Search
Now showing items 41-50 of 192
Towards Privacy Preserving Consensus Control in Multi-Agent Cyber-Physical Systems Subject to Cyber Attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Multi-agent systems (MAS) require sharing their information with their neighboring agents to reach a consensus in a distributed manner. In this paper, a transformation-based consensus control methodology is developed and ...
Observer-Based Leader-Following Consensus for Linear Multiagent Systems with a Leader of Unknown Input
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In this article, a distributed observer-based tracking control protocol is proposed for linear multiagent systems having a leader with unknown nonzero input. The leader is assumed to be uncooperative, i.e., no communication ...
Event-Triggered Multiobjective Control and Fault Diagnosis: A Unified Framework
(
IEEE Computer Society
, 2017 , Article)
In the area of robust control, fault diagnosis, and fault tolerant control of linear systems, many fundamental problems can be recast as H-\infty, l-1 and generalized H-2 control frameworks leading to the so-called mixed ...
A Bayesian approach for model identification of LPV systems with uncertain scheduling variables
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper presents a Gaussian Process (GP) based Bayesian method that takes into account the effect of additive noise on the scheduling variables for identification of linear parameter-varying (LPV) models in input-output ...
Hybrid attack detection framework for industrial control systems using 1D-convolutional neural network and isolation forest
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Industrial control systems (ICSs) are used in various infrastructures and industrial plants for realizing their control operation and ensuring their safety. Concerns about the cybersecurity of industrial control systems ...
Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In this paper, we are mainly concerned with formulation and computation of security indices for linear cyber-physical systems (CPS), where both input and output channels are subjected to malicious cyber attacks. The ...
Reinforcement learning-based control of tumor growth under anti-angiogenic therapy.
(
Elsevier
, 2019 , Article)
In recent decades, cancer has become one of the most fatal and destructive diseases which is threatening humans life. Accordingly, different types of cancer treatment are studied with the main aim to have the best treatment ...
Analysis of Unsupervised Consumption Anomaly Detection in Sports Facilities using Artificial Intelligence-Based Data Analytics: A Case Study
(
Association for Computing Machinery (ACM)
, 2023 , Conference Paper)
Sports facilities have exceptionally high energy demand due to the extensive operational requirements and high-occupancy seasonal rates. Towards promoting efficient energy usage and minimal losses, consumption anomaly ...
Modified Particle Filters for Detection of False Data Injection Attacks and State Estimation in Networked Nonlinear Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Networked control systems which transfer data over communication networks may suffer from malicious cyber attacks by injecting false data to the transferred information. Such attacks can cause performance degradation of ...
Crosstalk between HER2 and PD-1/PD-L1 in Breast Cancer: From Clinical Applications to Mathematical Models.
(
Springer
, 2020 , Article)
Breast cancer is one of the major causes of mortality in women worldwide. The most aggressive breast cancer subtypes are human epidermal growth factor receptor-positive (HER2) and triple-negative breast cancers. Therapies ...