期刊文献+
共找到1,261,666篇文章
< 1 2 250 >
每页显示 20 50 100
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
1
作者 Yongxia Shi Ehsan Nekouei 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期946-955,共10页
This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-trigger... This paper proposes a novel event-driven encrypted control framework for linear networked control systems(NCSs),which relies on two modified uniform quantization policies,the Paillier cryptosystem,and an event-triggered strategy.Due to the fact that only integers can work in the Pailler cryptosystem,both the real-valued control gain and system state need to be first quantized before encryption.This is dramatically different from the existing quantized control methods,where only the quantization of a single value,e.g.,the control input or the system state,is considered.To handle this issue,static and dynamic quantization policies are presented,which achieve the desired integer conversions and guarantee asymptotic convergence of the quantized system state to the equilibrium.Then,the quantized system state is encrypted and sent to the controller when the triggering condition,specified by a state-based event-triggered strategy,is satisfied.By doing so,not only the security and confidentiality of data transmitted over the communication network are protected,but also the ciphertext expansion phenomenon can be relieved.Additionally,by tactfully designing the quantization sensitivities and triggering error,the proposed event-driven encrypted control framework ensures the asymptotic stability of the overall closedloop system.Finally,a simulation example of the secure motion control for an inverted pendulum cart system is presented to evaluate the effectiveness of the theoretical results. 展开更多
关键词 Cyber-security encrypted control event-triggered control(ETC) networked control systems(NCSs) semi-homomorphic encryption
下载PDF
Ultimately Bounded Output Feedback Control for Networked Nonlinear Systems With Unreliable Communication Channel: A Buffer-Aided Strategy
2
作者 Yuhan Zhang Zidong Wang +2 位作者 Lei Zou Yun Chen Guoping Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1566-1578,共13页
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication... This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy. 展开更多
关键词 Buffer-aided strategy neural networks nonlinear control output-feedback control unreliable communication channel
下载PDF
Prediction-Based State Estimation and Compensation Control for Networked Systems With Communication Constraints and DoS Attacks
3
作者 Zhong-Hua Pang Qian Cao +1 位作者 Haibin Guo Zhe Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2352-2354,共3页
Dear Editor,This letter investigates the output tracking control issue of networked control systems(NCSs)with communication constraints and denial-of-service(DoS)attacks in the sensor-to-controller channel,both of whi... Dear Editor,This letter investigates the output tracking control issue of networked control systems(NCSs)with communication constraints and denial-of-service(DoS)attacks in the sensor-to-controller channel,both of which would induce random network delays. 展开更多
关键词 DOS SERVICE network
下载PDF
Novel Adaptive Memory Event-Triggered-Based Fuzzy Robust Control for Nonlinear Networked Systems via the Differential Evolution Algorithm
4
作者 Wei Qian Yanmin Wu Bo Shen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1836-1848,共13页
This article mainly investigates the fuzzy optimization robust control issue for nonlinear networked systems characterized by the interval type-2(IT2)fuzzy technique under a differential evolution algorithm.To provide... This article mainly investigates the fuzzy optimization robust control issue for nonlinear networked systems characterized by the interval type-2(IT2)fuzzy technique under a differential evolution algorithm.To provide a more reasonable utilization of the constrained communication channel,a novel adaptive memory event-triggered(AMET)mechanism is developed,where two event-triggered thresholds can be dynamically adjusted in the light of the current system information and the transmitted historical data.Sufficient conditions with less conservative design of the fuzzy imperfect premise matching(IPM)controller are presented by introducing the Wirtinger-based integral inequality,the information of membership functions(MFs)and slack matrices.Subsequently,under the IPM policy,a new MFs intelligent optimization technique that takes advantage of the differential evolution algorithm is first provided for IT2 TakagiSugeno(T-S)fuzzy systems to update the fuzzy controller MFs in real-time and achieve a better system control effect.Finally,simulation results demonstrate that the proposed control scheme can obtain better system performance in the case of using fewer communication resources. 展开更多
关键词 Adaptive memory event-triggered(AMET) differential evolution algorithm fuzzy optimization robust control interval type-2(IT2)fuzzy technique.
