Results 21 to 30 of about 239,500 (278)

Integrated Optimization for Biofuel Management Associated with a Biomass-Penetrated Heating System under Multiple and Compound Uncertainties

open access: yesEnergies, 2022
The biofuel management of a biofuel-penetrated district heating system is complicated due to its association with multiple and polymorphic uncertainties.
Dianzheng Fu   +3 more
doaj   +1 more source

Control Over Imperfect Networks: Model-Based Predictive Networked Control Systems

open access: yesIEEE Transactions on Industrial Electronics, 2011
Networked control systems (NCSs) are digital control systems in which the functionality of the sensor, control, and actuator reside in physically different computer nodes communicating over a network. However, random delays and data loss of the communication network can endanger the stability of an NCS.
Onat, Ahmet   +3 more
openaire   +4 more sources

Networked Control System An Overview

open access: yesInternational Journal of Computer Applications, 2015
Networked Control System (NCS) is fetching researchers’ interest from many decades. It’s been used in industry which range from manufacturing, automobile, aviation, aerospace to military. This paper gives the general architecture of NCS and its fundamental routes.
Asif, Seemal, Webb, Philip
openaire   +3 more sources

Power System Anomaly Detection Based on OCSVM Optimized by Improved Particle Swarm Optimization

open access: yesIEEE Access, 2019
This paper tries to solve anomaly detection, a very important issue in ensuring the safe and stable operation of power system. As the proportion of abnormal data in the operation of power system is very small, a one-class support vector machine (OCSVM ...
Zhongfeng Wang   +4 more
doaj   +1 more source

Trade-off of security and performance of lightweight block ciphers in Industrial Wireless Sensor Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
Lightweight block ciphers play an indispensable role for the security in the context of pervasive computing. However, the performance of resource-constrained devices can be affected dynamically by the selection of suitable cryptalgorithms, especially for
Chao Pei   +3 more
doaj   +1 more source

Temperature Prediction of Heating Furnace Based on Deep Transfer Learning

open access: yesSensors, 2020
Heating temperature is very important in the process of billet production, and it directly affects the quality of billet. However, there is no direct method to measure billet temperature, so we need to accurately predict the temperature of each heating ...
Naiju Zhai, Xiaofeng Zhou
doaj   +1 more source

Wireless model-based predictive networked control system over cooperative wireless network [PDF]

open access: yes, 2010
Owing to their distributed architecture, networked control systems (NCSs) are proven to be feasible in scenarios where a spatially distributed feedback control system is required. Traditionally, such NCSs operate over real-time wired networks.
Gurbuz, Ozgur   +3 more
core   +2 more sources

Automated Data Annotation for 6-DoF AI-Based Navigation Algorithm Development

open access: yesJournal of Imaging, 2021
Accurately estimating the six degree of freedom (6-DoF) pose of objects in images is essential for a variety of applications such as robotics, autonomous driving, and autonomous, AI, and vision-based navigation for unmanned aircraft systems (UAS ...
Javier Gibran Apud Baca   +7 more
doaj   +1 more source

Weak Resilience of Networked Control Systems

open access: yes, 2015
In this paper, we propose a method to establish a networked control system that maintains its stability in the presence of certain undesirable incidents on local controllers. We call such networked control systems weakly resilient.
Besselink, Bart   +5 more
core   +1 more source

A Tight Lower Bound on the Controllability of Networks with Multiple Leaders [PDF]

open access: yes, 2012
In this paper we study the controllability of networked systems with static network topologies using tools from algebraic graph theory. Each agent in the network acts in a decentralized fashion by updating its state in accordance with a nearest-neighbor ...
Abbas, Waseem   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy