Results 131 to 140 of about 3,224,849 (346)

Enhancing generalized spectral clustering with embedding Laplacian graph regularization

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract An enhanced generalised spectral clustering framework that addresses the limitations of existing methods by incorporating the Laplacian graph and group effect into a regularisation term is presented. By doing so, the framework significantly enhances discrimination power and proves highly effective in handling noisy data.
Hengmin Zhang   +5 more
wiley   +1 more source

Distributed Formation Control for Heterogeneous Robot Systems Based on Competitive Mechanism

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper presents an adaptive formation control method for a heterogeneous robot swarm, utilising a multilevel formation task tree to model various types of formation tasks and a single‐state distributed k‐winner‐take‐all (S‐DKWTA) algorithm to address the MRTA problem.
Zhenghui Cui, Xiaoyi Gu, Ning Tan
wiley   +1 more source

Design and Validation of Zeroing Neural Network With Active Noise Rejection Capability for Time‐Varying Problems Solving

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Recently, the zeroing neural network (ZNN) has demonstrated remarkable effectiveness in tackling time‐varying problems, delivering robust performance across both noise‐free and noisy environments. However, existing ZNN models are limited in their ability to actively suppress noise, which constrains their robustness and precision in solving ...
Yilin Shang   +3 more
wiley   +1 more source

Evolutionary Search for Polynomial Lyapunov Functions: A Genetic Programming Method for Exponential Stability Certification

open access: yesAxioms
This paper presents a method for constructing polynomial Lyapunov functions to analyze the stability of nonlinear dynamical systems. The approach is based on genetic programming, a variant of genetic algorithms where the search space consists of ...
Roman Pykhnivskyi   +3 more
doaj   +1 more source

Fixed‐Time Zeroing Neural Dynamics for Adaptive Coordination of Multi‐Agent Systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper presents an adaptive multi‐agent coordination (AMAC) strategy suitable for complex scenarios, which only requires information exchange between neighbouring robots. Unlike traditional multi‐agent coordination methods that are solved by neural dynamics, the proposed strategy displays greater flexibility, adaptability and scalability ...
Cheng Hua   +3 more
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

Lyapunov function search method for analysis of nonlinear systems stability using genetic algorithm

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
A wide class of smooth continuous dynamic nonlinear systems (control objects) with a measurable state vector is considered. The problem of finding a special function (Lyapunov function), which guarantees asymptotic stability for the presented class of ...
A. M. Zenkin   +2 more
doaj   +1 more source

From Distributed Noisy Data to Event‐Triggered Pinning Observer‐Based Control

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper presents an event‐triggered pinning observer‐based control of unknown large‐scale interconnected systems under false data injection attacks using distributed noisy data without any system identification step. An exogenous system is used to model the false data injection attack.
Xuan Jia   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy