期刊文献+
共找到1,727,147篇文章
< 1 2 250 >
每页显示 20 50 100
Constrained Networked Predictive Control for Nonlinear Systems Using a High-Order Fully Actuated System Approach 被引量:1
1
作者 Yi Huang Guo-Ping Liu +1 位作者 Yi Yu Wenshan Hu 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期478-480,共3页
Dear Editor,In this letter,a constrained networked predictive control strategy is proposed for the optimal control problem of complex nonlinear highorder fully actuated(HOFA)systems with noises.The method can effectiv... Dear Editor,In this letter,a constrained networked predictive control strategy is proposed for the optimal control problem of complex nonlinear highorder fully actuated(HOFA)systems with noises.The method can effectively deal with nonlinearities,constraints,and noises in the system,optimize the performance metric,and present an upper bound on the stable output of the system. 展开更多
关键词 optimal control problem constrained networked predictive control strategy Performance Optimization present upper bound Nonlinear systems NOISES Constrained networked Predictive Control High Order Fully Actuated systems
在线阅读 下载PDF
Optimal Secure Control of Networked Control Systems Under False Data Injection Attacks:A Multi-Stage Attack-Defense Game Approach
2
作者 Dajun Du Yi Zhang +1 位作者 Baoyue Xu Minrui Fei 《IEEE/CAA Journal of Automatica Sinica》 2025年第4期821-823,共3页
Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by de... Dear Editor,The attacker is always going to intrude covertly networked control systems(NCSs)by dynamically changing false data injection attacks(FDIAs)strategy,while the defender try their best to resist attacks by designing defense strategy on the basis of identifying attack strategy,maintaining stable operation of NCSs.To solve this attack-defense game problem,this letter investigates optimal secure control of NCSs under FDIAs.First,for the alterations of energy caused by false data,a novel attack-defense game model is constructed,which considers the changes of energy caused by the actions of the defender and attacker in the forward and feedback channels. 展开更多
关键词 designing defense strategy networked control systems ncss alterations energy networked control systems false data injection attacks fdias strategywhile false data injection attacks optimal secure control identifying attack strategymaintaining
在线阅读 下载PDF
Stackelberg game-based optimal secure control against hybrid attacks for networked control systems
3
作者 Wei Xiong Yi Dong Liubin Zhou 《Journal of Automation and Intelligence》 2025年第3期236-241,共6页
This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional m... This paper investigates the problem of optimal secure control for networked control systems under hybrid attacks.A control strategy based on the Stackelberg game framework is proposed,which differs from conventional methods by considering both denial-of-service(DoS)and false data injection(FDI)attacks simultaneously.Additionally,the stability conditions for the system under these hybrid attacks are established.It is technically challenging to design the control strategy by predicting attacker actions based on Stcakelberg game to ensure the system stability under hybrid attacks.Another technical difficulty lies in establishing the conditions for mean-square asymptotic stability due to the complexity of the attack scenarios Finally,simulations on an unstable batch reactor system under hybrid attacks demonstrate the effectiveness of the proposed strategy. 展开更多
关键词 Stackelberg game networked control systems Hybrid attacks DoS attack FDI attack
在线阅读 下载PDF
GPIO-Based Continuous Sliding Mode Control for Networked Control Systems Under Communication Delays With Experiments on Servo Motors
4
作者 Kamal Rsetam Zhenwei Cao +1 位作者 Zhihong Man Xian-Ming Zhang 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期99-113,共15页
To handle input and output time delays that commonly exist in many networked control systems(NCSs), a new robust continuous sliding mode control(CSMC) scheme is proposed for the output tracking in uncertain single inp... To handle input and output time delays that commonly exist in many networked control systems(NCSs), a new robust continuous sliding mode control(CSMC) scheme is proposed for the output tracking in uncertain single input-single-output(SISO) networked control systems. This scheme consists of three consecutive steps. First, although the network-induced delay in those systems can be effectively handled by using Pade approximation(PA), the unmatched disturbance cames out as another difficulty in the control design. Second, to actively estimate this unmatched disturbance, a generalized proportional integral observer(GPIO) technique is utilized based on only one measured state. Third, by constructing a new sliding manifold with the aid of the estimated unmatched disturbance and states, a GPIO-based CSMC is synthesized, which is employed to cope with not only matched and unmatched disturbances, but also networkinduced delays. The stability of the entire closed-loop system under the proposed GPIO-based CSMC is detailedly analyzed.The promising tracking efficiency and feasibility of the proposed control methodology are verified through simulations and experiments on Quanser's servo module for motion control under various test conditions. 展开更多
