In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric uncertainties.The proposed methodology incorporates ...In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric uncertainties.The proposed methodology incorporates a residual generation module,including a bank of filters,into an intelligent residual evaluation module.First,residual filters are designed based on an improved nonlinear differential algebraic approach so that they are not affected by external disturbances.The residual evaluation module is developed based on the suggested series and parallel forms.Further,a new ensemble classification scheme defined as blended learning integrates heterogeneous classifiers to enhance the performance.A wide range of simulations is carried out in a high-fidelity satellite simulator subject to the constant and time-varying actuator faults in the presence of disturbances,manoeuvres,uncertainties,and noises.The obtained results demonstrate the effectiveness of the proposed robust fault detection and isolation method compared to the traditional nonlinear differential algebraic approach.展开更多
There is a need for increased security measures because of wide variety of android Internet of Thing(IoT)mobile devices that can communicate with each other via networks for controlling the management of enterprise.El...There is a need for increased security measures because of wide variety of android Internet of Thing(IoT)mobile devices that can communicate with each other via networks for controlling the management of enterprise.Elliptic Curve Deffie Hellman(ECDH)and Rivest Shamir Adleman(RSA)are used to secure data in android IoT phones in efficient manner.Android mobile can store a lot of data,including sensitive data.Protecting data saved on mobile has become a critical problem.In android IoT,Collaborative Machine Learning describes a method for collaboratively mining data,which makes it easier to manage and lowers cost of maintenance.To increase security in IoT phones,suggested system uses ECDH,RSA,and CML algorithms,which have been considered novelty of this method.RSA and ECDH are computed using time of decryption,encryption,and key generation.Conclusions show ECDH beats other alternatives like RSA.Finally,all users of the network have been tested.展开更多
This paper discusses robust control strategy for isopropyl benzene production process using the method of loop shaping H_(∞) technology.This cumene production process is a part of phenol plant in HOCL,Kochi.H_(∞) co...This paper discusses robust control strategy for isopropyl benzene production process using the method of loop shaping H_(∞) technology.This cumene production process is a part of phenol plant in HOCL,Kochi.H_(∞) control of the propylene concentration is done here.The H_(∞) controller is derived from the linearised model of the reactor.The optimal H_(∞) controller is obtained by simplifying two algebraic Riccati equations.The proposed PID-like H_(∞) controller provides a single tuning parameter which makes the controller design more accurate.The proposed controller has been compared with other robust controllers like H_(2) and LQR.The H_(∞) controller is found to be superior in a wide frequency range and has a feature of low distortion and good regulating performance.The reactor model has been developed in COMSOL Multiphysics with the parameters obtained from HOCL plant,Kochi.The model extracted is reduced using model order reduction for the controller design.展开更多
This paper aims to frame a new rice disease prediction model that included three major phases.Initially,median filtering(MF)is deployed during pre-processing and then‘proposed Fuzzy Means Clustering(FCM)based segment...This paper aims to frame a new rice disease prediction model that included three major phases.Initially,median filtering(MF)is deployed during pre-processing and then‘proposed Fuzzy Means Clustering(FCM)based segmentation’is done.Following that,‘Discrete Wavelet Transform(DWT),Scale-Invariant Feature Transform(SIFT)and low-level features(colour and shape),Proposed local Binary Pattern(LBP)based features’are extracted that are classified via‘MultiLayer Perceptron(MLP)and Long Short Term Memory(LSTM)’and predicted outcomes are obtained.For exact prediction,this work intends to optimise the weights of LSTM using Inertia Weighted Salp Swarm Optimisation(IW-SSO)model.Eventually,the development of IW-SSO method is established on varied metrics.展开更多
Dynamic programming(DP)is frequently used to obtain the optimal solution to the hybrid electric vehicle(HEV)energy management.The trade-off between the accuracy and the computational effort is the biggest problem for ...Dynamic programming(DP)is frequently used to obtain the optimal solution to the hybrid electric vehicle(HEV)energy management.The trade-off between the accuracy and the computational effort is the biggest problem for the DP method.The closed-form solution to the DP is proposed to solve this problem.Firstly,the affine linear model of the engine fuel rate is obtained based on engine test data.The piecewise linear approximation of the motor power demand is obtained considering the different energy flows in the charging and discharging stages of the battery.Then,the second-order Taylor expansion for the cost matrix at each time and state grid point is introduced to get the closed-form solution of the optimal torque split.The results show that this method can greatly reduce the computing burden by 93%while ensuring near-optimal fuel economy compared with the conventional DP method.展开更多
