performance of the system is ***,the experiment proves that the dynamic heterogeneous redundancy structure composed of encryption logic monitoring can guarantee the safe and stable operation of the safety computer more effectively.
Few-shot learning (FSL) as a data-scarce method, aims to recognize instances of unseen classes solely based on very few examples. However, the model can easily become overfitted due to the biased distribution formed w...
详细信息
In the metaverse, video text retrieval is an urgent and challenging need for users in social entertainment. The current attention-based video text retrieval models have not fully explored the interaction between video...
详细信息
In the current realm of research on text-to-image (T2I) transformation, the daunting task of translating natural language descriptions into visually realistic images is apparent. This intricate undertaking requires mo...
详细信息
ISBN:
(数字)9798350359312
ISBN:
(纸本)9798350359329
In the current realm of research on text-to-image (T2I) transformation, the daunting task of translating natural language descriptions into visually realistic images is apparent. This intricate undertaking requires models to deeply comprehend cross-modal information and achieve precise semantic mapping. Despite the commendable progress made by GANs in image synthesis—crafting high-resolution, lifelike visual effects from random noise—persistent challenges like training instability, mode collapse, and fidelity issues persist, prompting the need for innovative *** study introduces an avant-garde text-driven high-fidelity image generation model, labeled as Attn-VAE-GAN. The initial integration of a generator module featuring a fused Self-Attention mechanism empowers the model to thoroughly grasp and accurately capture intricate semantic information from the input text. Moreover, the assimilation of a Variational Autoencoder (VAE) module taps into its latent representation learning prowess to optimize both image quality and diversity. To amplify the realism and detail expression of the generated images, a meticulously designed comprehensive loss function combines intrinsic VAE loss and hinge *** results underscore the substantial enhancement achieved by the Attn-VAE model in both the quality and diversity of the generated images across diverse publicly available benchmark datasets.
暂无评论