关键词 Continuous sliding mode control(CSMC) generalized proportional integral observer(GPIO) networked control systems(NCSs) pade approximation(PA) TIME-DELAY unsmatched disturbances
在线阅读 下载PDF
Joint Probabilistic Scheduling and Resource Allocation for Wireless Networked Control Systems
5
作者 Meng Zheng Lei Zhang Wei Liang 《IEEE/CAA Journal of Automatica Sinica》 2025年第1期258-260,共3页
Dear Editor,This letter presents a joint probabilistic scheduling and resource allocation method(PSRA) for 5G-based wireless networked control systems(WNCSs). As a control-aware optimization method, PSRA minimizes the... Dear Editor,This letter presents a joint probabilistic scheduling and resource allocation method(PSRA) for 5G-based wireless networked control systems(WNCSs). As a control-aware optimization method, PSRA minimizes the linear quadratic Gaussian(LQG) control cost of WNCSs by optimizing the activation probability of subsystems, the number of uplink repetitions, and the durations of uplink and downlink phases. Simulation results show that PSRA achieves smaller LQG control costs than existing works. 展开更多
关键词 subsystem activation probability linear quadratic gaussian control cost number uplink repetitions wireless networked control systems joint probabilistic scheduling resource allocation method psra linear quadratic gaussian lqg G based activation probability subsystems
在线阅读 下载PDF
Robust Predefined-Time Control for Optimal Formation of Networked Mobile Vehicle Systems
6
作者 Jing-Zhe Xu Zhi-Wei Liu +2 位作者 Dingxin He Ming-Feng Ge Ming Chi 《IEEE/CAA Journal of Automatica Sinica》 2025年第4期824-826,共3页
Dear Editor,This letter addresses the robust predefined-time control challenge for leaderless optimal formation in networked mobile vehicle(NMV)systems.The aim is to minimize a composite global cost function derived f... Dear Editor,This letter addresses the robust predefined-time control challenge for leaderless optimal formation in networked mobile vehicle(NMV)systems.The aim is to minimize a composite global cost function derived from individual strongly convex functions of each agent,considering both input disturbances and network communication constraints.A novel predefined-time optimal formation control(PTOFC)algorithm is presented,ensuring agent state convergence to optimal formation positions within an adjustable settling time.Through the integration of an integral sliding mode technique,disturbances are effectively countered.A representative numerical example highlights the effectiveness and robustness of the developed approach. 展开更多
关键词 minimize composite global cost function integral sliding mode technique agent state convergence optimal formation networked mobile vehicle systems robust predefined time control strongly convex functions disturbances
在线阅读 下载PDF
Distributed Cooperative Regulation for Networked Re-Entrant Manufacturing Systems
7
作者 Chenguang Liu Qing Gao +1 位作者 Wei Wang Jinhu Lü 《IEEE/CAA Journal of Automatica Sinica》 2025年第3期636-638,共3页
Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the p... Dear Editor,This letter focuses on the distributed cooperative regulation problem for a class of networked re-entrant manufacturing systems(RMSs).The networked system is structured with a three-tier architecture:the production line,the manufacturing layer and the workshop layer.The dynamics of re-entrant production lines are governed by hyperbolic partial differential equations(PDEs)based on the law of mass conservation. 展开更多
关键词 production line networked re entrant manufacturing systems three tier architecture production linethe distributed cooperative regulation hyperbolic partial differential equations pdes based distributed cooperative regulation problem manufacturing layer
在线阅读 下载PDF
Event-Based Networked Predictive Control of Cyber-Physical Systems with Delays and DoS Attacks
8
作者 Wencheng Luo Pingli Lu +1 位作者 Changkun Du Haikuo Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第6期1295-1297,共3页
Dear Editor,This letter studies the stabilization control issue of cyber-physical systems with time-varying delays and aperiodic denial-of-service(DoS)attacks.To address the calculation overload issue caused by networ... Dear Editor,This letter studies the stabilization control issue of cyber-physical systems with time-varying delays and aperiodic denial-of-service(DoS)attacks.To address the calculation overload issue caused by networked predictive control(NPC)approach,an event-based NPC method is proposed.Within the proposed method,the negative effects of time-varying delays and DoS attacks on system performance are compensated.Then,sufficient and necessary conditions are derived to ensure the stability of the closed-loop system.In the end,simulation results are provided to demonstrate the validity of presented method. 展开更多