In the IoT-based users monitor tasks in the network environment by participating in the data collection process by smart devices.Users monitor their data in the form of fog computing(mobile mass monitoring).Service pr...In the IoT-based users monitor tasks in the network environment by participating in the data collection process by smart devices.Users monitor their data in the form of fog computing(mobile mass monitoring).Service providers are required to pay user rewards without increasing platform costs.One of the NP-Hard methods to maximise the coverage rate and reduce the platform costs(reward)is the Cooperative Based Method for Smart Sensing Tasks(CMST).This article uses chaos theory and fuzzy parameter setting in the forest optimisation algorithm.The proposed method is implemented with MATLAB.The average findings show that the network coverage rate is 31%and the monitoring cost is 11%optimised compared to the CMST scheme and the mapping of the mobile mass monitoring problem to meta-heuristic algorithms.And using the improved forest optimisation algorithm can reduce the costs of the mobile crowd monitoring platform and has a better coverage rate.展开更多
The paper is devoted to the study of optimal control of a hyperbolic system,where the control enters the system through the boundary.The hyperbolic system is the wave equation on a smooth and open domain,where the bou...The paper is devoted to the study of optimal control of a hyperbolic system,where the control enters the system through the boundary.The hyperbolic system is the wave equation on a smooth and open domain,where the boundary condition involves the normal derivative at the boundary of z,the time derivative of z times a constant k,and a nonlinear term control.Here,z is the state and u is the control,satisfying some boundedness condition depending on k.The functional cost consists of the energy and the difference between the solution of the system at final time,and a desired state in L2-norm.For a closed convex set,we prove the existence of an optimal control that minimises the cost functional using a priori estimates.Then,using the differentiability of the cost functional with respect to the control,we establish the characterisation by deriving necessary conditions that an optimal control must satisfy.A numerical approach is successfully illustrated by simulations.展开更多
In this article,an adaptive security control scheme is presented for cyber-physical systems(CPSs)suffering from false data injection(FDI)attacks and time-varying state constraints.Firstly,an adaptive bound estimation ...In this article,an adaptive security control scheme is presented for cyber-physical systems(CPSs)suffering from false data injection(FDI)attacks and time-varying state constraints.Firstly,an adaptive bound estimation mechanism is introduced in the backstepping control design to mitigate the effect of FDI attacks.Secondly,to solve the unknown sign time-varying statefeedback gains aroused by the FDI attacks,a type of Nussbaum function is employed in the adaptive security control.Then,by constructing a barrier Lyapunov function,it can be ensured that all signals of controlled system are bounded and the time-varying state constraints are not transgressed.Finally,the provided simulation examples demonstrate the effectiveness of the proposed controller.展开更多
An algorithm based on mixed signals is proposed,to solve the issues of low accuracy of identification algorithm,immeasurable intermediate variables of fractional order Hammerstein model,and how to determine the magnit...An algorithm based on mixed signals is proposed,to solve the issues of low accuracy of identification algorithm,immeasurable intermediate variables of fractional order Hammerstein model,and how to determine the magnitude of fractional order.In this paper,a special mixed input signal is designed to separate the nonlinear and linear parts of the fractional order Hammerstein model so that each part can be identified independently.The nonlinear part is fitted by the neural fuzzy network model,which avoids the limitation of polynomial fitting and broadens the application range of nonlinear models.In addition,the multi-innovation Levenberg-Marquardt(MILM)algorithm and auxiliary recursive least square algorithm are innovatively integrated into the parameter identification algorithm of the fractional order Hammerstein model to obtain more accurate identification results.A simulation example is given to verify the accuracy and effectiveness of the proposed method.展开更多
