Timely acquisition of rescue target information is critical for emergency response after a flood disaster.Unmanned Aerial Vehicles(UAVs)equipped with remote sensing capabilities offer distinct advantages,including hig...Timely acquisition of rescue target information is critical for emergency response after a flood disaster.Unmanned Aerial Vehicles(UAVs)equipped with remote sensing capabilities offer distinct advantages,including high-resolution imagery and exceptional mobility,making them well suited for monitoring flood extent and identifying rescue targets during floods.However,there are some challenges in interpreting rescue information in real time from flood images captured by UAVs,such as the complexity of the scenarios of UAV images,the lack of flood rescue target detection datasets and the limited real-time processing capabilities of the airborne on-board platform.Thus,we propose a real-time rescue target detection method for UAVs that is capable of efficiently delineating flood extent and identifying rescue targets(i.e.,pedestrians and vehicles trapped by floods).The proposed method achieves real-time rescue information extraction for UAV platforms by lightweight processing and fusion of flood extent extraction model and target detection model.The flood inundation range is extracted by the proposed method in real time and detects targets such as people and vehicles to be rescued based on this layer.Our experimental results demonstrate that the Intersection over Union(IoU)for flood water extraction reaches an impressive 80%,and the IoU for real-time flood water extraction stands at a commendable 76.4%.The information on flood stricken targets extracted by this method in real time can be used for flood emergency rescue.展开更多
This paper investigates the prescribed-time control(PTC) problem for a class of strict-feedback systems subject to non-vanishing uncertainties. The coexistence of mismatched uncertainties and non-vanishing disturbance...This paper investigates the prescribed-time control(PTC) problem for a class of strict-feedback systems subject to non-vanishing uncertainties. The coexistence of mismatched uncertainties and non-vanishing disturbances makes PTC synthesis nontrivial. In this work, a control method that does not involve infinite time-varying gain is proposed, leading to a practical and global prescribed time tracking control solution for the strict-feedback systems, in spite of both the mismatched and nonvanishing uncertainties. Different from methods based on control switching to avoid the issue of infinite control gain that involves control discontinuity at the switching point, in our method a softening unit is exclusively included to ensure the continuity of the control action. Furthermore, in contrast to most existing prescribed-time control works where the control scheme is only valid on a finite time interval, in this work, the proposed control scheme is valid on the entire time interval. In addition, the prior information on the upper or lower bound of gi is not in need,enlarging the applicability of the proposed method. Both the theoretical analysis and numerical simulation confirm the effectiveness of the proposed control algorithm.展开更多
This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynami...This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynamic ETM with global information of the MASs is first designed.Then,a distributed dynamic ETM which only uses local information is developed for the MASs with large-scale networks.It is shown that the semi-global consensus of the MASs can be achieved by the designed bounded control protocol where the Zeno phenomenon is eliminated by a designable minimum inter-event time.In addition,it is easier to find a trade-off between the convergence rate and the minimum inter-event time by an adjustable parameter.Furthermore,the results are extended to regional consensus of the MASs with the bounded control protocol.Numerical simulations show the effectiveness of the proposed approach.展开更多
Due to the impact of source-load prediction power errors and uncertainties,the actual operation of the park will have a wide range of fluctuations compared with the expected state,resulting in its inability to achieve...Due to the impact of source-load prediction power errors and uncertainties,the actual operation of the park will have a wide range of fluctuations compared with the expected state,resulting in its inability to achieve the expected economy.This paper constructs an operating simulation model of the park power grid operation considering demand response and proposes a multi-time scale operating simulation method that combines day-ahead optimization and model predictive control(MPC).In the day-ahead stage,an operating simulation plan that comprehensively considers the user’s side comfort and operating costs is proposed with a long-term time scale of 15 min.In order to cope with power fluctuations of photovoltaic,wind turbine and conventional load,MPC is used to track and roll correct the day-ahead operating simulation plan in the intra-day stage to meet the actual operating operation status of the park.Finally,the validity and economy of the operating simulation strategy are verified through the analysis of arithmetic examples.展开更多
Background: Sub arachnoid block (SAB) performed by traditional landmark palpation technique can be inaccurate. This problem is exacerbated by altered patient anatomy due to obesity and age-related changes. A pre-proce...Background: Sub arachnoid block (SAB) performed by traditional landmark palpation technique can be inaccurate. This problem is exacerbated by altered patient anatomy due to obesity and age-related changes. A pre-procedural ultrasound scan of the lumbar spine has been shown to be of benefit in guiding lumbar epidural insertion in obstetric patients. Information on the use of real-time ultrasound (RUS) guided SAB, to date, been limited. This study compared RUS guided SAB to traditional landmark guided technique in patients undergoing spinal anesthesia for different surgical procedures. Methods: This was a prospective, single center, comparative observational study conducted in the department of anesthesiology at our center. 560 patients who underwent spinal anesthesia either by landmark based technique or real-time ultrasound-guided methods. The primary outcome was the first attempt success rate of dural puncture when employing the two methods. Results: Baseline characteristics were similar in the two study groups. The first attempt success rate of dural puncture in landmark guided group was 64.3% compared to 72.6% in the ultrasound guided group. This difference was not statistically significant. The procedure performance time was significantly shorter with landmark palpation compared to use of real-time ultrasound guided method. Conclusion: Use of RUS-guided technique does not significantly improve the first attempt success rate of SAB dural puncture during spinal anesthesia compared to the traditional landmark-guided technique.展开更多
