This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication...This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy.展开更多
Alice Munro,a famous Canadian Canadian short-story writer.She gained the Nobel Prize for Literature in 2013.Munro’s works focus on women and adolescents.She also writes about the illness and love of the elderly.“The...Alice Munro,a famous Canadian Canadian short-story writer.She gained the Nobel Prize for Literature in 2013.Munro’s works focus on women and adolescents.She also writes about the illness and love of the elderly.“The Bear Came over the Mountain”is one of them.In this story,Munro adopts unreliable narration to depict love between Grant and Fiona.This paper aims to study the love writing and its unreliable narration in this story.Based on the text of love writing,this paper analyzes the specific strategies of unreliable narration.The author believes that the unreliable narration of the love text in the story can be divided into the unreliable narration of character type and information type.Through analysis of these two types of narration in the story,special meaning of unreliable narration to describe love can be found.Besides,Munro’s description also contains her own insight of love:the course of true love does not always run smooth.展开更多
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control systems.Remote state esti...Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control systems.Remote state estimation(RSE)is an indispensable functional module of CPSs.Recently,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance degradation.This paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against RSE.Firstly,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of RSE.Secondly,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from adversaries.Thirdly,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'perspectives.Finally,several challenges and open problems are presented to inspire further exploration and future research in this field.展开更多
Different from traditional aggregation method, the unreliable buffers are originally considered and a more general aggregation method is offered, in which not only the unreliable buffers are considered, but also the p...Different from traditional aggregation method, the unreliable buffers are originally considered and a more general aggregation method is offered, in which not only the unreliable buffers are considered, but also the probabilities of system states are obtained by a discrete model rather than the continuous flow model of unreliable manufacturing systems. The solution technique is offered to get the system sate probabilities. The method advances the traditional system aggregation techniques. Numerical results specify the extended aggregation method and also show that the unreliable limited buffers have a strong impact on the efficiency of the production lines.展开更多
This paper mainly investigates the connectivity of the unreliable sensor grid network. We consider an unreliable sensor grid network with mn nodes placed in a certain planar area A, and we assume that each node has in...This paper mainly investigates the connectivity of the unreliable sensor grid network. We consider an unreliable sensor grid network with mn nodes placed in a certain planar area A, and we assume that each node has independent failure probability p and has the same transmission range R. This paper presents a new method for calculating the connectivity probability of the network, which uses thorough mathematical methods to derive the relationship among the network connectivity probability, the probability that a node is "failed" (not active), the numbers of node, and the node's transmission range in unreliable sensor networks. Our approach is more useful and efficient for given problem and conditions. Such as the numerical calculating results indicate that, for a 100×100 size sensot network, if node failure probability is bounded 0.5%, even if the transmission range is small (such as R = 10), we can still maintain very high connectivity probability (reach 95.8%). On the other hand, the simulation results show that building high connectivity probability is entirely possible on unreliable sensor grid networks.展开更多
The work deals with the development of analytical model of multichannel technical queuing system with unreliable servers and input memory where server failure flows and incoming request flows comply with Poissonian la...The work deals with the development of analytical model of multichannel technical queuing system with unreliable servers and input memory where server failure flows and incoming request flows comply with Poissonian laws, while the flows of failed facilities repairs and flows of incoming requests comply with exponential laws of probability distribution. Random process of system change-over is a Markovian process with continuous time and discrete states. Relations binding basic parameters and output characteristics of the system indicated are obtained as probabilities of system staying in the given moment in one of the possible states. The proposed model is the most generalized compared to some models known in literature which could be considered as special cases of the considered model.展开更多
Based on rhetorical research methods of the unreliability,the paper intends to explore the unreliable narrative strategies of the narrator in Grace Paley's The Loudest Voice from the perspectives of the Wayne Boot...Based on rhetorical research methods of the unreliability,the paper intends to explore the unreliable narrative strategies of the narrator in Grace Paley's The Loudest Voice from the perspectives of the Wayne Booth's criterion of the distance between the narrator and the implied author and James Phelan's extension of unreliability on the basis of classical rhetorical narratology,point⁃ing out that the unreliability serves as the narrative trap which is set up to reveal the inner theme of the work:"The loudest voice"-what the protagonist thought she certainly possessed was only her illusion instead of the truth,and Eastern European Jewish com⁃munity was de facto marginalized by the mainstream culture at that time.展开更多
The Tell-Tale Heart is a short story by Edgar Allan Poe. The story is first-person narrative of a narrator who murdered an old man with a clouded eye. This paper aims at identifying the speaker"I"as an unrel...The Tell-Tale Heart is a short story by Edgar Allan Poe. The story is first-person narrative of a narrator who murdered an old man with a clouded eye. This paper aims at identifying the speaker"I"as an unreliable narrator through analyzing the motivation, process and confession of the crime. It is found out that the narrator symbolizes man of evil, while, the old man's vulture eye symbolizes virtue. It's a story about the conflict between evil and virtue.展开更多
As an encyclopedic novel and the summit of Chinese classical literary creation,Hongloumeng has not received due critical attention to its unusual narrative style,let alone abundant unreliable narrative.From unreliable...As an encyclopedic novel and the summit of Chinese classical literary creation,Hongloumeng has not received due critical attention to its unusual narrative style,let alone abundant unreliable narrative.From unreliable narration of narrator and character,this research probes into effective translation strategies to achieve a balance between source text and target text,in light of a comparative analysis of typical illustrations taken from A Dream of Red Mansions and The Story of the Stone.展开更多
基金supported in part by the National Natural Science Foundation of China (61933007,62273087,U22A2044,61973102,62073180)the Shanghai Pujiang Program of China (22PJ1400400)+1 种基金the Royal Society of the UKthe Alexander von Humboldt Foundation of Germany。
文摘This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy.