The combat tasks faced by UAVs are becoming more and more complex.Traditional single UAVs are limited by the constraints of platform load capacity,lightweight load,and insufficient lowpower equipment,so it is difficul...The combat tasks faced by UAVs are becoming more and more complex.Traditional single UAVs are limited by the constraints of platform load capacity,lightweight load,and insufficient lowpower equipment,so it is difficult to complete complex tasks independently.Aiming at typical UAV collaborative confrontation application scenarios,this paper constructs a multi-agentoriented cluster collaborative intelligent system architecture and establishes a swarm-oriented intelligent UAV cluster collaborative control algorithm.Moreover,this paper forms a simulation environment for UAV cluster collaborative confrontation and completes the design and implementation of the UAV cluster collaborative confrontation system based on swarm intelligence.In addition,this paper analyses the key technologies of the UAV cluster collaborative system with the support of the Internet of Things technology and verifies the performance of the system after constructing the corresponding system.The experimental results show that the system constructed in this paper is effective.展开更多
Due to the integration of cyber–physical systems,smart grids have faced the new security risks caused by false data injection attacks(FDIAs).FDIAs can bypass the traditional bad data detection techniques by falsifyin...Due to the integration of cyber–physical systems,smart grids have faced the new security risks caused by false data injection attacks(FDIAs).FDIAs can bypass the traditional bad data detection techniques by falsifying the process of state estimation.For this reason,this paper studies the detection and isolation problem of FDIAs based on the adaptive Kalman filter bank(AKFB)in smart grids.Taking the covert characteristics of FDIAs into account,a novel detection method is proposed based on the designed AKF.Moreover,the adaptive threshold is proposed to solve the detection delay caused by a priori threshold in the current detection methods.Considering the case of multiple attacked sensor nodes,the AKFB-based isolation method is developed.To reduce the number of isolation iterations,a logical decision matrix scheme is designed.Finally,the effectiveness of the proposed detection and isolation method is demonstrated on an IEEE 22-bus smart grids.展开更多
This work takes advantage of synergetic control theory and fractional calculus to develop and propose fractional synergetic control(FSC)strategy for Four Degrees of Freedom(4-DOF)robot manipulator.The proposed fractio...This work takes advantage of synergetic control theory and fractional calculus to develop and propose fractional synergetic control(FSC)strategy for Four Degrees of Freedom(4-DOF)robot manipulator.The proposed fractional synergetic control is designed to track a joint space as well as workspace desired trajectories.Fractional calculus gives more flexibility in the design since it has a wider stability region.Added to that,as stated in the literature,compared to a similar approach such as sliding mode control,the synergetic control approach converges faster to the equilibrium point,without chattering with a fast response.This paper proposes a new control strategy that takes advantage of fractional calculus and synergetic control theory.This proposed control strategy is tested experimentally on a 4-DOF manipulator to study the performance of the proposed control scheme.The stability of the closed-loop system is proved using the Lyapunov approach.The experimental results have shown that the proposed FSC design has achieved a good tracking performance.展开更多
In this paper,a criterion for the partially symmetric game(PSG)is derived by using the semitensor product approach.The dimension and the basis of the linear subspace composed of all the PSGs with respect to a given se...In this paper,a criterion for the partially symmetric game(PSG)is derived by using the semitensor product approach.The dimension and the basis of the linear subspace composed of all the PSGs with respect to a given set of partial players are calculated.The testing equations with the minimum number are concretely determined,and the computational complexity is analysed.Finally,two examples are displayed to show the theoretical results.展开更多
Augmented Reality is a technique that allows users to overlap digital information with their physical world.The Augmented Reality(AR)displays have an exceptional characteristic from the Human–Computer Interaction(HCI...Augmented Reality is a technique that allows users to overlap digital information with their physical world.The Augmented Reality(AR)displays have an exceptional characteristic from the Human–Computer Interaction(HCI)perspective.Due to its increasing popularity and application in diverse domains,increasing user-friendliness and AR usage are critical.Context-aware is one approach since an AR application can adapt to the user,environment,needs and enhance ergonomic principles and functionality.This paper proposes the Intelligent Contextaware Augmented Reality Model(ICAARM)for Human–Computer Interaction systems.This study explores and reduces interaction uncertainty by semantically modeling user-specific interaction with context,allowing personalised interaction.Sensory information is captured from an AR device to understand user interactions and context.These depictions carry semantics to Augmented Reality applications about the user’s intention to interact with a specific device affordance.Thus,this study describes personalised gesture interaction in VR/AR applications for immersive/intelligent environments.展开更多
Intelligent Control•Autonomous Decision•and Smart Future Xi’an,China 25–27 May 2024 http://www.ccdc.neu.edu.cn The 36th Chinese Control and Decision Conference(CCDC 2024)will be held in Xi’an,China,from 25 to 27 Ma...Intelligent Control•Autonomous Decision•and Smart Future Xi’an,China 25–27 May 2024 http://www.ccdc.neu.edu.cn The 36th Chinese Control and Decision Conference(CCDC 2024)will be held in Xi’an,China,from 25 to 27 May 2024.Chinese Control and Decision Conference(CCDC)is an annual international conference,covering both theories and applications in all areas of control,system,and decision.Its purpose is to create a forum for scientists,engineers and practitioners from all over the world to present the latest developments in control,decision,robotics,automation,and other emerging technologies.CCDC provides a variety of opportunities for academic exchange and sharing,such as keynotes,distinguished lectures,preconference workshops,special sessions,tutorials,thematic forums,oral presentation sessions,interactive sessions,and so on.English is the official language for CCDC.Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.展开更多
Considering the cost of logistic service and the‘Free Shipping’strategy,two models of E-supply chain,respectively dominated by e-commerce platform or manufacturer are constructed,and the optimal decisions for each m...Considering the cost of logistic service and the‘Free Shipping’strategy,two models of E-supply chain,respectively dominated by e-commerce platform or manufacturer are constructed,and the optimal decisions for each model is calculated in this paper.The research indicates that:the sales price is lower and the profit of manufacturer is higher in the mode dominated by manufacturer.On the other hand,the platform’s service-level is lower and the profit of platform is higher in the mode dominated by dominant platform.Further,the sales price,platform’s service and platform’s profit will increase with the growth of commission and decrease with the service cost elasticity coefficient.Contrarily,the profit of manufacturer will decrease with the growth of commission but increase with elasticity coefficient.And,the logistic price and profit of logistic enterprise are higher in the mode dominated by manufacturer,moreover,they will decrease with the growth of commission.展开更多
The energy crisis has become a significant bottleneck in the country’s economic progress.But to end this age old problem,we have to capitalize on the chance,China Pakistan Economic Corridor(CPEC)investment provides,t...The energy crisis has become a significant bottleneck in the country’s economic progress.But to end this age old problem,we have to capitalize on the chance,China Pakistan Economic Corridor(CPEC)investment provides,to its full potential.This study aims to help Pakistani government in selecting the best set of CPEC energy priority projects to be completed in the first wave of development.The second part of the research guides the small/medium scale industry and business owners to select the best available alternative for tackling the energy shortfall while CPEC projects are in the process of materialization.Forecasting electricity shortfall decrease and its impact on various economic/industrial sectors(like services,industrial,textile and agriculture)is also performed to gauge the effect of CPEC on the economy using linear regression.For decision analysis,the MCDM techniques employed are(AHP)along with(TOPSIS).This research generated a new list of recommended CPEC energy priority projects which are more evenly distributed across the country,catering more,to interest of the country as a whole.We also concluded solar panels to be the best alternative for small scale businesses,as short term solution while CPEC projects are under construction.展开更多
This paper reviews some main results and process concerning with fault diagnosis and accommodation with flight control applications.The fault detection and diagnosis including the quantitative and qualitative methods ...This paper reviews some main results and process concerning with fault diagnosis and accommodation with flight control applications.The fault detection and diagnosis including the quantitative and qualitative methods and the fault-tolerant control including passive and active schemes are introduced,respectively.The control designs and developments of the fault diagnosis and accommodation for continuous-time systems and discrete-time systems,the fault diagnosis and fault-tolerant control for switched systems and interconnected systems as well as the applied flight control research including hypersonic vehicle,spacecraft and helicopter systems are summarised.展开更多
In this paper,a novel,dual-mode model predictive control framework is introduced that combines the dynamic window approach to navigation with generic path planning techniques through a dual-mode model predictive contr...In this paper,a novel,dual-mode model predictive control framework is introduced that combines the dynamic window approach to navigation with generic path planning techniques through a dual-mode model predictive control framework.The planned path adds information on the connectivity of the free space to the obstacle avoidance capabilities of the dynamic window approach.This allows for guaranteed convergence to a goal location while navigating through an unknown environment at relatively high speeds.The framework is applied in a combined simulation/hardware implementation to demonstrate the computational feasibility and the ability to cope with the constraints of a dynamic system.展开更多
