The rapid advancement of large models has led to the development of increasingly sophisticated models capable of generating diverse,personalized,and high-quality content.Among these,DeepSeek has emerged as a pivotal o...The rapid advancement of large models has led to the development of increasingly sophisticated models capable of generating diverse,personalized,and high-quality content.Among these,DeepSeek has emerged as a pivotal open-source initiative,demonstrating high performance at significantly lower computation costs compared to closed-source counterparts.This survey provides a comprehensive overview of the DeepSeek family of models,including DeepSeek-V3 and DeepSeek-R1,covering their core innovations in architecture,system pipeline,algorithm,and infrastructure.We explore their practical applications across various domains,such as healthcare,finance,and education,highlighting their impact on both industry and society.Further-more,we examine potential security,privacy,and ethical concerns arising from the widespread deployment of these models,emphasizing the need for responsible AI development.Finally,we outline future research directions to enhance the performance,safety,and scalability of DeepSeek models,aiming to foster further advancements in the open-source large model community.展开更多
As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social syste...As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social systems(CPSSs)with a human-centric focus.These technologies are organized by the system-wide approach of Industry 5.0,in order to empower the manufacturing industry to achieve broader societal goals of job creation,economic growth,and green production.This survey first provides a general framework of smart manufacturing in the context of Industry 5.0.Wherein,the embodied agents,like robots,sensors,and actuators,are the carriers for Ind AI,facilitating the development of the self-learning intelligence in individual entities,the collaborative intelligence in production lines and factories(smart systems),and the swarm intelligence within industrial clusters(systems of smart systems).Through the framework of CPSSs,the key technologies and their possible applications for supporting the single-agent,multi-agent and swarm-agent embodied Ind AI have been reviewed,such as the embodied perception,interaction,scheduling,multi-mode large language models,and collaborative training.Finally,to stimulate future research in this area,the open challenges and opportunities of applying Industry 5.0 to smart manufacturing are identified and discussed.The perspective of Industry 5.0-driven manufacturing industry aims to enhance operational productivity and efficiency by seamlessly integrating the virtual and physical worlds in a human-centered manner,thereby fostering an intelligent,sustainable,and resilient industrial landscape.展开更多
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec...ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions.Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.展开更多
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.展开更多
This paper presents a method for estimating the parameters of DC-link capacitors in three-level NPC voltage source inverters(3L-NPC-VSI)used in grid-tied systems.The technique uses the signals generated by the intermo...This paper presents a method for estimating the parameters of DC-link capacitors in three-level NPC voltage source inverters(3L-NPC-VSI)used in grid-tied systems.The technique uses the signals generated by the intermodulation caused by the PWM strategy and converter topology interaction to estimate the capacitor parameters of the converter DC-link.It utilizes an observer-based structure consisting of a recursive noninteger sliding discrete Fourier transform(rnSDFT)and an RLS filter improved with a forgetting factor(oSDFT-RLS)to accurately estimate the capacitance and equivalent series resistance(ESR).Importantly,this method does not require additional sensors beyond those already installed in off-the-shelf 3L-NPC-VSI systems,ensuring its noninvasiveness.Furthermore,the oSDFTRLS estimates capacitor parameters in the time-frequency domain,enabling the tracking of capacitor degradation and predicting potential faults.Experimental results from the laboratory setup demonstrate the effectiveness of the proposed condition monitoring method.展开更多
DeepSeek,a Chinese artificial intelligence(AI)startup,has released their V3 and R1 series models,which attracted global attention due to their low cost,high performance,and open-source advantages.This paper begins by ...DeepSeek,a Chinese artificial intelligence(AI)startup,has released their V3 and R1 series models,which attracted global attention due to their low cost,high performance,and open-source advantages.This paper begins by reviewing the evolution of large AI models focusing on paradigm shifts,the mainstream large language model(LLM)paradigm,and the DeepSeek paradigm.Subsequently,the paper highlights novel algorithms introduced by DeepSeek,including multi-head latent attention(MLA),mixture-of-experts(MoE),multi-token prediction(MTP),and group relative policy optimization(GRPO).The paper then explores DeepSeek's engineering breakthroughs in LLM scaling,training,inference,and system-level optimization architecture.Moreover,the impact of DeepSeek models on the competitive AI landscape is analyzed,comparing them to mainstream LLMs across various fields.Finally,the paper reflects on the insights gained from DeepSeek's innovations and discusses future trends in the technical and engineering development of large AI models,particularly in data,training,and reasoning.展开更多