关键词 cyber physical systems dos attacks necessary conditions derived denial service attacks time varying delays event based networked predictive control stabilization control calculation overload
在线阅读 下载PDF
Special Section on Perception,Control,and Decision-Making of Embodied Intelligent Systems
9
《Journal of Systems Engineering and Electronics》 2026年第1期F0002-F0002,共1页
Embodied intelligent systems integrate perception,control,and decision-making within physical agents,and have become a cornerstone of modern aerospace,autonomous driving,and cooperative robotic applications.When opera... Embodied intelligent systems integrate perception,control,and decision-making within physical agents,and have become a cornerstone of modern aerospace,autonomous driving,and cooperative robotic applications.When operating in uncertain and dynamic environments,such systems must address challenges arising from incomplete sensing,unpredictable maneuvers,communication constraints,disturbances,and evolving network structures. 展开更多
关键词 incomplete sensingunpredictable decision making embodied intelligent systems aerospaceautonomous drivingand CONTROL cooperative robotic applicationswhen evolving network structures PERCEPTION
在线阅读 下载PDF
Intrusion Detection Systems in Industrial Control Systems:Landscape,Challenges and Opportunities
10
作者 Tong Wu Dawei Zhou +1 位作者 Qingyu Ou Fang Luo 《Computers, Materials & Continua》 2026年第3期162-200,共39页
The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has dri... The increasing interconnection of modern industrial control systems(ICSs)with the Internet has enhanced operational efficiency,but alsomade these systemsmore vulnerable to cyberattacks.This heightened exposure has driven a growing need for robust ICS security measures.Among the key defences,intrusion detection technology is critical in identifying threats to ICS networks.This paper provides an overview of the distinctive characteristics of ICS network security,highlighting standard attack methods.It then examines various intrusion detection methods,including those based on misuse detection,anomaly detection,machine learning,and specialised requirements.This paper concludes by exploring future directions for developing intrusion detection systems to advance research and ensure the continued security and reliability of ICS operations. 展开更多
关键词 Industrial control system industrial control system network security intrusion detection cyberspace security ICS network network security
在线阅读 下载PDF
Sensor Fusion Models in Autonomous Systems:A Review
11
作者 Sangeeta Mittal Chetna Gupta Varun Gupta 《Computers, Materials & Continua》 2026年第4期226-257,共32页
This survey presents a comprehensive examination of sensor fusion research spanning four decades,tracing the methodological evolution,application domains,and alignment with classical hierarchical models.Building on th... This survey presents a comprehensive examination of sensor fusion research spanning four decades,tracing the methodological evolution,application domains,and alignment with classical hierarchical models.Building on this long-term trajectory,the foundational approaches such as probabilistic inference,early neural networks,rulebasedmethods,and feature-level fusion established the principles of uncertainty handling andmulti-sensor integration in the 1990s.The fusion methods of 2000s marked the consolidation of these ideas through advanced Kalman and particle filtering,Bayesian–Dempster–Shafer hybrids,distributed consensus algorithms,and machine learning ensembles for more robust and domain-specific implementations.From 2011 to 2020,the widespread adoption of deep learning transformed the field driving some major breakthroughs in the autonomous vehicles domain.A key contribution of this work is the assessment of contemporary methods against the JDL model,revealing gaps at higher levels-especially in situation and impact assessment.Contemporary methods offer only limited implementation of higher-level fusion.The survey also reviews the benchmark multi-sensor datasets,noting their role in advancing the field while identifying major shortcomings like the lack of domain diversity and hierarchical coverage.By synthesizing developments across decades and paradigms,this survey provides both a historical narrative and a forward-looking perspective.It highlights unresolved challenges in transparency,scalability,robustness,and trustworthiness,while identifying emerging paradigms such as neuromorphic fusion and explainable AI as promising directions.This paves the way forward for advancing sensor fusion towards transparent and adaptive next-generation autonomous systems. 展开更多
关键词 Sensor fusion autonomous systems artificial intelligence machine learning sensor data integration intelligent systems
在线阅读 下载PDF
Artificial Intelligence (AI)-Enabled Unmanned Aerial Vehicle (UAV) Systems for Optimizing User Connectivity in Sixth-Generation (6G) Ubiquitous Networks
12
作者 Zeeshan Ali Haider Inam Ullah +2 位作者 Ahmad Abu Shareha Rashid Nasimov Sufyan Ali Memon 《Computers, Materials & Continua》 2026年第1期534-549,共16页