This paper provides a brief review of the different optimisation strategies used in mobile robot simultaneous localisation and mapping(SLAM)problem.The focus is on the optimisation-based SLAM back end.The strategies a...This paper provides a brief review of the different optimisation strategies used in mobile robot simultaneous localisation and mapping(SLAM)problem.The focus is on the optimisation-based SLAM back end.The strategies are classified based on their purposes such as reducing the computational complexity,improving the convergence and improving the robustness.It is clearly pointed out that some approximations are made in some of the methods and there is always a trade-off between the computational complexity and the accuracy of the solution.The local submap joining is a strategy that has been used to address both the computational complexity and the convergence and is a flexible tool to be used in the SLAM back end.Although more research is needed to further improve the SLAM back end,nowadays there are quite a few relatively mature SLAM back end algorithms that can be used by SLAM researchers and users.展开更多
文摘In this paper,a combined robust fault detection and isolation scheme is studied for satellite system subject to actuator faults,external disturbances,and parametric uncertainties.The proposed methodology incorporates a residual generation module,including a bank of filters,into an intelligent residual evaluation module.First,residual filters are designed based on an improved nonlinear differential algebraic approach so that they are not affected by external disturbances.The residual evaluation module is developed based on the suggested series and parallel forms.Further,a new ensemble classification scheme defined as blended learning integrates heterogeneous classifiers to enhance the performance.A wide range of simulations is carried out in a high-fidelity satellite simulator subject to the constant and time-varying actuator faults in the presence of disturbances,manoeuvres,uncertainties,and noises.The obtained results demonstrate the effectiveness of the proposed robust fault detection and isolation method compared to the traditional nonlinear differential algebraic approach.
文摘There is a need for increased security measures because of wide variety of android Internet of Thing(IoT)mobile devices that can communicate with each other via networks for controlling the management of enterprise.Elliptic Curve Deffie Hellman(ECDH)and Rivest Shamir Adleman(RSA)are used to secure data in android IoT phones in efficient manner.Android mobile can store a lot of data,including sensitive data.Protecting data saved on mobile has become a critical problem.In android IoT,Collaborative Machine Learning describes a method for collaboratively mining data,which makes it easier to manage and lowers cost of maintenance.To increase security in IoT phones,suggested system uses ECDH,RSA,and CML algorithms,which have been considered novelty of this method.RSA and ECDH are computed using time of decryption,encryption,and key generation.Conclusions show ECDH beats other alternatives like RSA.Finally,all users of the network have been tested.
文摘This paper discusses robust control strategy for isopropyl benzene production process using the method of loop shaping H_(∞) technology.This cumene production process is a part of phenol plant in HOCL,Kochi.H_(∞) control of the propylene concentration is done here.The H_(∞) controller is derived from the linearised model of the reactor.The optimal H_(∞) controller is obtained by simplifying two algebraic Riccati equations.The proposed PID-like H_(∞) controller provides a single tuning parameter which makes the controller design more accurate.The proposed controller has been compared with other robust controllers like H_(2) and LQR.The H_(∞) controller is found to be superior in a wide frequency range and has a feature of low distortion and good regulating performance.The reactor model has been developed in COMSOL Multiphysics with the parameters obtained from HOCL plant,Kochi.The model extracted is reduced using model order reduction for the controller design.
文摘This paper aims to frame a new rice disease prediction model that included three major phases.Initially,median filtering(MF)is deployed during pre-processing and then‘proposed Fuzzy Means Clustering(FCM)based segmentation’is done.Following that,‘Discrete Wavelet Transform(DWT),Scale-Invariant Feature Transform(SIFT)and low-level features(colour and shape),Proposed local Binary Pattern(LBP)based features’are extracted that are classified via‘MultiLayer Perceptron(MLP)and Long Short Term Memory(LSTM)’and predicted outcomes are obtained.For exact prediction,this work intends to optimise the weights of LSTM using Inertia Weighted Salp Swarm Optimisation(IW-SSO)model.Eventually,the development of IW-SSO method is established on varied metrics.
基金National Natural Science Foundation of China:[Grant Number 52077217].
