بحث بسيط
السجلات المعروضة 61 -- 70 من 104
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The objective in this paper is to study and develop conditions for a network of multi-agent cyber-physical systems (MAS) where a malicious adversary can utilize vulnerabilities in order to ensure and maintain cyber attacks ...
Robust Hybrid EKF approach for state estimation in multi-scale nonlinear singularly perturbed systems
(
IEEE
, 2014 , Conference Paper)
In this paper a general framework is developed for state estimation in a class of nonlinear continuous-time singularly perturbed systems. Our approach is based on the hybrid extended Kalman filter in which observations are ...
Reinforcement learning-based control for combined infusion of sedatives and analgesics
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
The focus of several clinical trials and research in the area of clinical pharmacology is to fine tune the drug dosing in the phase of additive, antagonistic, and synergistic drug interactive effects. It is important to ...
State-dependent adaptive dynamic programing for a class of continuous-time nonlinear systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
The state-dependent Riccati equation (SDRE) technique can be used to solve optimal control problems for a wide class of nonlinear dynamical systems. In this method, instead of solving a complicated Hamilton-Jacobi-Bellman ...
A support vector machine-based method for LPV-ARX identification with noisy scheduling parameters
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In this paper, we present a method that utilizes support vector machines (SVM) to identify linear parameter-varying (LPV) auto-regressive exogenous input (ARX) models corrupted by not only noise, but also uncertainties in ...
Fault detection and isolation of the wind turbine based on the real-valued negative selection algorithm
(
2013 7th IEEE GCC Conference and Exhibition, GCC 2013
, 2013 , Conference Paper)
This paper presents an immune-inspired approach for detecting and isolating faults in a wind turbine system. A negative selection algorithm (NSA) is proposed which is derived from a mechanism in vertebrate immune systems ...
Sensor fault detection and isolation of an industrial gas turbine using partial kernel PCA
(
9th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2015
, 2015 , Conference Paper)
In this paper, partial kernel principal component analysis (PKPCA) is studied for sensor fault detection and isolation of an aeroderivative industrial gas turbine. Principal component analysis (PCA) is an effective tool ...
Output-feedback model predictive control of biological phenomena modeled by S-systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2012 , Conference Paper)
Recent years have witnessed extensive research activity in modeling biological phenomena as well as in developing intervention strategies for them. S-systems, which offer a good compromise between accuracy and mathematical ...
Partial synchronization of biological neural networks and the anesthetic cascade
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
With the advances in biochemistry, molecular biology, and neurochemistry there has been impressive progress in understanding the molecular properties of anesthetic agents. However, there has been little focus on how the ...
Simultaneous distributed estimation and attack detection/isolation in social networks: Structural observability, kronecker-product network, and chi-square detector
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
This paper considers distributed estimation of linear systems when the state observations are corrupted with Gaussian noise of unbounded support and under possible random adversarial attacks. We consider sensors equipped ...