文摘Alice Munro,a famous Canadian Canadian short-story writer.She gained the Nobel Prize for Literature in 2013.Munro’s works focus on women and adolescents.She also writes about the illness and love of the elderly.“The Bear Came over the Mountain”is one of them.In this story,Munro adopts unreliable narration to depict love between Grant and Fiona.This paper aims to study the love writing and its unreliable narration in this story.Based on the text of love writing,this paper analyzes the specific strategies of unreliable narration.The author believes that the unreliable narration of the love text in the story can be divided into the unreliable narration of character type and information type.Through analysis of these two types of narration in the story,special meaning of unreliable narration to describe love can be found.Besides,Munro’s description also contains her own insight of love:the course of true love does not always run smooth.
基金the Natural Sciences and Engineering Research Council(NSERC)of Canada。
文摘Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control systems.Remote state estimation(RSE)is an indispensable functional module of CPSs.Recently,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance degradation.This paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against RSE.Firstly,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of RSE.Secondly,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from adversaries.Thirdly,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'perspectives.Finally,several challenges and open problems are presented to inspire further exploration and future research in this field.
基金Great Technology Innovation of Gansu Province,China (No.2GS063-A52-005-01)Natural Science Foundation of Gansu Province,China (No.3ZS062-B25-034)Research Item of Education Department of Gansu Province,China (No.0703-06)
文摘Different from traditional aggregation method, the unreliable buffers are originally considered and a more general aggregation method is offered, in which not only the unreliable buffers are considered, but also the probabilities of system states are obtained by a discrete model rather than the continuous flow model of unreliable manufacturing systems. The solution technique is offered to get the system sate probabilities. The method advances the traditional system aggregation techniques. Numerical results specify the extended aggregation method and also show that the unreliable limited buffers have a strong impact on the efficiency of the production lines.
基金Supported by the National Natural Science Foundation of China(90412012) the Natural Science Foundation of Guangdong Province andthe Post-doctoral Science Foundation of China
文摘This paper mainly investigates the connectivity of the unreliable sensor grid network. We consider an unreliable sensor grid network with mn nodes placed in a certain planar area A, and we assume that each node has independent failure probability p and has the same transmission range R. This paper presents a new method for calculating the connectivity probability of the network, which uses thorough mathematical methods to derive the relationship among the network connectivity probability, the probability that a node is "failed" (not active), the numbers of node, and the node's transmission range in unreliable sensor networks. Our approach is more useful and efficient for given problem and conditions. Such as the numerical calculating results indicate that, for a 100×100 size sensot network, if node failure probability is bounded 0.5%, even if the transmission range is small (such as R = 10), we can still maintain very high connectivity probability (reach 95.8%). On the other hand, the simulation results show that building high connectivity probability is entirely possible on unreliable sensor grid networks.
文摘The work deals with the development of analytical model of multichannel technical queuing system with unreliable servers and input memory where server failure flows and incoming request flows comply with Poissonian laws, while the flows of failed facilities repairs and flows of incoming requests comply with exponential laws of probability distribution. Random process of system change-over is a Markovian process with continuous time and discrete states. Relations binding basic parameters and output characteristics of the system indicated are obtained as probabilities of system staying in the given moment in one of the possible states. The proposed model is the most generalized compared to some models known in literature which could be considered as special cases of the considered model.
文摘Based on rhetorical research methods of the unreliability,the paper intends to explore the unreliable narrative strategies of the narrator in Grace Paley's The Loudest Voice from the perspectives of the Wayne Booth's criterion of the distance between the narrator and the implied author and James Phelan's extension of unreliability on the basis of classical rhetorical narratology,point⁃ing out that the unreliability serves as the narrative trap which is set up to reveal the inner theme of the work:"The loudest voice"-what the protagonist thought she certainly possessed was only her illusion instead of the truth,and Eastern European Jewish com⁃munity was de facto marginalized by the mainstream culture at that time.
文摘The Tell-Tale Heart is a short story by Edgar Allan Poe. The story is first-person narrative of a narrator who murdered an old man with a clouded eye. This paper aims at identifying the speaker"I"as an unreliable narrator through analyzing the motivation, process and confession of the crime. It is found out that the narrator symbolizes man of evil, while, the old man's vulture eye symbolizes virtue. It's a story about the conflict between evil and virtue.
文摘As an encyclopedic novel and the summit of Chinese classical literary creation,Hongloumeng has not received due critical attention to its unusual narrative style,let alone abundant unreliable narrative.From unreliable narration of narrator and character,this research probes into effective translation strategies to achieve a balance between source text and target text,in light of a comparative analysis of typical illustrations taken from A Dream of Red Mansions and The Story of the Stone.