The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-gener... The advent of sixth-generation(6G)networks introduces unprecedented challenges in achieving seamless connectivity,ultra-low latency,and efficient resource management in highly dynamic environments.Although fifth-generation(5G)networks transformed mobile broadband and machine-type communications at massive scales,their properties of scaling,interference management,and latency remain a limitation in dense high mobility settings.To overcome these limitations,artificial intelligence(AI)and unmanned aerial vehicles(UAVs)have emerged as potential solutions to develop versatile,dynamic,and energy-efficient communication systems.The study proposes an AI-based UAV architecture that utilizes cooperative reinforcement learning(CoRL)to manage an autonomous network.The UAVs collaborate by sharing local observations and real-time state exchanges to optimize user connectivity,movement directions,allocate power,and resource distribution.Unlike conventional centralized or autonomous methods,CoRL involves joint state sharing and conflict-sensitive reward shaping,which ensures fair coverage,less interference,and enhanced adaptability in a dynamic urban environment.Simulations conducted in smart city scenarios with 10 UAVs and 50 ground users demonstrate that the proposed CoRL-based UAV system increases user coverage by up to 10%,achieves convergence 40%faster,and reduces latency and energy consumption by 30%compared with centralized and decentralized baselines.Furthermore,the distributed nature of the algorithm ensures scalability and flexibility,making it well-suited for future large-scale 6G deployments.The results highlighted that AI-enabled UAV systems enhance connectivity,support ultra-reliable low-latency communications(URLLC),and improve 6G network efficiency.Future work will extend the framework with adaptive modulation,beamforming-aware positioning,and real-world testbed deployment. 展开更多
关键词 6G networks UAV-based communication cooperative reinforcement learning network optimization user connectivity energy efficiency
在线阅读 下载PDF
Blockchain-Enabled Trusted Virtual Network Embedding in Intelligent Cyber-Physical Systems
13
作者 Zhu Hailong Huang Tao +2 位作者 Zhang Yi Chen Ning Zhang Peiying 《China Communications》 2026年第1期175-188,共14页
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further... With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate. 展开更多
关键词 blockchain cyber-physical system trusted embedding virtual network
在线阅读 下载PDF
Engineered Radiative Cooling Systems for Thermal-Regulating and Energy-Saving Applications
14
作者 Leqi Lei Ting Wu +8 位作者 Shuo Shi Yifan Si Chuanwei Zhi Kaisong Huang Jieqiong Yang Xinshuo Liang Shanshan Zhu Jinping Qu Jinlian Hu 《Nano-Micro Letters》 2026年第1期509-544,共36页
Radiative cooling systems(RCSs)possess the distinctive capability to dissipate heat energy via solar and thermal radiation,making them suitable for thermal regulation and energy conservation applications,essential for... Radiative cooling systems(RCSs)possess the distinctive capability to dissipate heat energy via solar and thermal radiation,making them suitable for thermal regulation and energy conservation applications,essential for mitigating the energy crisis.A comprehensive review connecting the advancements in engineered radiative cooling systems(ERCSs),encompassing material and structural design as well as thermal and energy-related applications,is currently absent.Herein,this review begins with a concise summary of the essential concepts of ERCSs,followed by an introduction to engineered materials and structures,containing nature-inspired designs,chromatic materials,meta-structural configurations,and multilayered constructions.It subsequently encapsulates the primary applications,including thermal-regulating textiles and energy-saving devices.Next,it highlights the challenges of ERCSs,including maximized thermoregulatory effects,environmental adaptability,scalability and sustainability,and interdisciplinary integration.It seeks to offer direction for forthcoming fundamental research and industrial advancement of radiative cooling systems in real-world applications. 展开更多
关键词 Radiative cooling systems Engineered materials Thermal-regulating ENERGY-SAVING Smart applications
在线阅读 下载PDF
Biomaterial-based drug delivery systems for the therapy of malignant pleural effusion
15
作者 Yiyao Wan Wen Chen +3 位作者 Yan Yu Meng Pan Kun Shi Zhiyong Qian 《Chinese Chemical Letters》 2026年第1期148-158,共11页