下载PDF
Finite-time Prescribed Performance Time-Varying Formation Control for Second-Order Multi-Agent Systems With Non-Strict Feedback Based on a Neural Network Observer 被引量:1
5
作者 Chi Ma Dianbiao Dong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第4期1039-1050,共12页
This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eli... This paper studies the problem of time-varying formation control with finite-time prescribed performance for nonstrict feedback second-order multi-agent systems with unmeasured states and unknown nonlinearities.To eliminate nonlinearities,neural networks are applied to approximate the inherent dynamics of the system.In addition,due to the limitations of the actual working conditions,each follower agent can only obtain the locally measurable partial state information of the leader agent.To address this problem,a neural network state observer based on the leader state information is designed.Then,a finite-time prescribed performance adaptive output feedback control strategy is proposed by restricting the sliding mode surface to a prescribed region,which ensures that the closed-loop system has practical finite-time stability and that formation errors of the multi-agent systems converge to the prescribed performance bound in finite time.Finally,a numerical simulation is provided to demonstrate the practicality and effectiveness of the developed algorithm. 展开更多
关键词 Finite-time control multi-agent systems neural network prescribed performance control time-varying formation control
下载PDF
The optimal atropine concentration for myopia control in Chinese children: a systematic review and network Metaanalysis 被引量:1
6
作者 Xiao-Yan Wang Hong-Wei Deng +7 位作者 Jian Yang Xue-Mei Zhu Feng-Ling Xiang Jing Tu Ming-Xue Huang Yun Wang Jin-Hua Gan Wei-Hua Yang 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第6期1128-1137,共10页
AIM:To figure out whether various atropine dosages may slow the progression of myopia in Chinese kids and teenagers and to determine the optimal atropine concentration for effectively slowing the progression of myopia... AIM:To figure out whether various atropine dosages may slow the progression of myopia in Chinese kids and teenagers and to determine the optimal atropine concentration for effectively slowing the progression of myopia.METHODS:A systematic search was conducted across the Cochrane Library,PubMed,Web of Science,EMBASE,CNKI,CBM,VIP,and Wanfang database,encompassing literature on slowing progression of myopia with varying atropine concentrations from database inception to January 17,2024.Data extraction and quality assessment were performed,and a network Meta-analysis was executed using Stata version 14.0 Software.Results were visually represented through graphs.RESULTS:Fourteen papers comprising 2475 cases were included;five different concentrations of atropine solution were used.The network Meta-analysis,along with the surface under the cumulative ranking curve(SUCRA),showed that 1%atropine(100%)>0.05%atropine(74.9%)>0.025%atropine(51.6%)>0.02%atropine(47.9%)>0.01%atropine(25.6%)>control in refraction change and 1%atropine(98.7%)>0.05%atropine(70.4%)>0.02%atropine(61.4%)>0.025%atropine(42%)>0.01%atropine(27.4%)>control in axial length(AL)change.CONCLUSION:In Chinese children and teenagers,the five various concentrations of atropine can reduce the progression of myopia.Although the network Meta-analysis showed that 1%atropine is the best one for controlling refraction and AL change,there is a high incidence of adverse effects with the use of 1%atropine.Therefore,we suggest that 0.05%atropine is optimal for Chinese children to slow myopia progression. 展开更多
关键词 ATROPINE China children and adolescents MYOPIA network Meta-analysis
下载PDF
A Fractional-Order Ultra-Local Model-Based Adaptive Neural Network Sliding Mode Control of n-DOF Upper-Limb Exoskeleton With Input Deadzone
7
作者 Dingxin He HaoPing Wang +1 位作者 Yang Tian Yida Guo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第3期760-781,共22页
This paper proposes an adaptive neural network sliding mode control based on fractional-order ultra-local model for n-DOF upper-limb exoskeleton in presence of uncertainties,external disturbances and input deadzone.Co... This paper proposes an adaptive neural network sliding mode control based on fractional-order ultra-local model for n-DOF upper-limb exoskeleton in presence of uncertainties,external disturbances and input deadzone.Considering the model complexity and input deadzone,a fractional-order ultra-local model is proposed to formulate the original dynamic system for simple controller design.Firstly,the control gain of ultra-local model is considered as a constant.The fractional-order sliding mode technique is designed to stabilize the closed-loop system,while fractional-order time-delay estimation is combined with neural network to estimate the lumped disturbance.Correspondingly,a fractional-order ultra-local model-based neural network sliding mode