This paper is concerned with event-triggered control of discrete-time systems with or without input saturation.First,an accumulative-error-based event-triggered scheme is devised for control updates.When the accumulat...This paper is concerned with event-triggered control of discrete-time systems with or without input saturation.First,an accumulative-error-based event-triggered scheme is devised for control updates.When the accumulated error between the current state and the latest control update exceeds a certain threshold,an event is triggered.Such a scheme can ensure the event-generator works at a relatively low rate rather than falls into hibernation especially after the system steps into its steady state.Second,the looped functional method for continuous-time systems is extended to discrete-time systems.By introducing an innovative looped functional that links the event-triggered scheme,some sufficient conditions for the co-design of control gain and event-triggered parameters are obtained in terms of linear matrix inequalities with a couple of tuning parameters.Then,the proposed method is applied to discrete-time systems with input saturation.As a result,both suitable control gains and event-triggered parameters are also co-designed to ensure the system trajectories converge to the region of attraction.Finally,an unstable reactor system and an inverted pendulum system are given to show the effectiveness of the proposed method.展开更多
This paper investigates set-valued state estimation of nonlinear systems with unknown-but-bounded(UBB)noises based on constrained polynomial zonotopes which is utilized to characterize non-convex sets.First,properties...This paper investigates set-valued state estimation of nonlinear systems with unknown-but-bounded(UBB)noises based on constrained polynomial zonotopes which is utilized to characterize non-convex sets.First,properties of constrained polynomial zonotopes are provided and the order reduction method is given to reduce the computational complexity.Then,the corresponding improved prediction-update algorithm is proposed so that it can be adapted to non-convex sets.Based on generalized intersection,the utilization of set-based estimation for attack detection is analyzed.Finally,an example is given to show the efficiency of our results.展开更多
ChatG PT,an artificial intelligence generated content (AIGC) model developed by OpenAI,has attracted worldwide attention for its capability of dealing with challenging language understanding and generation tasks in th...ChatG PT,an artificial intelligence generated content (AIGC) model developed by OpenAI,has attracted worldwide attention for its capability of dealing with challenging language understanding and generation tasks in the form of conversations.This paper briefly provides an overview on the history,status quo and potential future development of ChatGPT,helping to provide an entry point to think about ChatGPT.Specifically,from the limited open-accessed resources,we conclude the core techniques of ChatGPT,mainly including large-scale language models,in-context learning,reinforcement learning from human feedback and the key technical steps for developing ChatGPT.We further analyze the pros and cons of ChatGPT and we rethink the duality of ChatGPT in various fields.Although it has been widely acknowledged that ChatGPT brings plenty of opportunities for various fields,mankind should still treat and use ChatG PT properly to avoid the potential threat,e.g.,academic integrity and safety challenge.Finally,we discuss several open problems as the potential development of ChatGPT.展开更多
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr...This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency.展开更多
Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumpti...Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumption and vehicle emissions.A fundamental issue in CAVs is platooning control that empowers a convoy of CAVs to be cooperatively maneuvered with desired longitudinal spacings and identical velocities on roads.This paper addresses the issue of resilient and safe platooning control of CAVs subject to intermittent denial-of-service(DoS)attacks that disrupt vehicle-to-vehicle communications.First,a heterogeneous and uncertain vehicle longitudinal dynamic model is presented to accommodate a variety of uncertainties,including diverse vehicle masses and engine inertial delays,unknown and nonlinear resistance forces,and a dynamic platoon leader.Then,a resilient and safe distributed longitudinal platooning control law is constructed with an aim to preserve simultaneous individual vehicle stability,attack resilience,platoon safety and scalability.Furthermore,a numerically efficient offline design algorithm for determining the desired platoon control law is developed,under which the platoon resilience against DoS attacks can be maximized but the anticipated stability,safety and scalability requirements remain preserved.Finally,extensive numerical experiments are provided to substantiate the efficacy of the proposed platooning method.展开更多
The paper develops a novel framework of consensus control with fault-estimation-in-the-loop for multi-agent systems(MASs)in the presence of faults.A dynamic event-triggered protocol(DETP)by adding an auxiliary variabl...The paper develops a novel framework of consensus control with fault-estimation-in-the-loop for multi-agent systems(MASs)in the presence of faults.A dynamic event-triggered protocol(DETP)by adding an auxiliary variable is utilized to improve the utilization of communication resources.First,a novel estimator with a noise bias is put forward to estimate the existed fault and then a consensus controller with fault compensation(FC)is adopted to realize the demand of reliability and safety of addressed MASs.Subsequently,a novel consensus control framework with fault-estimation-in-the-loop is developed to achieve the predetermined consensus performance with the l_(2)-l_(∞)constraint by employing the variance analysis and the Lyapunov stability approaches.Furthermore,the desired estimator and controller gains are obtained in light of the solution to an algebraic matrix equation and a linear matrix inequality in a recursive way,respectively.Finally,a simulation result is employed to verify the usefulness of the proposed design framework.展开更多