Malignant pleural effusion(MPE) is a serious disease caused by malignant tumors with high morbidity and mortality.Chemotherapy,immunotherapy,and antiangiogenic therapy are common treatments for MPE at present.However,... Malignant pleural effusion(MPE) is a serious disease caused by malignant tumors with high morbidity and mortality.Chemotherapy,immunotherapy,and antiangiogenic therapy are common treatments for MPE at present.However,traditional chemotherapeutic drugs have many side effects and can easily lead to drug resistance in patients.The complex tumor microenvironment(TME) of MPE directly reduces the antitumor efficacy of immunotherapy.Fortunately,drug delivery systems(DDSs) based on biomaterials have the ability to overcome some of the drawbacks of conventional treatments by improving drug stability,increasing the accuracy of tumor cell targeting,reducing toxic side effects,and remodeling TME,ultimately improving drug efficacy.Therefore,the purpose of this review is to provide an overview and discussion of the latest progress in biomaterial-based DDSs for the treatment of MPE.We discuss the application of biomaterials in the treatment of MPE from multiple perspectives,including chemotherapy,immunotherapy,combination therapy,and pleurodesis,where microspheres,cell membrane-derived microparticles(MPs),micelles,nanoparticles,and liposomes,are involved.The application of these biomaterials has been proven to have great potential in the treatment of MPE,providing a new idea for follow-up research. 展开更多
关键词 Malignant pleural effusion Drug delivery systems CHEMOTHERAPY IMMUNOTHERAPY Combination therapy PLEURODESIS
原文传递
Spatio-Temporal Earthquake Analysis via Data Warehousing for Big Data-Driven Decision Systems
16
作者 Georgia Garani George Pramantiotis Francisco Javier Moreno Arboleda 《Computers, Materials & Continua》 2026年第3期1963-1988,共26页
Earthquakes are highly destructive spatio-temporal phenomena whose analysis is essential for disaster preparedness and risk mitigation.Modern seismological research produces vast volumes of heterogeneous data from sei... Earthquakes are highly destructive spatio-temporal phenomena whose analysis is essential for disaster preparedness and risk mitigation.Modern seismological research produces vast volumes of heterogeneous data from seismic networks,satellite observations,and geospatial repositories,creating the need for scalable infrastructures capable of integrating and analyzing such data to support intelligent decision-making.Data warehousing technologies provide a robust foundation for this purpose;however,existing earthquake-oriented data warehouses remain limited,often relying on simplified schemas,domain-specific analytics,or cataloguing efforts.This paper presents the design and implementation of a spatio-temporal data warehouse for seismic activity.The framework integrates spatial and temporal dimensions in a unified schema and introduces a novel array-based approach for managing many-to-many relationships between facts and dimensions without intermediate bridge tables.A comparative evaluation against a conventional bridge-table schema demonstrates that the array-based design improves fact-centric query performance,while the bridge-table schema remains advantageous for dimension-centric queries.To reconcile these trade-offs,a hybrid schema is proposed that retains both representations,ensuring balanced efficiency across heterogeneous workloads.The proposed framework demonstrates how spatio-temporal data warehousing can address schema complexity,improve query performance,and support multidimensional visualization.In doing so,it provides a foundation for integrating seismic analysis into broader big data-driven intelligent decision systems for disaster resilience,risk mitigation,and emergency management. 展开更多
关键词 Data warehouse data analysis big data decision systems SEISMOLOGY data visualization
在线阅读 下载PDF
A Novel Signature-Based Secure Intrusion Detection for Smart Transportation Systems
17
作者 Hanaa Nafea Awais Qasim +3 位作者 Sana Abdul Sattar Adeel Munawar Muhammad Nadeem Ali Byung-Seo Kim 《Computers, Materials & Continua》 2026年第3期1309-1324,共16页
The increased connectivity and reliance on digital technologies have exposed smart transportation systems to various cyber threats,making intrusion detection a critical aspect of ensuring their secure operation.Tradit... The increased connectivity and reliance on digital technologies have exposed smart transportation systems to various cyber threats,making intrusion detection a critical aspect of ensuring their secure operation.Traditional intrusion detection systems have limitations in terms of centralized architecture,lack of transparency,and vulnerability to single points of failure.This is where the integration of blockchain technology with signature-based intrusion detection can provide a robust and decentralized solution for securing smart transportation systems.This study tackles the issue of database manipulation attacks in smart transportation networks by proposing a signaturebased intrusion detection system.The introduced signature facilitates accurate detection and systematic classification of attacks,enabling categorization according to their severity levels within the transportation infrastructure.Through comparative analysis,the research demonstrates that the blockchain-based IDS outperforms traditional approaches in terms of security,resilience,and data integrity. 展开更多
关键词 Smart transportation intrusion detection network security blockchain smart contract
在线阅读 下载PDF
Coordinated Control Strategy for Active Frequency Support in PV-Storage Integrated Systems