controller(FO-NNSMC) is proposed.Secondly,to avoid disadvantageous effect of improper gain selection on the control performance,the control gain of ultra-local model is considered as an unknown parameter.Then,the Nussbaum technique is introduced into the FO-NNSMC to deal with the stability problem with unknown gain.Correspondingly,a fractional-order ultra-local model-based adaptive neural network sliding mode controller(FO-ANNSMC) is proposed.Moreover,the stability analysis of the closed-loop system with the proposed method is presented by using the Lyapunov theory.Finally,with the co-simulations on virtual prototype of 7-DOF iReHave upper-limb exoskeleton and experiments on 2-DOF upper-limb exoskeleton,the obtained compared results illustrate the effectiveness and superiority of the proposed method. 展开更多
关键词 Adaptive control input deadzone model-free control n-DOF upper-limb exoskeleton neural network
下载PDF
Deep Learning Social Network Access Control Model Based on User Preferences
8
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
下载PDF
Self-Triggered Set Stabilization of Boolean Control Networks and Its Applications
9
作者 Rong Zhao Jun-e Feng Dawei Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1631-1642,共12页
Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control s... Set stabilization is one of the essential problems in engineering systems, and self-triggered control(STC) can save the storage space for interactive information, and can be successfully applied in networked control systems with limited communication resources. In this study, the set stabilization problem and STC design of Boolean control networks are investigated via the semi-tensor product technique. On the one hand, the largest control invariant subset is calculated in terms of the strongly connected components of the state transition graph, by which a graph-theoretical condition for set stabilization is derived. On the other hand, a characteristic function is exploited to determine the triggering mechanism and feasible controls. Based on this, the minimum-time and minimum-triggering open-loop, state-feedback and output-feedback STCs for set stabilization are designed,respectively. As classic applications of self-triggered set stabilization, self-triggered synchronization, self-triggered output tracking and self-triggered output regulation are discussed as well. Additionally, several practical examples are given to illustrate the effectiveness of theoretical results. 展开更多
关键词 Boolean control networks(BCNs) output regulation self-triggered control semi-tensor product of matrices set stabilization SYNCHRONIZATION
下载PDF
Tracking Control of Multi-Agent Systems Using a Networked Predictive PID Tracking Scheme 被引量:2
10
作者 Guo-Ping Liu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期216-225,共10页
With the rapid development of network technology and control technology,a networked multi-agent control system is a key direction of modern industrial control systems,such as industrial Internet systems.This paper stu... With the rapid development of network technology and control technology,a networked multi-agent control system is a key direction of modern industrial control systems,such as industrial Internet systems.This paper studies the tracking control problem of networked multi-agent systems with communication constraints,where each agent has no information on the dynamics of other agents except their outputs.A networked predictive proportional integral derivative(PPID)tracking scheme is proposed to achieve the desired tracking performance,compensate actively for communication delays,and simplify implementation in a distributed manner.This scheme combines the past,present and predictive information of neighbour agents to form a tracking error signal for each agent,and applies the proportional,integral,and derivative of the agent tracking error signal to control each individual agent.The criteria of the stability and output tracking consensus of multi-agent systems with the networked PPID tracking scheme are derived through detailed analysis on the closed-loop systems.The effectiveness of the networked PPID tracking scheme is illustrated via an example. 展开更多
关键词 Coordinative tracking control networked multiagent systems PID control predictive control
下载PDF
Target Controllability of Multi-Layer Networks With High-Dimensional Nodes
11
作者 Lifu Wang Zhaofei Li +1 位作者 Ge Guo Zhi Kong 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1999-2010,共12页
