期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Kalman filtering for linear singular systems subject to round-robin protocol
1
作者 Ashna Goel Shovan Bhaumik Nutan Kumar Tomar 《Control Theory and Technology》 EI CSCD 2024年第4期543-551,共9页
This paper introduces a Kalman-type recursive state estimator for a class of discrete-time stochastic linear singular systems where the measurements are carried part by part periodically following a scheduling algorit... This paper introduces a Kalman-type recursive state estimator for a class of discrete-time stochastic linear singular systems where the measurements are carried part by part periodically following a scheduling algorithm.We consider that the system is in a network with limited allotted bandwidth,which refers to a situation where the total available bandwidth for data transmission through the network is limited.This limitation can occur for various reasons,such as network congestion,resource allocation policies,or bandwidth limitations imposed by network administrators.In such networks,the entire measurement vector cannot be transmitted to the estimator instantly.Thus,managing a network with a limited allotted bandwidth requires careful planning,monitoring,and implementing some scheduling strategies to optimize the use of measured data while estimating the system states.We show that a scheduling method,namely,round-robin protocol,is suitable for singular systems to deal with such a scenario.The upper bound of the prior error covariance is studied via a periodic Riccati equation(PRE).To retain the boundedness of prior error covariance,the stability of the PRE is examined by the observability properties of the round-robin-induced system.Finally,a simulation example is presented to show the effectiveness of the designed filtering scheme. 展开更多
关键词 Networked control systems Communication constraints round-robin protocol Singular systems FILTERING
原文传递
Observer-based quantised control of networked systems with round-robin protocol and transmission delay
2
作者 Ge Guo Xuefei Yan Jian Kang 《Journal of Control and Decision》 2025年第1期24-33,共10页
This paper addresses the ultimate boundedness control problem for a class of networked nonlinear systems with the round-robin(RR)protocol and uniform quantisation.The communication between sensor nodes and the control... This paper addresses the ultimate boundedness control problem for a class of networked nonlinear systems with the round-robin(RR)protocol and uniform quantisation.The communication between sensor nodes and the controller is implemented via a constrained communication channel.The quantised output of the system is transmitted to the remote controller through a communication channel subject to a transmission delay.For the purpose of alleviating possible data collision,the well-known RR communication protocol is deployed to schedule the data transmissions.On the other hand,the uniform quantisation effects of the network are characterised by a round function(i.e.the nearest integer function).The purpose of the addressed problem is to design an observer-based controller for the networked nonlinear systems such that,in the presence of RR protocol and uniform quantisation effects,the closed-loop system is ultimately bounded.The controller is designed based on mean square stability analysis and Lyapunov-like method.A set of sufficient conditions for the ultimate boundedness of the closed-loop system are established and,on the basis of which,the desired controller gains are obtained by solving a set of linear matrix inequalities.The effectiveness of the proposed method is verified by numerical examples. 展开更多
关键词 Networked control systems(NCSs) round-robin(RR)protocol transmission delay uniform quantisation ultimate boundedness control
原文传递
Round-robin differential quadrature phase-shift quantum key distribution 被引量:1
3
作者 Chun Zhou Ying-Ying Zhang +3 位作者 Wan-Su Bao Hong-Wei Li Yang Wang Mu-Sheng Jiang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期63-67,共5页
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas... Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol. 展开更多
关键词 round-robin differential phase-shift protocol quantum key distribution intercept-resend attack beam-splitting attack
原文传递
Event-triggered finite-time guaranteed cost control of asynchronous switched systems under the round-robin protocol via an AED-ADT method
4
作者 Hangli REN Qingxi FAN Linlin HOU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第10期1378-1389,共12页
This paper focuses on addressing the problems of finite-time boundedness and guaranteed cost control in switched systems under asynchronous switching.To reduce redundant information transmission and alleviate data con... This paper focuses on addressing the problems of finite-time boundedness and guaranteed cost control in switched systems under asynchronous switching.To reduce redundant information transmission and alleviate data congestion of sensor nodes,two schemes are proposed:the event-triggered scheme(ETS)and the round-robin protocol(RRP).These schemes are designed to ensure that the system exhibits good dynamic characteristics while reducing communication resources.In the field of finite-time control,a switching signal is designed using the admissible edge-dependent average dwell time(AED-ADT)method.This method involves a slow AED-ADT switching and a fast AED-ADT switching,which are respectively suitable for finite-time stable and finite-time unstable situations of the controlled system within the asynchronous switching interval.By constructing a double-mode dependent Lyapunov function,the finite-time bounded criterion and the controller gain of the switched systems are obtained.Finally,the validity of the proposed results is showcased by implementing a buck-boost voltage circuit model. 展开更多
关键词 Switched systems Event-triggered scheme round-robin protocol Asynchronous switching Admissible edge-dependent average dwell time(AED-ADT) Guaranteed cost control
原文传递
A TRAFFIC OVERSTOCK RESLOVE SCHEME IN WLAN
5
作者 Liu Jing Li Jiandong Chen Yanhui 《Journal of Electronics(China)》 2005年第5期478-484,共7页
A new Multiple Access Control (MAC) protocol-User Adaptive Scheduling Multiple Access (UASMA) protocol is proposed in this paper. It can well schedule the packet transmission according to the exact number of active Mo... A new Multiple Access Control (MAC) protocol-User Adaptive Scheduling Multiple Access (UASMA) protocol is proposed in this paper. It can well schedule the packet transmission according to the exact number of active Mobile Terminals (MTs) determined by selforganizing algorithm and adjust the number of packets sent by one node in one frame properly.UASMA protocol employs a special frame structure, which makes it possible to allocate channel resource to uplink and downlink traffic according to their respective service requirements. The proposed concept of referenced-frame-length can ensure the frame length varies in a certain range,and consequently increase the utilization efficiency of the channel greatly. Meanwhile, UASMA protocol uses an efficient collision resolution algorithm to guarantee that active MTs can access the channel rapidly. Finally, the performance of UASMA protocol is evaluated by simulation and it is also compared with carrier sense multiple access, rounding-poll and UPMA protocols. The results show that the UASMA has better performance than others. 展开更多
关键词 Multiple Access Control (MAC) protocol round-robin User number Packet overstock
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部