Results 61 to 70 of about 2,436 (140)
Model‐based fault diagnosis in closed‐loop safety‐critical chemical reactors: An experimental study
Abstract This experimental study investigates fault detection and estimation in a continuous stirred‐tank reactor (CSTR) system under closed‐loop feedback control, including an analysis of different manipulative inputs for temperature regulation. A novel fault diagnosis approach is proposed, combining residual signal analysis and T2 statistic for real ...
Pu Du, Benjamin Wilhite, Costas Kravaris
wiley +1 more source
Geometric realizations of the s‐weak order and its lattice quotients
Abstract For an n$n$‐tuple s${\bm{s}}$ of nonnegative integers, the s${\bm{s}}$‐weak order is a lattice structure on s${\bm{s}}$‐trees, generalizing the weak order on permutations. We first describe the join irreducible elements, the canonical join representations, and the forcing order of the s${\bm{s}}$‐weak order in terms of combinatorial objects ...
Eva Philippe, Vincent Pilaud
wiley +1 more source
Reach Set-Based Secure State Estimation against Sensor Attacks with Interval Hull Approximation
This paper deals with the problem of secure state estimation in an adversarial environment with the presence of bounded noises. The problem is given as min-max optimization, that is, the system operator seeks an optimal estimate which minimizes the worst-
Takumi Shinohara, Toru Namerikawa
doaj +1 more source
Zonotopes and four-dimensional superconformal field theories [PDF]
The a-maximization technique proposed by Intriligator and Wecht allows us to determine the exact R-charges and scaling dimensions of the chiral operators of four-dimensional superconformal field theories.
A. Butti +22 more
core +5 more sources
AbstractThe Ehrhart polynomial$${\text {ehr}}_P (n)$$ ehr P ( n ) of a lattice polytope P gives the ...
Matthias Beck +2 more
openaire +3 more sources
Safety Filters Against Actuator Attacks
ABSTRACT This manuscript focuses on mitigating the effect of deception attacks on control signals, that is, in the presence of an adversary that tampers with data coming from the controller to the system actuators in order to degrade the plant performance.
Cédric Escudero +4 more
wiley +1 more source
Projection volumes of hyperplane arrangements [PDF]
We prove that for any finite real hyperplane arrangement the average projection volumes of the maximal cones is given by the coefficients of the characteristic polynomial of the arrangement. This settles the conjecture of Drton and Klivans that this held
Klivans, Caroline J., Swartz, Ed
core
Steenrod operations via higher Bruhat orders
Abstract The purpose of this paper is to establish a correspondence between the higher Bruhat orders of Yu. I. Manin and V. Schechtman, and the cup‐i$i$ coproducts defining Steenrod squares in cohomology. To any element of the higher Bruhat orders, we associate a coproduct, recovering Steenrod's original ones from extremal elements in these orders ...
Guillaume Laplante‐Anfossi +1 more
wiley +1 more source
A spectral convex set is a collection of symmetric matrices whose range of eigenvalues forms a symmetric convex set. Spectral convex sets generalize the Schur-Horn orbitopes studied by Sanyal–Sottile–Sturmfels (2011). We study this class of convex bodies,
Raman Sanyal, James Saunderson
doaj +1 more source
Optimization and Abstraction: A Synergistic Approach for Analyzing Neural Network Robustness
In recent years, the notion of local robustness (or robustness for short) has emerged as a desirable property of deep neural networks. Intuitively, robustness means that small perturbations to an input do not cause the network to perform ...
Bastani Osbert +13 more
core +1 more source

