Networked control system (NCS) has become the focus of many recent researches in the control field, with topics covering from scheduling methods, modeling and compensation schemes for the network-induced delay...
This paper studies the stability of multi-input multi-output networked control systems (MIMO NCSs) with multiple channels. A general model for multi-channel MIMO NCSs with many independent sensors and actuator...
Taking into account the uncertainties of load and wind power outputs, this paper proposes a combined iteration method for probabilistic load flow (PLF) applied to grid-connected induction wind power system. A ...
Aiming at the new uncertainties brought by wind farms connected directly into power grid, a novel approach to calculate overload risk in grid-connected induction wind power system is proposed. In this method, ...
The paper investigates Networked Control Systems (NCSs) with quantisation and packet dropouts both the sensor-to-controller (S/C) and controller-to-actuator (C/A). Firstly, the signals both the S/C and C/A are...
This paper is concerned with stochastic stability analysis of MIMO NCSs with multi-channel communication constrain and multi-quantizers. With communication constrains treated as packet disordering and quantiza...
This paper is concerned with observer-based exponential stability for networked control systems (NCSs) with data packet dropout. Firstly, the data packet dropouts both the sensor-to-controller and the controll...
Gene selection is a key issue in the analysis of microarray data with small samples and variant correlation. The main objective of this paper is to select the most informative genes from thousands of genes wit...
This paper is concerned with the probabilistic optimal power flow (POPF) calculation including wind farms with correlated parameters which contains nodal injections. The two-point estimate method (2PEM) is emp...
A major challenge when attempting to model biochemical reaction networks within the cell is that the dimensionality can become huge, where a large number of molecular species can be involved even in relatively...
This paper presents a method of static security risk assessment for wind-integrated power system with the consideration of network configuration uncertainties and correlated parameters. A probabilistic load fl...
Under the network environment, data packet losses bring an undesirable effect on parameter identification. To solve this problem, an online recursive identification method over networks with random packet loss...
In large scale wireless sensor and actuator network (WSAN), unreliable wireless and multihop communications make challenges in designing centralized control due to severe packet dropout and latency. To this en...
Online anomaly detection in wireless sensor networks (WSNs) has been explored extensively. In this paper, exploiting the spatio-temporal correlation existed in the sensed data collected from WSNs, an online an...
In large scale wireless sensor and actuator network (WSAN), severe packet dropout and latency make challenges in designing centralized control scheme. Moreover, if system runs stably with little fluctuation of...
The focus of this paper is that the experimental design and performance analysis of inverted pendulum platform. Firstly, Different weighting matrices Q and R of LQR controller is set, and the effect on the ca...
This paper is concerned with experimental analysis of visual inverted pendulum servoing system. Firstly, visual inverted pendulum servoing system is introduced, and three typical image processing algorithms a...
This paper introduces a discrete Wirtinger-based inequality to investigate the problem of delay-dependent stability and stabilization of uncertain T–S fuzzy systems with interval time-varying delays. By constr...
International Conference on Life System Modeling and Simulation, LSMS 2017 and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2017, Nan**g, China, September 22-24, 2017, Proceedings, Part II
Detecting replay attacks in power systems is quite challenging, since the attackers can mimic normal power states and do not make direct damages to the system. Existing works are mostly model-based, which may ...