文摘Dynamic programming(DP)is frequently used to obtain the optimal solution to the hybrid electric vehicle(HEV)energy management.The trade-off between the accuracy and the computational effort is the biggest problem for the DP method.The closed-form solution to the DP is proposed to solve this problem.Firstly,the affine linear model of the engine fuel rate is obtained based on engine test data.The piecewise linear approximation of the motor power demand is obtained considering the different energy flows in the charging and discharging stages of the battery.Then,the second-order Taylor expansion for the cost matrix at each time and state grid point is introduced to get the closed-form solution of the optimal torque split.The results show that this method can greatly reduce the computing burden by 93%while ensuring near-optimal fuel economy compared with the conventional DP method.
文摘In the IoT-based users monitor tasks in the network environment by participating in the data collection process by smart devices.Users monitor their data in the form of fog computing(mobile mass monitoring).Service providers are required to pay user rewards without increasing platform costs.One of the NP-Hard methods to maximise the coverage rate and reduce the platform costs(reward)is the Cooperative Based Method for Smart Sensing Tasks(CMST).This article uses chaos theory and fuzzy parameter setting in the forest optimisation algorithm.The proposed method is implemented with MATLAB.The average findings show that the network coverage rate is 31%and the monitoring cost is 11%optimised compared to the CMST scheme and the mapping of the mobile mass monitoring problem to meta-heuristic algorithms.And using the improved forest optimisation algorithm can reduce the costs of the mobile crowd monitoring platform and has a better coverage rate.
文摘The paper is devoted to the study of optimal control of a hyperbolic system,where the control enters the system through the boundary.The hyperbolic system is the wave equation on a smooth and open domain,where the boundary condition involves the normal derivative at the boundary of z,the time derivative of z times a constant k,and a nonlinear term control.Here,z is the state and u is the control,satisfying some boundedness condition depending on k.The functional cost consists of the energy and the difference between the solution of the system at final time,and a desired state in L2-norm.For a closed convex set,we prove the existence of an optimal control that minimises the cost functional using a priori estimates.Then,using the differentiability of the cost functional with respect to the control,we establish the characterisation by deriving necessary conditions that an optimal control must satisfy.A numerical approach is successfully illustrated by simulations.
基金Funds of National Science of China(Grant no.61973146,62173172,61833001)the Doctoral Research Initiation of Foundation of Liaoning Province(No.20180540047)the Distinguished Young Scientific Research Talents Plan in Liaoning Province(No.XLYC1907077,JQL201915402).
文摘In this article,an adaptive security control scheme is presented for cyber-physical systems(CPSs)suffering from false data injection(FDI)attacks and time-varying state constraints.Firstly,an adaptive bound estimation mechanism is introduced in the backstepping control design to mitigate the effect of FDI attacks.Secondly,to solve the unknown sign time-varying statefeedback gains aroused by the FDI attacks,a type of Nussbaum function is employed in the adaptive security control.Then,by constructing a barrier Lyapunov function,it can be ensured that all signals of controlled system are bounded and the time-varying state constraints are not transgressed.Finally,the provided simulation examples demonstrate the effectiveness of the proposed controller.
基金National Natural Science Foundation of China[grant number 61863034].
文摘An algorithm based on mixed signals is proposed,to solve the issues of low accuracy of identification algorithm,immeasurable intermediate variables of fractional order Hammerstein model,and how to determine the magnitude of fractional order.In this paper,a special mixed input signal is designed to separate the nonlinear and linear parts of the fractional order Hammerstein model so that each part can be identified independently.The nonlinear part is fitted by the neural fuzzy network model,which avoids the limitation of polynomial fitting and broadens the application range of nonlinear models.In addition,the multi-innovation Levenberg-Marquardt(MILM)algorithm and auxiliary recursive least square algorithm are innovatively integrated into the parameter identification algorithm of the fractional order Hammerstein model to obtain more accurate identification results.A simulation example is given to verify the accuracy and effectiveness of the proposed method.
基金the project of“13th five year plan”of educational science of Shaanxi Province in 2020.Project Name:Practical research on the cultivation of innovative talents of new engineering based on PBL mode.Project number:SGH20Y1420the project of Natural science research program of Shanxi Province.Project Name:Re-search on Key Technologies of UAV adaptive scene matching visual navigation system.Project Name:2020JM-637.
