Networked control system (NCS) has become the focus of many recent researches in the control field, with topics covering from scheduling methods, modeling and compensation schemes for the network-induced delay...
This paper studies the stability of multi-input multi-output networked control systems (MIMO NCSs) with multiple channels. A general model for multi-channel MIMO NCSs with many independent sensors and actuator...
Taking into account the uncertainties of load and wind power outputs, this paper proposes a combined iteration method for probabilistic load flow (PLF) applied to grid-connected induction wind power system. A ...
Aiming at the new uncertainties brought by wind farms connected directly into power grid, a novel approach to calculate overload risk in grid-connected induction wind power system is proposed. In this method, ...
This paper is concerned with stochastic stability analysis of MIMO NCSs with multi-channel communication constrain and multi-quantizers. With communication constrains treated as packet disordering and quantiza...
This paper is concerned with observer-based exponential stability for networked control systems (NCSs) with data packet dropout. Firstly, the data packet dropouts both the sensor-to-controller and the controll...
Gene selection is a key issue in the analysis of microarray data with small samples and variant correlation. The main objective of this paper is to select the most informative genes from thousands of genes wit...
This paper is concerned with the probabilistic optimal power flow (POPF) calculation including wind farms with correlated parameters which contains nodal injections. The two-point estimate method (2PEM) is emp...
A major challenge when attempting to model biochemical reaction networks within the cell is that the dimensionality can become huge, where a large number of molecular species can be involved even in relatively...
This paper presents a method of static security risk assessment for wind-integrated power system with the consideration of network configuration uncertainties and correlated parameters. A probabilistic load fl...
Under the network environment, data packet losses bring an undesirable effect on parameter identification. To solve this problem, an online recursive identification method over networks with random packet loss...
In large scale wireless sensor and actuator network (WSAN), unreliable wireless and multihop communications make challenges in designing centralized control due to severe packet dropout and latency. To this en...
In large scale wireless sensor and actuator network (WSAN), severe packet dropout and latency make challenges in designing centralized control scheme. Moreover, if system runs stably with little fluctuation of...
This paper introduces a discrete Wirtinger-based inequality to investigate the problem of delay-dependent stability and stabilization of uncertain T–S fuzzy systems with interval time-varying delays. By constr...
International Conference on Life System Modeling and Simulation, LSMS 2017 and International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2017, Nan**g, China, September 22-24, 2017, Proceedings, Part II
Detecting replay attacks in power systems is quite challenging, since the attackers can mimic normal power states and do not make direct damages to the system. Existing works are mostly model-based, which may ...
Dynamic state estimation is usually employed to provide real-time operation and effective supervision of smart grid (SG), which has been also found vulnerable to a typical data injection cyber-attack submerged...
It is one of the most important research topics in the field of automatic control to ensure stability of networked control system and keep controlled parameters unchanged in the presence of data injection atta...
A novel framework for the state-of-charge (SOC) estimation of lithium batteries is proposed in this paper based on an adaptive unscented Kalman filters (AUKF) and radial basis function (RBF) neural networks. F...
While open communication infrastructures are embedded into multi-area power systems to support data transmittion, it make communication channels vulnerable to cyber attacks, reliability of power systems is aff...