With the rapid development of computer technology,automatic control technology and communication technology,research on unmanned aerial vehicles(UAVs)has attracted extensive attention from all over the world during th...With the rapid development of computer technology,automatic control technology and communication technology,research on unmanned aerial vehicles(UAVs)has attracted extensive attention from all over the world during the last decades.Particularly due to the demand of various civil applications,the conceptual design of UAV and autonomous flight control technology have been promoted and developed mutually.This paper is devoted to providing a brief review of the UAV control issues,including motion equations,various classical and advanced control approaches.The basic ideas,applicable conditions,advantages and disadvantages of these control approaches are illustrated and discussed.Some challenging topics and future research directions are raised.展开更多
The efficient utilization of computation and communication resources became a critical design issue in a wide range of networked systems due to the finite computation and processing capabilities of system components(e...The efficient utilization of computation and communication resources became a critical design issue in a wide range of networked systems due to the finite computation and processing capabilities of system components(e.g., sensor, controller) and shared network bandwidth. Event-triggered mechanisms(ETMs) are regarded as a major paradigm shift in resource-constrained applications compared to the classical time-triggered mechanisms, which allows a trade-off to be achieved between desired control/estimation performance and improved resource efficiency. In recent years, dynamic event-triggered mechanisms(DETMs) are emerging as a promising enabler to fulfill more resource-efficient and flexible design requirements. This paper provides a comprehensive review of the latest developments in dynamic event-triggered control and estimation for networked systems. Firstly, a unified event-triggered control and estimation framework is established, which empowers several fundamental issues associated with the construction and implementation of the desired ETM and controller/estimator to be systematically investigated. Secondly, the motivations of DETMs and their main features and benefits are outlined. Then, two typical classes of DETMs based on auxiliary dynamic variables(ADVs) and dynamic threshold parameters(DTPs) are elaborated. In addition, the main techniques of constructing ADVs and DTPs are classified, and their corresponding analysis and design methods are discussed. Furthermore, three application examples are provided to evaluate different ETMs and verify how and under what conditions DETMs are superior to their static and periodic counterparts. Finally, several challenging issues are envisioned to direct the future research.展开更多
THE current ChatGPT phenomenon has signaled a new era of Artificial Intelligence moving from Algorithmic Intelligence to Linguistic Intelligence where interactive activities between actual and artificial,real and virt...THE current ChatGPT phenomenon has signaled a new era of Artificial Intelligence moving from Algorithmic Intelligence to Linguistic Intelligence where interactive activities between actual and artificial,real and virtual,human and machine play an active and important role online and in real-time.At IEEE/CAA JAS,we are interested in investigating the impact and significance of this new era on industrial development,especially control and automation for manufacturing and production.展开更多
Multi-agent systems can solve scientific issues related to complex systems that are difficult or impossible for a single agent to solve through mutual collaboration and cooperation optimization.In a multi-agent system...Multi-agent systems can solve scientific issues related to complex systems that are difficult or impossible for a single agent to solve through mutual collaboration and cooperation optimization.In a multi-agent system,agents with a certain degree of autonomy generate complex interactions due to the correlation and coordination,which is manifested as cooperative/competitive behavior.This survey focuses on multi-agent cooperative optimization and cooperative/non-cooperative games.Starting from cooperative optimization,the studies on distributed optimization and federated optimization are summarized.The survey mainly focuses on distributed online optimization and its application in privacy protection,and overviews federated optimization from the perspective of privacy protection me-chanisms.Then,cooperative games and non-cooperative games are introduced to expand the cooperative optimization problems from two aspects of minimizing global costs and minimizing individual costs,respectively.Multi-agent cooperative and non-cooperative behaviors are modeled by games from both static and dynamic aspects,according to whether each player can make decisions based on the information of other players.Finally,future directions for cooperative optimization,cooperative/non-cooperative games,and their applications are discussed.展开更多
With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opport...With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opportunities brought by machine learning(ML),in particular deep learning(DL).In general,DL delivers superior performance to ML because of its layered setting and its effective algorithm for extract useful information from training data.DL models are adopted quickly to cyber attacks against CPS systems.In this survey,a holistic view of recently proposed DL solutions is provided to cyber attack detection in the CPS context.A six-step DL driven methodology is provided to summarize and analyze the surveyed literature for applying DL methods to detect cyber attacks against CPS systems.The methodology includes CPS scenario analysis,cyber attack identification,ML problem formulation,DL model customization,data acquisition for training,and performance evaluation.The reviewed works indicate great potential to detect cyber attacks against CPS through DL modules.Moreover,excellent performance is achieved partly because of several highquality datasets that are readily available for public use.Furthermore,challenges,opportunities,and research trends are pointed out for future research.展开更多