This paper studies the target controllability of multilayer complex networked systems,in which the nodes are highdimensional linear time invariant(LTI)dynamical systems,and the network topology is directed and weighte... This paper studies the target controllability of multilayer complex networked systems,in which the nodes are highdimensional linear time invariant(LTI)dynamical systems,and the network topology is directed and weighted.The influence of inter-layer couplings on the target controllability of multi-layer networks is discussed.It is found that even if there exists a layer which is not target controllable,the entire multi-layer network can still be target controllable due to the inter-layer couplings.For the multi-layer networks with general structure,a necessary and sufficient condition for target controllability is given by establishing the relationship between uncontrollable subspace and output matrix.By the derived condition,it can be found that the system may be target controllable even if it is not state controllable.On this basis,two corollaries are derived,which clarify the relationship between target controllability,state controllability and output controllability.For the multi-layer networks where the inter-layer couplings are directed chains and directed stars,sufficient conditions for target controllability of networked systems are given,respectively.These conditions are easier to verify than the classic criterion. 展开更多
关键词 High-dimensional nodes inter-layer couplings multi-layer networks target controllability
下载PDF
The Effect of Key Nodes on theMalware Dynamics in the Industrial Control Network
12
作者 Qiang Fu JunWang +1 位作者 Changfu Si Jiawei Liu 《Computers, Materials & Continua》 SCIE EI 2024年第4期329-349,共21页
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be... As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network. 展开更多
关键词 Key nodes dynamic model industrial control network SIMULATION
下载PDF
An intelligent control method based on artificial neural network for numerical flight simulation of the basic finner projectile with pitching maneuver
13
作者 Yiming Liang Guangning Li +3 位作者 Min Xu Junmin Zhao Feng Hao Hongbo Shi 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期663-674,共12页
In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a... In this paper,an intelligent control method applying on numerical virtual flight is proposed.The proposed algorithm is verified and evaluated by combining with the case of the basic finner projectile model and shows a good application prospect.Firstly,a numerical virtual flight simulation model based on overlapping dynamic mesh technology is constructed.In order to verify the accuracy of the dynamic grid technology and the calculation of unsteady flow,a numerical simulation of the basic finner projectile without control is carried out.The simulation results are in good agreement with the experiment data which shows that the algorithm used in this paper can also be used in the design and evaluation of the intelligent controller in the numerical virtual flight simulation.Secondly,combined with the real-time control requirements of aerodynamic,attitude and displacement parameters of the projectile during the flight process,the numerical simulations of the basic finner projectile’s pitch channel are carried out under the traditional PID(Proportional-Integral-Derivative)control strategy and the intelligent PID control strategy respectively.The intelligent PID controller based on BP(Back Propagation)neural network can realize online learning and self-optimization of control parameters according to the acquired real-time flight parameters.Compared with the traditional PID controller,the concerned control variable overshoot,rise time,transition time and steady state error and other performance indicators have been greatly improved,and the higher the learning efficiency or the inertia coefficient,the faster the system,the larger the overshoot,and the smaller the stability error.The intelligent control method applying on numerical virtual flight is capable of solving the complicated unsteady motion and flow with the intelligent PID control strategy and has a strong promotion to engineering application. 展开更多
关键词 Numerical virtual flight Intelligent control BP neural network PID Moving chimera grid
下载PDF
Autonomous Vehicle Platoons In Urban Road Networks:A Joint Distributed Reinforcement Learning and Model Predictive Control Approach
14
作者 Luigi D’Alfonso Francesco Giannini +3 位作者 Giuseppe Franzè Giuseppe Fedele Francesco Pupo Giancarlo Fortino 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期141-156,共16页
In this paper, platoons of autonomous vehicles operating in urban road networks are considered. From a methodological point of view, the problem of interest consists of formally characterizing vehicle state trajectory... In this paper, platoons of autonomous vehicles operating in urban road networks are considered. From a methodological point of view, the problem of interest consists of formally characterizing vehicle state trajectory tubes by means of routing decisions complying with traffic congestion criteria. To this end, a novel distributed control architecture is conceived by taking advantage of two methodologies: deep reinforcement learning and model predictive control. On one hand, the routing decisions are obtained by using a distributed reinforcement learning algorithm that exploits available traffic data at each road junction. On the other hand, a bank of model predictive controllers is in charge of computing the more adequate control action for each involved vehicle. Such tasks are here combined into a single framework:the deep reinforcement learning output(action) is translated into a set-point to be tracked by the model predictive controller;conversely, the current vehicle position, resulting from the application of the control move, is exploited by the deep reinforcement learning unit for improving its reliability. The main novelty of the proposed solution lies in its hybrid nature: on one hand it fully exploits deep reinforcement learning capabilities for decisionmaking purposes;on the other hand, time-varying hard constraints are always satisfied during the dynamical platoon evolution imposed by the computed routing decisions. To efficiently evaluate the performance of the proposed control architecture, a co-design procedure, involving the SUMO and MATLAB platforms, is implemented so that complex operating environments can be used, and the information coming from road maps(links,junctions, obstacles, semaphores, etc.) and vehicle state trajectories can be shared and exchanged. Finally by considering as operating scenario a real entire city block and a platoon of eleven vehicles described by double-integrator models, several simulations have been performed with the aim to put in light the main f eatures of the proposed approach. Moreover, it is important to underline that in different operating scenarios the proposed reinforcement learning scheme is capable of significantly reducing traffic congestion phenomena when compared with well-reputed competitors. 展开更多
关键词 Distributed model predictive control distributed reinforcement learning routing decisions urban road networks
下载PDF
A Probabilistic Trust Model and Control Algorithm to Protect 6G Networks against Malicious Data Injection Attacks in Edge Computing Environments 被引量:1
15
作者 Borja Bordel Sánchez Ramón Alcarria Tomás Robles 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期631-654,共24页
Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control l... Future 6G communications are envisioned to enable a large catalogue of pioneering applications.These will range from networked Cyber-Physical Systems to edge computing devices,establishing real-time feedback control loops critical for managing Industry 5.0 deployments,digital agriculture systems,and essential infrastructures.The provision of extensive machine-type communications through 6G will render many of these innovative systems autonomous and unsupervised.While full automation will enhance industrial efficiency significantly,it concurrently introduces new cyber risks and vulnerabilities.In particular,unattended systems are highly susceptible to trust issues:malicious nodes and false information can be easily introduced into control loops.Additionally,Denialof-Service attacks can be executed by inundating the network with valueless noise.Current anomaly detection schemes require the entire transformation of the control software to integrate new steps and can only mitigate anomalies that conform to predefined mathematical models.Solutions based on an exhaustive data collection to detect anomalies are precise but extremely slow.Standard models,with their limited understanding of mobile networks,can achieve precision rates no higher than 75%.Therefore,more general and transversal protection mechanisms are needed to detect malicious behaviors transparently.This paper introduces a probabilistic trust model and control algorithm designed to address this gap.The model determines the probability of any node to be trustworthy.Communication channels are pruned for those nodes whose probability is below a given threshold.The trust control algorithmcomprises three primary phases,which feed themodel with three different probabilities,which are weighted and combined.Initially,anomalous nodes are identified using Gaussian mixture models and clustering technologies.Next,traffic patterns are studied using digital Bessel functions and the functional scalar product.Finally,the information coherence and content are analyzed.The noise content and abnormal information sequences are detected using a Volterra filter and a bank of Finite Impulse Response filters.An experimental validation based on simulation tools and environments was carried out.Results show the proposed solution can successfully detect up to 92%of malicious data injection attacks. 展开更多
关键词 6G networks noise injection attacks Gaussian mixture model Bessel function traffic filter Volterra filter
下载PDF
Cluster DetectionMethod of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network
16
作者 Ruchun Jia Jianwei Zhang +2 位作者 Yi Lin Yunxiang Han Feike Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2523-2546,共24页
