期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
一类非线性半定规划问题改进的序列线性化算法
1
作者 房亮 李化菊 《泰山学院学报》 2006年第6期9-13,共5页
针对一类非线性半定规划问题,提出一个改进的序列线性化算法.该方法能用于求解较大规模的优化问题,因为它处理的是比较简单的子问题.该算法利用l1-精确罚函数和信赖域型的全局优化方法,每步迭代需要解的子问题是一个二次半定规划问题,... 针对一类非线性半定规划问题,提出一个改进的序列线性化算法.该方法能用于求解较大规模的优化问题,因为它处理的是比较简单的子问题.该算法利用l1-精确罚函数和信赖域型的全局优化方法,每步迭代需要解的子问题是一个二次半定规划问题,它可以用已有的半定规划软件有效的解决.在某些假定条件下,证明了算法是全局收敛的. 展开更多
关键词 线性半定规划 序列线性化方法 l1-精确罚函数
下载PDF
ICPS multi-target constrained comprehensive security control based on DoS attacks energy grading detection and compensation
2
作者 HAN Yinlong HAN Xiaowu 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2024年第4期518-531,共14页
Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,fr... Aiming at the industry cyber-physical system(ICPS)where Denial-of-Service(DoS)attacks and actuator failure coexist,the integrated security control problem of ICPS under multi-objective constraints was studied.First,from the perspective of the defender,according to the differential impact of the system under DoS attacks of different energies,the DoS attacks energy grading detection standard was formulated,and the ICPS comprehensive security control framework was constructed.Secondly,a security transmission strategy based on event triggering was designed.Under the DoS attack energy classification detection mechanism,for large-energy attacks,the method based on time series analysis was considered to predict and compensate for lost data.Therefore,on the basis of passive and elastic response to small energy attacks,the active defense capability against DoS attacks was increased.Then by introducing the conecomplement linearization algorithm,the calculation methods of the state and fault estimation observer and the integrated safety controller were deduced,the goal of DoS attack active and passive hybrid intrusion tolerance and actuator failure active fault tolerance were realized.Finally,a simulation example of a four-capacity water tank system was given to verify the validity of the obtained conclusions. 展开更多
关键词 industry cyber-physical system(ICPS) Denial-of-Service(DoS)attacks energy grading detection security event triggering mechanism time series analysis methods cone complementary linearization
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部