To optimize the self-organization network, self-adaptation, real-time monitoring, remote management capability, and equipment reuse level of the meteorological station supporting the portable groundwater circulation w...To optimize the self-organization network, self-adaptation, real-time monitoring, remote management capability, and equipment reuse level of the meteorological station supporting the portable groundwater circulation wells, and to provide real-time and effective technical services and environmental data support for groundwater remediation, a real-time monitoring system design of the meteorological station supporting the portable groundwater circulation wells based on the existing equipment is proposed. A variety of environmental element information is collected and transmitted to the embedded web server by the intelligent weather transmitter, and then processed by the algorithm and stored internally, displayed locally, and published on the web. The system monitoring algorithm and user interface are designed in the CNWSCADA development environment to realize real-time processing and analysis of environmental data and monitoring, control, management, and maintenance of the system status. The PLC-controlled photovoltaic power generating panels and lithium battery packs are in line with the concept of energy saving and emission reduction, and at the same time, as an emergency power supply to guarantee the safety of equipment and data when the utility power fails to meet the requirements. The experiment proves that the system has the characteristics of remote control, real-time interaction, simple station deployment, reliable operation, convenient maintenance, and green environment protection, which is conducive to improving the comprehensive utilization efficiency of various types of environmental information and providing reliable data support, theoretical basis and guidance suggestions for the research of groundwater remediation technology and its disciplines, and the research and development of the movable groundwater cycling well monitoring system.展开更多
Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The m...Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
基金National Natural Science Foundation of China(No.42271416)Guangxi Science and Technology Major Project(No.AA22068072)Shennongjia National Park Resources Comprehensive Investigation Research Project(No.SNJNP2023015).
文摘Timely acquisition of rescue target information is critical for emergency response after a flood disaster.Unmanned Aerial Vehicles(UAVs)equipped with remote sensing capabilities offer distinct advantages,including high-resolution imagery and exceptional mobility,making them well suited for monitoring flood extent and identifying rescue targets during floods.However,there are some challenges in interpreting rescue information in real time from flood images captured by UAVs,such as the complexity of the scenarios of UAV images,the lack of flood rescue target detection datasets and the limited real-time processing capabilities of the airborne on-board platform.Thus,we propose a real-time rescue target detection method for UAVs that is capable of efficiently delineating flood extent and identifying rescue targets(i.e.,pedestrians and vehicles trapped by floods).The proposed method achieves real-time rescue information extraction for UAV platforms by lightweight processing and fusion of flood extent extraction model and target detection model.The flood inundation range is extracted by the proposed method in real time and detects targets such as people and vehicles to be rescued based on this layer.Our experimental results demonstrate that the Intersection over Union(IoU)for flood water extraction reaches an impressive 80%,and the IoU for real-time flood water extraction stands at a commendable 76.4%.The information on flood stricken targets extracted by this method in real time can be used for flood emergency rescue.
基金supported by the National Natural Science Foundation of China (61991400, 61991403, 62273064, 62250710167,61860206008, 61933012, 62203078)in part by the National Key Research and Development Program of China (2022YFB4701400/4701401)+1 种基金the Innovation Support Program for International Students Returning to China(cx2022016)the CAAI-Huawei MindSpore Open Fund。
文摘This paper investigates the prescribed-time control(PTC) problem for a class of strict-feedback systems subject to non-vanishing uncertainties. The coexistence of mismatched uncertainties and non-vanishing disturbances makes PTC synthesis nontrivial. In this work, a control method that does not involve infinite time-varying gain is proposed, leading to a practical and global prescribed time tracking control solution for the strict-feedback systems, in spite of both the mismatched and nonvanishing uncertainties. Different from methods based on control switching to avoid the issue of infinite control gain that involves control discontinuity at the switching point, in our method a softening unit is exclusively included to ensure the continuity of the control action. Furthermore, in contrast to most existing prescribed-time control works where the control scheme is only valid on a finite time interval, in this work, the proposed control scheme is valid on the entire time interval. In addition, the prior information on the upper or lower bound of gi is not in need,enlarging the applicability of the proposed method. Both the theoretical analysis and numerical simulation confirm the effectiveness of the proposed control algorithm.