This paper addresses the co-design problem of decentralized dynamic event-triggered communication and active suspension control for an in-wheel motor driven electric vehicle equipped with a dynamic damper. The main ob...This paper addresses the co-design problem of decentralized dynamic event-triggered communication and active suspension control for an in-wheel motor driven electric vehicle equipped with a dynamic damper. The main objective is to simultaneously improve the desired suspension performance caused by various road disturbances and alleviate the network resource utilization for the concerned in-vehicle networked suspension system. First, a T-S fuzzy active suspension model of an electric vehicle under dynamic damping is established. Second,a novel decentralized dynamic event-triggered communication mechanism is developed to regulate each sensor's data transmissions such that sampled data packets on each sensor are scheduled in an independent manner. In contrast to the traditional static triggering mechanisms, a key feature of the proposed mechanism is that the threshold parameter in the event trigger is adjusted adaptively over time to reduce the network resources occupancy. Third, co-design criteria for the desired event-triggered fuzzy controller and dynamic triggering mechanisms are derived. Finally, comprehensive comparative simulation studies of a 3-degrees-of-freedom quarter suspension model are provided under both bump road disturbance and ISO-2631 classified random road disturbance to validate the effectiveness of the proposed co-design approach. It is shown that ride comfort can be greatly improved in either road disturbance case and the suspension deflection, dynamic tyre load and actuator control input are all kept below the prescribed maximum allowable limits, while simultaneously maintaining desirable communication efficiency.展开更多
This paper deals with the problem of distributed formation tracking control and obstacle avoidance of multivehicle systems(MVSs)in complex obstacle-laden environments.The MVS under consideration consists of a leader v...This paper deals with the problem of distributed formation tracking control and obstacle avoidance of multivehicle systems(MVSs)in complex obstacle-laden environments.The MVS under consideration consists of a leader vehicle with an unknown control input and a group of follower vehicles,connected via a directed interaction topology,subject to simultaneous unknown heterogeneous nonlinearities and external disturbances.The central aim is to achieve effective and collisionfree formation tracking control for the nonlinear and uncertain MVS with obstacles encountered in formation maneuvering,while not demanding global information of the interaction topology.Toward this goal,a radial basis function neural network is used to model the unknown nonlinearity of vehicle dynamics in each vehicle and repulsive potentials are employed for obstacle avoidance.Furthermore,a scalable distributed adaptive formation tracking control protocol with a built-in obstacle avoidance mechanism is developed.It is proved that,with the proposed protocol,the resulting formation tracking errors are uniformly ultimately bounded and obstacle collision avoidance is guaranteed.Comprehensive simulation results are elaborated to substantiate the effectiveness and the promising collision avoidance performance of the proposed scalable adaptive formation control approach.展开更多
Cyber attacks pose severe threats on synchronization of multi-agent systems.Deception attack,as a typical type of cyber attack,can bypass the surveillance of the attack detection mechanism silently,resulting in a heav...Cyber attacks pose severe threats on synchronization of multi-agent systems.Deception attack,as a typical type of cyber attack,can bypass the surveillance of the attack detection mechanism silently,resulting in a heavy loss.Therefore,the problem of mean-square bounded synchronization in multi-agent systems subject to deception attacks is investigated in this paper.The control signals can be replaced with false data from controllerto-actuator channels or the controller.The success of the attack is measured through a stochastic variable.A distributed impulsive controller using a pinning strategy is redesigned,which ensures that mean-square bounded synchronization is achieved in the presence of deception attacks.Some sufficient conditions are derived,in which upper bounds of the synchronization error are given.Finally,two numerical simulations with symmetric and asymmetric network topologies are given to illustrate the theoretical results.展开更多
文摘The rapid advancement of large models has led to the development of increasingly sophisticated models capable of generating diverse,personalized,and high-quality content.Among these,DeepSeek has emerged as a pivotal open-source initiative,demonstrating high performance at significantly lower computation costs compared to closed-source counterparts.This survey provides a comprehensive overview of the DeepSeek family of models,including DeepSeek-V3 and DeepSeek-R1,covering their core innovations in architecture,system pipeline,algorithm,and infrastructure.We explore their practical applications across various domains,such as healthcare,finance,and education,highlighting their impact on both industry and society.Further-more,we examine potential security,privacy,and ethical concerns arising from the widespread deployment of these models,emphasizing the need for responsible AI development.Finally,we outline future research directions to enhance the performance,safety,and scalability of DeepSeek models,aiming to foster further advancements in the open-source large model community.