18
作者 Junxian Ma Haonan Zhao +3 位作者 Zhibing Hu Yaru Shen Fan Ding Shouqi Jiang 《Energy Engineering》 2026年第2期134-152,共19页
Energy storage-equipped photovoltaic(PV-storage)systems can meet frequency regulation requirements under various operating conditions,and their coordinated support for grid frequency has become a future trend.To addre... Energy storage-equipped photovoltaic(PV-storage)systems can meet frequency regulation requirements under various operating conditions,and their coordinated support for grid frequency has become a future trend.To address frequency stability issues caused by low inertia and weak damping,this paper proposes a multi-timescale frequency regulation coordinated control strategy for PV-storage integrated systems.First,a self-synchronizing control strategy for grid-connected inverters is designed based on DC voltage dynamics,enabling active inertia support while transmitting frequency variation information.Next,an energy storage inertia support control strategy is developed to enhance the frequency nadir,and an active frequency support control strategy for PV system considering a frequency regulation deadband is proposed,where the deadband value is determined based on the power regulation margin of synchronous generators,allowing the PV-storage system to adaptively switch between inertia support and primary frequency regulation under different disturbance conditions.This approach ensures system frequency stability while fully leveraging the regulation capabilities of heterogeneous resources.Finally,the real-time digital simulation results of the PV-storage integrated system demonstrate that,compared to existing control methods,the proposed strategy effectively reduces the rate of change of frequency and improves the frequency nadir under various disturbance scenarios,verifying its effectiveness. 展开更多
关键词 PV-storage integrated systems inertia self-synchronization control primary frequency regulation frequency stability
在线阅读 下载PDF
A Robust Vision-Based Framework for Traffic Sign and Light Detection in Automated Driving Systems
19
作者 Mohammed Al-Mahbashi Ali Ahmed +3 位作者 Abdolraheem Khader Shakeel Ahmad Mohamed A.Damos Ahmed Abdu 《Computer Modeling in Engineering & Sciences》 2026年第1期1207-1232,共26页
Reliable detection of traffic signs and lights(TSLs)at long range and under varying illumination is essen-tial for improving the perception and safety of autonomous driving systems(ADS).Traditional object detection mo... Reliable detection of traffic signs and lights(TSLs)at long range and under varying illumination is essen-tial for improving the perception and safety of autonomous driving systems(ADS).Traditional object detection models often exhibit significant performance degradation in real-world environments characterized by high dynamic range and complex lighting conditions.To overcome these limitations,this research presents FED-YOLOv10s,an improved and lightweight object detection framework based on You Only look Once v10(YOLOv10).The proposed model integrates a C2f-Faster block derived from FasterNet to reduce parameters and floating-point operations,an Efficient Multiscale Attention(EMA)mechanism to improve TSL-invariant feature extraction,and a deformable Convolution Networks v4(DCNv4)module to enhance multiscale spatial adaptability.Experimental findings demonstrate that the proposed architecture achieves an optimal balance between computational efficiency and detection accuracy,attaining an F1-score of 91.8%,and mAP@0.5 of 95.1%,while reducing parameters to 8.13 million.Comparative analyses across multiple traffic sign detection benchmarks demonstrate that FED-YOLOv10s outperforms state-of-the-art models in precision,recall,and mAP.These results highlight FED-YOLOv10s as a robust,efficient,and deployable solution for intelligent traffic perception in ADS. 展开更多
关键词 Automated driving systems traffic sign and light recognition YOLO EMA DCNv4
在线阅读 下载PDF
THE VARIATIONAL PRINCIPLE FOR A BS DIMENSION OF SUBSETS FOR NON-AUTONOMOUS DYNAMICAL SYSTEMS
20
作者 Zhongxuan YANG Xiaojun HUANG 《Acta Mathematica Scientia》 2026年第1期311-329,共19页
In this manuscript,we consider a non-autonomous dynamical system.Using the Carathéodory structure,we define a BS dimension on an arbitrary subset and obtain a Bowen’s equation that illustrates the relation of th... In this manuscript,we consider a non-autonomous dynamical system.Using the Carathéodory structure,we define a BS dimension on an arbitrary subset and obtain a Bowen’s equation that illustrates the relation of the BS dimension to the Pesin-Pitskel topological pressure given by Nazarian[24].Moreover,we establish a variational principle and an inverse variational principle for the BS dimension of non-autonomous dynamical systems.Finally,we also get an analogue of Billingsley’s theorem for the BS dimension of non-autonomous dynamical systems. 展开更多
关键词 non-autonomous dynamical systems BS dimension Bowen’s equation variational principle
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部