In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set f... In order to enhance the accuracy of Air Traffic Control(ATC)cybersecurity attack detection,in this paper,a new clustering detection method is designed for air traffic control network security attacks.The feature set for ATC cybersecurity attacks is constructed by setting the feature states,adding recursive features,and determining the feature criticality.The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data.An autoencoder is introduced into the AI(artificial intelligence)algorithm to encode and decode the characteristics of ATC network security attack behavior to reduce the dimensionality of the ATC network security attack behavior data.Based on the above processing,an unsupervised learning algorithm for clustering detection of ATC network security attacks is designed.First,determine the distance between the clustering clusters of ATC network security attack behavior characteristics,calculate the clustering threshold,and construct the initial clustering center.Then,the new average value of all feature objects in each cluster is recalculated as the new cluster center.Second,it traverses all objects in a cluster of ATC network security attack behavior feature data.Finally,the cluster detection of ATC network security attack behavior is completed by the computation of objective functions.The experiment took three groups of experimental attack behavior data sets as the test object,and took the detection rate,false detection rate and recall rate as the test indicators,and selected three similar methods for comparative test.The experimental results show that the detection rate of this method is about 98%,the false positive rate is below 1%,and the recall rate is above 97%.Research shows that this method can improve the detection performance of security attacks in air traffic control network. 展开更多
关键词 Air traffic control network security attack behavior cluster detection behavioral characteristics information gain cluster threshold automatic encoder
下载PDF
Coordinated Voltage Control of Distribution Network ConsideringMultiple Types of Electric Vehicles
17
作者 Liang Liu Guangda Xu +3 位作者 Yuan Zhao Yi Lu Yu Li Jing Gao 《Energy Engineering》 EI 2024年第2期377-404,共28页
The couple between the power network and the transportation network(TN)is deepening gradually with the increasing penetration rate of electric vehicles(EV),which also poses a great challenge to the traditional voltage... The couple between the power network and the transportation network(TN)is deepening gradually with the increasing penetration rate of electric vehicles(EV),which also poses a great challenge to the traditional voltage control scheme.In this paper,we propose a coordinated voltage control strategy for the active distribution networks considering multiple types of EV.In the first stage,the action of on-load tap changer and capacitor banks,etc.,are determined by optimal power flow calculation,and the node electricity price is also determined based on dynamic time-of-use tariff mechanism.In the second stage,multiple operating scenarios of multiple types of EVs such as cabs,private cars and buses are considered,and the scheduling results of each EV are solved by building an optimization model based on constraints such as queuing theory,Floyd-Warshall algorithm and traffic flow information.In the third stage,the output power of photovoltaic and energy storage systems is fine-tuned in the normal control mode.The charging power of EVs is also regulated in the emergency control mode to reduce the voltage deviation,and the amount of regulation is calculated based on the fair voltage control mode of EVs.Finally,we test the modified IEEE 33-bus distribution system coupled with the 24-bus Beijing TN.The simulation results show that the proposed scheme can mitigate voltage violations well. 展开更多
关键词 Electric vehicle transportation network voltage control queuing theory
下载PDF
Time-varying parameters estimation with adaptive neural network EKF for missile-dual control system
18
作者 YUAN Yuqi ZHOU Di +1 位作者 LI Junlong LOU Chaofei 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期451-462,共12页
In this paper, a filtering method is presented to estimate time-varying parameters of a missile dual control system with tail fins and reaction jets as control variables. In this method, the long-short-term memory(LST... In this paper, a filtering method is presented to estimate time-varying parameters of a missile dual control system with tail fins and reaction jets as control variables. In this method, the long-short-term memory(LSTM) neural network is nested into the extended Kalman filter(EKF) to modify the Kalman gain such that the filtering performance is improved in the presence of large model uncertainties. To avoid the unstable network output caused by the abrupt changes of system states,an adaptive correction factor is introduced to correct the network output online. In the process of training the network, a multi-gradient descent learning mode is proposed to better fit the internal state of the system, and a rolling training is used to implement an online prediction logic. Based on the Lyapunov second method, we discuss the stability of the system, the result shows that when the training error of neural network is sufficiently small, the system is asymptotically stable. With its application to the estimation of time-varying parameters of a missile dual control system, the LSTM-EKF shows better filtering performance than the EKF and adaptive EKF(AEKF) when there exist large uncertainties in the system model. 展开更多