基金supported in part by the National Natural Science Foundation of China(51939001,61976033,62273072)the Natural Science Foundation of Sichuan Province (2022NSFSC0903)。
文摘This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynamic ETM with global information of the MASs is first designed.Then,a distributed dynamic ETM which only uses local information is developed for the MASs with large-scale networks.It is shown that the semi-global consensus of the MASs can be achieved by the designed bounded control protocol where the Zeno phenomenon is eliminated by a designable minimum inter-event time.In addition,it is easier to find a trade-off between the convergence rate and the minimum inter-event time by an adjustable parameter.Furthermore,the results are extended to regional consensus of the MASs with the bounded control protocol.Numerical simulations show the effectiveness of the proposed approach.
基金supported by the Science and Technology Project of State Grid Shanxi Electric Power Research Institute:Research on Data-Driven New Power System Operation Simulation and Multi Agent Control Strategy(52053022000F).
文摘Due to the impact of source-load prediction power errors and uncertainties,the actual operation of the park will have a wide range of fluctuations compared with the expected state,resulting in its inability to achieve the expected economy.This paper constructs an operating simulation model of the park power grid operation considering demand response and proposes a multi-time scale operating simulation method that combines day-ahead optimization and model predictive control(MPC).In the day-ahead stage,an operating simulation plan that comprehensively considers the user’s side comfort and operating costs is proposed with a long-term time scale of 15 min.In order to cope with power fluctuations of photovoltaic,wind turbine and conventional load,MPC is used to track and roll correct the day-ahead operating simulation plan in the intra-day stage to meet the actual operating operation status of the park.Finally,the validity and economy of the operating simulation strategy are verified through the analysis of arithmetic examples.
文摘Background: Sub arachnoid block (SAB) performed by traditional landmark palpation technique can be inaccurate. This problem is exacerbated by altered patient anatomy due to obesity and age-related changes. A pre-procedural ultrasound scan of the lumbar spine has been shown to be of benefit in guiding lumbar epidural insertion in obstetric patients. Information on the use of real-time ultrasound (RUS) guided SAB, to date, been limited. This study compared RUS guided SAB to traditional landmark guided technique in patients undergoing spinal anesthesia for different surgical procedures. Methods: This was a prospective, single center, comparative observational study conducted in the department of anesthesiology at our center. 560 patients who underwent spinal anesthesia either by landmark based technique or real-time ultrasound-guided methods. The primary outcome was the first attempt success rate of dural puncture when employing the two methods. Results: Baseline characteristics were similar in the two study groups. The first attempt success rate of dural puncture in landmark guided group was 64.3% compared to 72.6% in the ultrasound guided group. This difference was not statistically significant. The procedure performance time was significantly shorter with landmark palpation compared to use of real-time ultrasound guided method. Conclusion: Use of RUS-guided technique does not significantly improve the first attempt success rate of SAB dural puncture during spinal anesthesia compared to the traditional landmark-guided technique.
文摘To optimize the self-organization network, self-adaptation, real-time monitoring, remote management capability, and equipment reuse level of the meteorological station supporting the portable groundwater circulation wells, and to provide real-time and effective technical services and environmental data support for groundwater remediation, a real-time monitoring system design of the meteorological station supporting the portable groundwater circulation wells based on the existing equipment is proposed. A variety of environmental element information is collected and transmitted to the embedded web server by the intelligent weather transmitter, and then processed by the algorithm and stored internally, displayed locally, and published on the web. The system monitoring algorithm and user interface are designed in the CNWSCADA development environment to realize real-time processing and analysis of environmental data and monitoring, control, management, and maintenance of the system status. The PLC-controlled photovoltaic power generating panels and lithium battery packs are in line with the concept of energy saving and emission reduction, and at the same time, as an emergency power supply to guarantee the safety of equipment and data when the utility power fails to meet the requirements. The experiment proves that the system has the characteristics of remote control, real-time interaction, simple station deployment, reliable operation, convenient maintenance, and green environment protection, which is conducive to improving the comprehensive utilization efficiency of various types of environmental information and providing reliable data support, theoretical basis and guidance suggestions for the research of groundwater remediation technology and its disciplines, and the research and development of the movable groundwater cycling well monitoring system.
文摘Aiming at the problem of low accuracy of traditional target detection methods for target detection in endoscopes in substation environments, a CNN-based real-time detection method for masked targets is proposed. The method adopts the overall design of backbone network, detection network and algorithmic parameter optimisation method, completes the model training on the self-constructed occlusion target dataset, and adopts the multi-scale perception method for target detection. The HNM algorithm is used to screen positive and negative samples during the training process, and the NMS algorithm is used to post-process the prediction results during the detection process to improve the detection efficiency. After experimental validation, the obtained model has the multi-class average predicted value (mAP) of the dataset. It has general advantages over traditional target detection methods. The detection time of a single target on FDDB dataset is 39 ms, which can meet the need of real-time target detection. In addition, the project team has successfully deployed the method into substations and put it into use in many places in Beijing, which is important for achieving the anomaly of occlusion target detection.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].