基金supported by the National Key Research and Development Program of China(2021YFB1714300)the National Natural Science Foundation of China(62233005,U2441245,62173141)+3 种基金CNPC Innovation Found(2024DQ02-0507)Shanghai Natural Science(24ZR1416400)Shanghai Baiyu Lan Talent Program Pujiang Project(24PJD020)the Programme of Introducing Talents of Discipline to Universities(the 111 Project)(B17017)
文摘As embodied intelligence(EI),large language models(LLMs),and cloud computing continue to advance,Industry5.0 facilitates the development of industrial artificial intelligence(Ind AI)through cyber-physical-social systems(CPSSs)with a human-centric focus.These technologies are organized by the system-wide approach of Industry 5.0,in order to empower the manufacturing industry to achieve broader societal goals of job creation,economic growth,and green production.This survey first provides a general framework of smart manufacturing in the context of Industry 5.0.Wherein,the embodied agents,like robots,sensors,and actuators,are the carriers for Ind AI,facilitating the development of the self-learning intelligence in individual entities,the collaborative intelligence in production lines and factories(smart systems),and the swarm intelligence within industrial clusters(systems of smart systems).Through the framework of CPSSs,the key technologies and their possible applications for supporting the single-agent,multi-agent and swarm-agent embodied Ind AI have been reviewed,such as the embodied perception,interaction,scheduling,multi-mode large language models,and collaborative training.Finally,to stimulate future research in this area,the open challenges and opportunities of applying Industry 5.0 to smart manufacturing are identified and discussed.The perspective of Industry 5.0-driven manufacturing industry aims to enhance operational productivity and efficiency by seamlessly integrating the virtual and physical worlds in a human-centered manner,thereby fostering an intelligent,sustainable,and resilient industrial landscape.
文摘ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions.Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.
文摘Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
基金funded by the Brazilian National Council for Scientific and Technological Development—CNPq(CNPq grant number 405997/2022-1)supported by the EMBRAPII VIRTUS Competence Center in Intelligent Hardware for Industry—VIRTUS-CC(MCTI grant number 055/2023).
文摘This paper presents a method for estimating the parameters of DC-link capacitors in three-level NPC voltage source inverters(3L-NPC-VSI)used in grid-tied systems.The technique uses the signals generated by the intermodulation caused by the PWM strategy and converter topology interaction to estimate the capacitor parameters of the converter DC-link.It utilizes an observer-based structure consisting of a recursive noninteger sliding discrete Fourier transform(rnSDFT)and an RLS filter improved with a forgetting factor(oSDFT-RLS)to accurately estimate the capacitance and equivalent series resistance(ESR).Importantly,this method does not require additional sensors beyond those already installed in off-the-shelf 3L-NPC-VSI systems,ensuring its noninvasiveness.Furthermore,the oSDFTRLS estimates capacitor parameters in the time-frequency domain,enabling the tracking of capacitor degradation and predicting potential faults.Experimental results from the laboratory setup demonstrate the effectiveness of the proposed condition monitoring method.
基金supported by the National Natural Science Foundation of China(62233005,62293502,U2441245,62176185,U23B2057,62306112)the STCSM Science and Technology Innovation Action Plan Computational Biology Program(24JS2830400)+2 种基金the State Key Laboratory of Industrial Control Technology,China(ICT2024A22)the Shanghai Sailing Program(23YF1409400)the National Science and Technology Major Project(2024ZD0532403).
文摘DeepSeek,a Chinese artificial intelligence(AI)startup,has released their V3 and R1 series models,which attracted global attention due to their low cost,high performance,and open-source advantages.This paper begins by reviewing the evolution of large AI models focusing on paradigm shifts,the mainstream large language model(LLM)paradigm,and the DeepSeek paradigm.Subsequently,the paper highlights novel algorithms introduced by DeepSeek,including multi-head latent attention(MLA),mixture-of-experts(MoE),multi-token prediction(MTP),and group relative policy optimization(GRPO).The paper then explores DeepSeek's engineering breakthroughs in LLM scaling,training,inference,and system-level optimization architecture.Moreover,the impact of DeepSeek models on the competitive AI landscape is analyzed,comparing them to mainstream LLMs across various fields.Finally,the paper reflects on the insights gained from DeepSeek's innovations and discusses future trends in the technical and engineering development of large AI models,particularly in data,training,and reasoning.