关键词 long-short-term memory(LSTM)neural network extended Kalman filter(EKF) rolling training time-varying parameters estimation missile dual control system
下载PDF
Versatile and controlled quantum teleportation network
19
作者 周瑶瑶 梅鹏娴 +4 位作者 刘艳红 吴量 李雁翔 闫智辉 贾晓军 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期415-423,共9页
A quantum teleportation network involving multiple users is essential for future quantum internet.So far,controlled quantum teleportation has been demonstrated in a three-user network.However,versatile and controlled ... A quantum teleportation network involving multiple users is essential for future quantum internet.So far,controlled quantum teleportation has been demonstrated in a three-user network.However,versatile and controlled quantum teleportation network involving more users is in demand,which satisfies different combinations of users for practical requirements.Here we propose a highly versatile and controlled teleportation network that can switch among various combinations of different users.We use a single continuous-variable six-partite Greenberger-Horne-Zeilinger(GHZ)state to realize such a task by choosing the different measurement and feedback operations.The controlled teleportation network,which includes one sub-network,two sub-networks and three sub-networks,can be realized for different application of user combinations.Furthermore,the coherent feedback control(CFC)can manipulate and improve the teleportation performance.Our approach is flexible and scalable,and would provide a versatile platform for demonstrations of complex quantum communication and quantum computing protocols. 展开更多
关键词 quantum teleportation coherent feedback control VERSATILE controlled transformation
下载PDF
Multicenter Clinical Randomized Controlled Trial and Network Pharmacology Analysis of Zhenzhu Qingyuan Granules for the Treatment of Gastroesophageal Reflux Disease
20
作者 Mengge Li Zhibo Dang +7 位作者 Peiguo Qian Zhenhuan Yang Lei Luo Bo Li Xingzhou Xia Yingjie Ma Zhongqin Dang Yuliang Wang 《Chinese Medicine and Natural Products》 CAS 2024年第3期106-116,共11页
Objective To evaluate the clinical efficacy and safety of Zhenzhu Qingyuan Granules through a clinical randomized controlled trial and to analyze the potential action targets and pathways of this formula using network... Objective To evaluate the clinical efficacy and safety of Zhenzhu Qingyuan Granules through a clinical randomized controlled trial and to analyze the potential action targets and pathways of this formula using network pharmacology.Methods Patients with gastroesophageal reflux disease(GERD)of liver–stomach stagnant heat pattern who met the inclusion and exclusion criteria were randomly divided into the control group and the observation group.The control group received oral rabeprazole,whereas the observation group were given Zhenzhu Qingyuan Granules in addition to the rabeprazole.The treatment duration was 8 weeks.Clinical efficacy was observed in both groups after 8 weeks.Network pharmacology was used to analyze the action targets of ZhenzhuQingyuanGranules and the genes related to GERD,and core targets were inferred.Gene Ontology and Kyoto Encyclopedia of Genes and Genomes enrichment analyses were conducted to explore the potential mechanisms of this formula.Results The clinical research results showed that the total effective rate in the treatment group was 92.68%,compared with 70.00%in the control group,with a statistically significant difference(p<0.05).After treatment,both Chinese medicine syndrome score and endoscopic score improved in both groups compared with before treatment(p<0.05),and the treatment group showed greater improvement than the control group(p<0.05).Network pharmacology identified effective components of Zhenzhu Qingyuan Granules for treating GERD,including quercetin,luteolin,andβ-sitosterol,with potential action targets such as tumor protein 53(TP53),protein kinase B(AKT1),and tumor necrosis factor.Conclusion Zhenzhu Qingyuan Granules can significantly improve clinical symptoms in patients with GERD of liver–stomach stagnated heat pattern,enhance clinical efficacy,and have high safety.This formula may exert therapeutic effects through multiple targets and pathways. 展开更多
关键词 gastroesophageal reflux disease Zhenzhu Qingyuan Granules liver–stomach stagnated heat syndrome randomized controlled trial network pharmacology
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部