文摘The combat tasks faced by UAVs are becoming more and more complex.Traditional single UAVs are limited by the constraints of platform load capacity,lightweight load,and insufficient lowpower equipment,so it is difficult to complete complex tasks independently.Aiming at typical UAV collaborative confrontation application scenarios,this paper constructs a multi-agentoriented cluster collaborative intelligent system architecture and establishes a swarm-oriented intelligent UAV cluster collaborative control algorithm.Moreover,this paper forms a simulation environment for UAV cluster collaborative confrontation and completes the design and implementation of the UAV cluster collaborative confrontation system based on swarm intelligence.In addition,this paper analyses the key technologies of the UAV cluster collaborative system with the support of the Internet of Things technology and verifies the performance of the system after constructing the corresponding system.The experimental results show that the system constructed in this paper is effective.
基金the National Nature Science Foundation of China under 61873228 and 62103357the Science and Technology Plan of Hebei Education Department under QN2021139+1 种基金the Nature Science Foundation of Hebei Province under F2021203043the Open Research Fund of Jiangsu Collaborative Innovation Center for Smart Distribution Network,Nanjing Institute of Technology under XTCX202203.
文摘Due to the integration of cyber–physical systems,smart grids have faced the new security risks caused by false data injection attacks(FDIAs).FDIAs can bypass the traditional bad data detection techniques by falsifying the process of state estimation.For this reason,this paper studies the detection and isolation problem of FDIAs based on the adaptive Kalman filter bank(AKFB)in smart grids.Taking the covert characteristics of FDIAs into account,a novel detection method is proposed based on the designed AKF.Moreover,the adaptive threshold is proposed to solve the detection delay caused by a priori threshold in the current detection methods.Considering the case of multiple attacked sensor nodes,the AKFB-based isolation method is developed.To reduce the number of isolation iterations,a logical decision matrix scheme is designed.Finally,the effectiveness of the proposed detection and isolation method is demonstrated on an IEEE 22-bus smart grids.
文摘This work takes advantage of synergetic control theory and fractional calculus to develop and propose fractional synergetic control(FSC)strategy for Four Degrees of Freedom(4-DOF)robot manipulator.The proposed fractional synergetic control is designed to track a joint space as well as workspace desired trajectories.Fractional calculus gives more flexibility in the design since it has a wider stability region.Added to that,as stated in the literature,compared to a similar approach such as sliding mode control,the synergetic control approach converges faster to the equilibrium point,without chattering with a fast response.This paper proposes a new control strategy that takes advantage of fractional calculus and synergetic control theory.This proposed control strategy is tested experimentally on a 4-DOF manipulator to study the performance of the proposed control scheme.The stability of the closed-loop system is proved using the Lyapunov approach.The experimental results have shown that the proposed FSC design has achieved a good tracking performance.
基金the National Natural Science Foundation of China under Grants 61673012 and 11971240,respectively。
文摘In this paper,a criterion for the partially symmetric game(PSG)is derived by using the semitensor product approach.The dimension and the basis of the linear subspace composed of all the PSGs with respect to a given set of partial players are calculated.The testing equations with the minimum number are concretely determined,and the computational complexity is analysed.Finally,two examples are displayed to show the theoretical results.
文摘Augmented Reality is a technique that allows users to overlap digital information with their physical world.The Augmented Reality(AR)displays have an exceptional characteristic from the Human–Computer Interaction(HCI)perspective.Due to its increasing popularity and application in diverse domains,increasing user-friendliness and AR usage are critical.Context-aware is one approach since an AR application can adapt to the user,environment,needs and enhance ergonomic principles and functionality.This paper proposes the Intelligent Contextaware Augmented Reality Model(ICAARM)for Human–Computer Interaction systems.This study explores and reduces interaction uncertainty by semantically modeling user-specific interaction with context,allowing personalised interaction.Sensory information is captured from an AR device to understand user interactions and context.These depictions carry semantics to Augmented Reality applications about the user’s intention to interact with a specific device affordance.Thus,this study describes personalised gesture interaction in VR/AR applications for immersive/intelligent environments.