基金supported in part by the National Natural Science Foundation of China(62473221)the Natural Science Foundation of Shandong Province,China(ZR2024MF006)Qingdao Natural Science Foundation(24-4-4-zrjj-165-jch)。
文摘This paper is concerned with event-triggered control of discrete-time systems with or without input saturation.First,an accumulative-error-based event-triggered scheme is devised for control updates.When the accumulated error between the current state and the latest control update exceeds a certain threshold,an event is triggered.Such a scheme can ensure the event-generator works at a relatively low rate rather than falls into hibernation especially after the system steps into its steady state.Second,the looped functional method for continuous-time systems is extended to discrete-time systems.By introducing an innovative looped functional that links the event-triggered scheme,some sufficient conditions for the co-design of control gain and event-triggered parameters are obtained in terms of linear matrix inequalities with a couple of tuning parameters.Then,the proposed method is applied to discrete-time systems with input saturation.As a result,both suitable control gains and event-triggered parameters are also co-designed to ensure the system trajectories converge to the region of attraction.Finally,an unstable reactor system and an inverted pendulum system are given to show the effectiveness of the proposed method.
基金supported by the National Natural Science Foundation of China(61703286,62394342,61890924,61991404)。
文摘This paper investigates set-valued state estimation of nonlinear systems with unknown-but-bounded(UBB)noises based on constrained polynomial zonotopes which is utilized to characterize non-convex sets.First,properties of constrained polynomial zonotopes are provided and the order reduction method is given to reduce the computational complexity.Then,the corresponding improved prediction-update algorithm is proposed so that it can be adapted to non-convex sets.Based on generalized intersection,the utilization of set-based estimation for attack detection is analyzed.Finally,an example is given to show the efficiency of our results.
基金supported by National Key Research and Development Program of China (2021YFB1714300)National Natural Science Foundation of China (62293502, 61831022, 61976211)Youth Innovation Promotion Association CAS。
文摘ChatG PT,an artificial intelligence generated content (AIGC) model developed by OpenAI,has attracted worldwide attention for its capability of dealing with challenging language understanding and generation tasks in the form of conversations.This paper briefly provides an overview on the history,status quo and potential future development of ChatGPT,helping to provide an entry point to think about ChatGPT.Specifically,from the limited open-accessed resources,we conclude the core techniques of ChatGPT,mainly including large-scale language models,in-context learning,reinforcement learning from human feedback and the key technical steps for developing ChatGPT.We further analyze the pros and cons of ChatGPT and we rethink the duality of ChatGPT in various fields.Although it has been widely acknowledged that ChatGPT brings plenty of opportunities for various fields,mankind should still treat and use ChatG PT properly to avoid the potential threat,e.g.,academic integrity and safety challenge.Finally,we discuss several open problems as the potential development of ChatGPT.
基金This work was supported in part by the Australian Research Council Discovery Early Career Researcher Award under Grant DE200101128.
文摘This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency.
基金supported in part by Australian Research Council Discovery Early Career Researcher Award(DE210100273)。
文摘Connected automated vehicles(CAVs)serve as a promising enabler for future intelligent transportation systems because of their capabilities in improving traffic efficiency and driving safety,and reducing fuel consumption and vehicle emissions.A fundamental issue in CAVs is platooning control that empowers a convoy of CAVs to be cooperatively maneuvered with desired longitudinal spacings and identical velocities on roads.This paper addresses the issue of resilient and safe platooning control of CAVs subject to intermittent denial-of-service(DoS)attacks that disrupt vehicle-to-vehicle communications.First,a heterogeneous and uncertain vehicle longitudinal dynamic model is presented to accommodate a variety of uncertainties,including diverse vehicle masses and engine inertial delays,unknown and nonlinear resistance forces,and a dynamic platoon leader.Then,a resilient and safe distributed longitudinal platooning control law is constructed with an aim to preserve simultaneous individual vehicle stability,attack resilience,platoon safety and scalability.Furthermore,a numerically efficient offline design algorithm for determining the desired platoon control law is developed,under which the platoon resilience against DoS attacks can be maximized but the anticipated stability,safety and scalability requirements remain preserved.Finally,extensive numerical experiments are provided to substantiate the efficacy of the proposed platooning method.