文摘Intelligent Control•Autonomous Decision•and Smart Future Xi’an,China 25–27 May 2024 http://www.ccdc.neu.edu.cn The 36th Chinese Control and Decision Conference(CCDC 2024)will be held in Xi’an,China,from 25 to 27 May 2024.Chinese Control and Decision Conference(CCDC)is an annual international conference,covering both theories and applications in all areas of control,system,and decision.Its purpose is to create a forum for scientists,engineers and practitioners from all over the world to present the latest developments in control,decision,robotics,automation,and other emerging technologies.CCDC provides a variety of opportunities for academic exchange and sharing,such as keynotes,distinguished lectures,preconference workshops,special sessions,tutorials,thematic forums,oral presentation sessions,interactive sessions,and so on.English is the official language for CCDC.Accepted papers will be submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore’s scope and quality requirements.
基金This work was supported by the National Natural Science Foundation of China[grant number 71501111],[grant number 71361002]Natural Science Foundation of Shandong Province under[grant number ZR2014JL046].
文摘Considering the cost of logistic service and the‘Free Shipping’strategy,two models of E-supply chain,respectively dominated by e-commerce platform or manufacturer are constructed,and the optimal decisions for each model is calculated in this paper.The research indicates that:the sales price is lower and the profit of manufacturer is higher in the mode dominated by manufacturer.On the other hand,the platform’s service-level is lower and the profit of platform is higher in the mode dominated by dominant platform.Further,the sales price,platform’s service and platform’s profit will increase with the growth of commission and decrease with the service cost elasticity coefficient.Contrarily,the profit of manufacturer will decrease with the growth of commission but increase with elasticity coefficient.And,the logistic price and profit of logistic enterprise are higher in the mode dominated by manufacturer,moreover,they will decrease with the growth of commission.
文摘The energy crisis has become a significant bottleneck in the country’s economic progress.But to end this age old problem,we have to capitalize on the chance,China Pakistan Economic Corridor(CPEC)investment provides,to its full potential.This study aims to help Pakistani government in selecting the best set of CPEC energy priority projects to be completed in the first wave of development.The second part of the research guides the small/medium scale industry and business owners to select the best available alternative for tackling the energy shortfall while CPEC projects are in the process of materialization.Forecasting electricity shortfall decrease and its impact on various economic/industrial sectors(like services,industrial,textile and agriculture)is also performed to gauge the effect of CPEC on the economy using linear regression.For decision analysis,the MCDM techniques employed are(AHP)along with(TOPSIS).This research generated a new list of recommended CPEC energy priority projects which are more evenly distributed across the country,catering more,to interest of the country as a whole.We also concluded solar panels to be the best alternative for small scale businesses,as short term solution while CPEC projects are under construction.
基金This work was supported in part by the National Natural Science Foundation of China(61773201,61673207 and 61622304).
文摘This paper reviews some main results and process concerning with fault diagnosis and accommodation with flight control applications.The fault detection and diagnosis including the quantitative and qualitative methods and the fault-tolerant control including passive and active schemes are introduced,respectively.The control designs and developments of the fault diagnosis and accommodation for continuous-time systems and discrete-time systems,the fault diagnosis and fault-tolerant control for switched systems and interconnected systems as well as the applied flight control research including hypersonic vehicle,spacecraft and helicopter systems are summarised.
文摘In this paper,a novel,dual-mode model predictive control framework is introduced that combines the dynamic window approach to navigation with generic path planning techniques through a dual-mode model predictive control framework.The planned path adds information on the connectivity of the free space to the obstacle avoidance capabilities of the dynamic window approach.This allows for guaranteed convergence to a goal location while navigating through an unknown environment at relatively high speeds.The framework is applied in a combined simulation/hardware implementation to demonstrate the computational feasibility and the ability to cope with the constraints of a dynamic system.
文摘This paper provides a brief review of the different optimisation strategies used in mobile robot simultaneous localisation and mapping(SLAM)problem.The focus is on the optimisation-based SLAM back end.The strategies are classified based on their purposes such as reducing the computational complexity,improving the convergence and improving the robustness.It is clearly pointed out that some approximations are made in some of the methods and there is always a trade-off between the computational complexity and the accuracy of the solution.The local submap joining is a strategy that has been used to address both the computational complexity and the convergence and is a flexible tool to be used in the SLAM back end.Although more research is needed to further improve the SLAM back end,nowadays there are quite a few relatively mature SLAM back end algorithms that can be used by SLAM researchers and users.