基金supported in part by the Australian Research Council Discovery Early Career Researcher Award(DE200101128)。
文摘The paper develops a novel framework of consensus control with fault-estimation-in-the-loop for multi-agent systems(MASs)in the presence of faults.A dynamic event-triggered protocol(DETP)by adding an auxiliary variable is utilized to improve the utilization of communication resources.First,a novel estimator with a noise bias is put forward to estimate the existed fault and then a consensus controller with fault compensation(FC)is adopted to realize the demand of reliability and safety of addressed MASs.Subsequently,a novel consensus control framework with fault-estimation-in-the-loop is developed to achieve the predetermined consensus performance with the l_(2)-l_(∞)constraint by employing the variance analysis and the Lyapunov stability approaches.Furthermore,the desired estimator and controller gains are obtained in light of the solution to an algebraic matrix equation and a linear matrix inequality in a recursive way,respectively.Finally,a simulation result is employed to verify the usefulness of the proposed design framework.
基金supported by the National Natural Science Foundation of China(62073019)。
文摘With the rapid development of computer technology,automatic control technology and communication technology,research on unmanned aerial vehicles(UAVs)has attracted extensive attention from all over the world during the last decades.Particularly due to the demand of various civil applications,the conceptual design of UAV and autonomous flight control technology have been promoted and developed mutually.This paper is devoted to providing a brief review of the UAV control issues,including motion equations,various classical and advanced control approaches.The basic ideas,applicable conditions,advantages and disadvantages of these control approaches are illustrated and discussed.Some challenging topics and future research directions are raised.
基金supported by the Australian Research Council Discovery Early Career Researcher Award(No.DE200101128).
文摘The efficient utilization of computation and communication resources became a critical design issue in a wide range of networked systems due to the finite computation and processing capabilities of system components(e.g., sensor, controller) and shared network bandwidth. Event-triggered mechanisms(ETMs) are regarded as a major paradigm shift in resource-constrained applications compared to the classical time-triggered mechanisms, which allows a trade-off to be achieved between desired control/estimation performance and improved resource efficiency. In recent years, dynamic event-triggered mechanisms(DETMs) are emerging as a promising enabler to fulfill more resource-efficient and flexible design requirements. This paper provides a comprehensive review of the latest developments in dynamic event-triggered control and estimation for networked systems. Firstly, a unified event-triggered control and estimation framework is established, which empowers several fundamental issues associated with the construction and implementation of the desired ETM and controller/estimator to be systematically investigated. Secondly, the motivations of DETMs and their main features and benefits are outlined. Then, two typical classes of DETMs based on auxiliary dynamic variables(ADVs) and dynamic threshold parameters(DTPs) are elaborated. In addition, the main techniques of constructing ADVs and DTPs are classified, and their corresponding analysis and design methods are discussed. Furthermore, three application examples are provided to evaluate different ETMs and verify how and under what conditions DETMs are superior to their static and periodic counterparts. Finally, several challenging issues are envisioned to direct the future research.
基金partially supported by the Science and Technology Development Fund of Macao SAR(0050/2020/A1)the National Natural Science Foundation of China(62103411)。
文摘THE current ChatGPT phenomenon has signaled a new era of Artificial Intelligence moving from Algorithmic Intelligence to Linguistic Intelligence where interactive activities between actual and artificial,real and virtual,human and machine play an active and important role online and in real-time.At IEEE/CAA JAS,we are interested in investigating the impact and significance of this new era on industrial development,especially control and automation for manufacturing and production.
基金supported in part by the National Natural Science Foundation of China(Basic Science Center Program:61988101)the Sino-German Center for Research Promotion(M-0066)+2 种基金the International(Regional)Cooperation and Exchange Project(61720106008)the Programme of Introducing Talents of Discipline to Universities(the 111 Project)(B17017)the Program of Shanghai Academic Research Leader(20XD1401300).
文摘Multi-agent systems can solve scientific issues related to complex systems that are difficult or impossible for a single agent to solve through mutual collaboration and cooperation optimization.In a multi-agent system,agents with a certain degree of autonomy generate complex interactions due to the correlation and coordination,which is manifested as cooperative/competitive behavior.This survey focuses on multi-agent cooperative optimization and cooperative/non-cooperative games.Starting from cooperative optimization,the studies on distributed optimization and federated optimization are summarized.The survey mainly focuses on distributed online optimization and its application in privacy protection,and overviews federated optimization from the perspective of privacy protection me-chanisms.Then,cooperative games and non-cooperative games are introduced to expand the cooperative optimization problems from two aspects of minimizing global costs and minimizing individual costs,respectively.Multi-agent cooperative and non-cooperative behaviors are modeled by games from both static and dynamic aspects,according to whether each player can make decisions based on the information of other players.Finally,future directions for cooperative optimization,cooperative/non-cooperative games,and their applications are discussed.
文摘With the booming of cyber attacks and cyber criminals against cyber-physical systems(CPSs),detecting these attacks remains challenging.It might be the worst of times,but it might be the best of times because of opportunities brought by machine learning(ML),in particular deep learning(DL).In general,DL delivers superior performance to ML because of its layered setting and its effective algorithm for extract useful information from training data.DL models are adopted quickly to cyber attacks against CPS systems.In this survey,a holistic view of recently proposed DL solutions is provided to cyber attack detection in the CPS context.A six-step DL driven methodology is provided to summarize and analyze the surveyed literature for applying DL methods to detect cyber attacks against CPS systems.The methodology includes CPS scenario analysis,cyber attack identification,ML problem formulation,DL model customization,data acquisition for training,and performance evaluation.The reviewed works indicate great potential to detect cyber attacks against CPS through DL modules.Moreover,excellent performance is achieved partly because of several highquality datasets that are readily available for public use.Furthermore,challenges,opportunities,and research trends are pointed out for future research.
文摘This paper addresses the co-design problem of decentralized dynamic event-triggered communication and active suspension control for an in-wheel motor driven electric vehicle equipped with a dynamic damper. The main objective is to simultaneously improve the desired suspension performance caused by various road disturbances and alleviate the network resource utilization for the concerned in-vehicle networked suspension system. First, a T-S fuzzy active suspension model of an electric vehicle under dynamic damping is established. Second,a novel decentralized dynamic event-triggered communication mechanism is developed to regulate each sensor's data transmissions such that sampled data packets on each sensor are scheduled in an independent manner. In contrast to the traditional static triggering mechanisms, a key feature of the proposed mechanism is that the threshold parameter in the event trigger is adjusted adaptively over time to reduce the network resources occupancy. Third, co-design criteria for the desired event-triggered fuzzy controller and dynamic triggering mechanisms are derived. Finally, comprehensive comparative simulation studies of a 3-degrees-of-freedom quarter suspension model are provided under both bump road disturbance and ISO-2631 classified random road disturbance to validate the effectiveness of the proposed co-design approach. It is shown that ride comfort can be greatly improved in either road disturbance case and the suspension deflection, dynamic tyre load and actuator control input are all kept below the prescribed maximum allowable limits, while simultaneously maintaining desirable communication efficiency.
文摘This paper deals with the problem of distributed formation tracking control and obstacle avoidance of multivehicle systems(MVSs)in complex obstacle-laden environments.The MVS under consideration consists of a leader vehicle with an unknown control input and a group of follower vehicles,connected via a directed interaction topology,subject to simultaneous unknown heterogeneous nonlinearities and external disturbances.The central aim is to achieve effective and collisionfree formation tracking control for the nonlinear and uncertain MVS with obstacles encountered in formation maneuvering,while not demanding global information of the interaction topology.Toward this goal,a radial basis function neural network is used to model the unknown nonlinearity of vehicle dynamics in each vehicle and repulsive potentials are employed for obstacle avoidance.Furthermore,a scalable distributed adaptive formation tracking control protocol with a built-in obstacle avoidance mechanism is developed.It is proved that,with the proposed protocol,the resulting formation tracking errors are uniformly ultimately bounded and obstacle collision avoidance is guaranteed.Comprehensive simulation results are elaborated to substantiate the effectiveness and the promising collision avoidance performance of the proposed scalable adaptive formation control approach.
基金supported by the National Natural Science Foundation of China(61988101,61922030,61773163)Shanghai Rising-Star Program(18QA1401400)+3 种基金the International(Regional)Cooperation and Exchange Project(61720106008)the Natural Science Foundation of Shanghai(17ZR1406800)the Fundamental Research Funds for the Central Universitiesthe 111 Project(B17017)。
文摘Cyber attacks pose severe threats on synchronization of multi-agent systems.Deception attack,as a typical type of cyber attack,can bypass the surveillance of the attack detection mechanism silently,resulting in a heavy loss.Therefore,the problem of mean-square bounded synchronization in multi-agent systems subject to deception attacks is investigated in this paper.The control signals can be replaced with false data from controllerto-actuator channels or the controller.The success of the attack is measured through a stochastic variable.A distributed impulsive controller using a pinning strategy is redesigned,which ensures that mean-square bounded synchronization is achieved in the presence of deception attacks.Some sufficient conditions are derived,in which upper bounds of the synchronization error are given.Finally,two numerical simulations with symmetric and asymmetric network topologies are given to illustrate the theoretical results.