Security Situation Awareness and Interference Control Method for Power Wireless Private Networks Based on Dynamic Baseline

Author(s):  
Jin Huang ◽  
Weiwei Miao ◽  
Junzhong Yang ◽  
Xinglong Wang ◽  
Linshan Shi ◽  
...  
2018 ◽  
Vol 38 (5) ◽  
pp. 558-567 ◽  
Author(s):  
Hua Chen ◽  
Lei Chen ◽  
Qian Zhang ◽  
Fei Tong

Purpose The finite-time visual servoing control problem is considered for dynamic wheeled mobile robots (WMRs) with unknown control direction and external disturbance. Design/methodology/approach By using finite-time control method and switching design technique. Findings First, the visual servoing kinematic WMR model is developed, which can be converted to the dynamic chained-form systems by using a state and input feedback transformation. Then, for two decoupled subsystems of the chained-form systems, according to the finite-time stability control theory, a discontinuous three-step switching control strategy is proposed in the presence of uncertain control coefficients and external disturbance. Originality/value A class of discontinuous anti-interference control method has been presented for the dynamic nonholonomic systems.


2014 ◽  
Vol 543-547 ◽  
pp. 3023-3028
Author(s):  
Shao Jing Zhou

Active defense technology may predict future attack situation and detect unknown attacks, but it has many questions to will be researched: vulnerability, lower mal-ware detection rate, security situation awareness technology has faced problem of inter-organization cooperation, real-time response, correlation analysis, high-load low fault tolerance. Artificial immune technology combines with active defense technology to solve integrated artificial immune security situation awareness system with artificial immune technology and active defense technology by Black Hole theory and for diversification ad development characteristics of the artificial immune and active defense, gives a method about simulating Black Hole accretion theory to achieve absorption and utilization a variety of security and virus technology; a no escaped mechanism simulate the Black Hole; a method about access control method based on Hawking radiation theory. Based on the above work, applies virtual and sandbox technology to achieve network system itself virus immunity, and then that we implement re-engineering and reverse engineering for virus technology in order to study virus and dig more holes, create unified integrated defense tactics, so this defense system will improve ability of situation comprehension, situation prediction and intelligence decision.


2021 ◽  
Vol 12 (4) ◽  
pp. 220
Author(s):  
Jun Hou ◽  
Weidong Huang ◽  
Dongxiao Huang

During the wireless charging of an automated guided vehicle (AGV), the output voltage is unstable due to changes in parameters such as coil mutual inductance and load resistance caused by external interferences and internal mismatches of the system. In this paper, an integral sliding mode control method based on an unknown input observer (UIO) containing predictive equations is designed to build an inductor–capacitor–capacitor-series (LCC-S) topology model for wireless power transfer (WPT). The observer designed by this method can perceive changes in the secondary resistance parameter and the mutual inductance of the primary and secondary coils. The design with the prediction equation speeds up the convergence of the observer to the true value. The observer’s compensation of the control system avoids the occurrence of integral oversaturation. The experimental results show that, based on the UIO-SMC system output, voltage can be accurately controlled to meet the requirement for a given voltage. The effect of suppressing disturbance is better than with SMC and PI control. When the system parameter changes, it has better voltage anti-interference performance and stronger ripple suppression.


2020 ◽  
Vol 63 (9) ◽  
pp. 3036-3050
Author(s):  
Elma Blom ◽  
Tessel Boerma

Purpose Many children with developmental language disorder (DLD) have weaknesses in executive functioning (EF), specifically in tasks testing interference control and working memory. It is unknown how EF develops in children with DLD, if EF abilities are related to DLD severity and persistence, and if EF weaknesses expand to selective attention. This study aimed to address these gaps. Method Data from 78 children with DLD and 39 typically developing (TD) children were collected at three times with 1-year intervals. At Time 1, the children were 5 or 6 years old. Flanker, Dot Matrix, and Sky Search tasks tested interference control, visuospatial working memory, and selective attention, respectively. DLD severity was based on children's language ability. DLD persistence was based on stability of the DLD diagnosis. Results Performance on all tasks improved in both groups. TD children outperformed children with DLD on interference control. No differences were found for visuospatial working memory and selective attention. An interference control gap between the DLD and TD groups emerged between Time 1 and Time 2. Severity and persistence of DLD were related to interference control and working memory; the impact on working memory was stronger. Selective attention was unrelated to DLD severity and persistence. Conclusions Age and DLD severity and persistence determine whether or not children with DLD show EF weaknesses. Interference control is most clearly impaired in children with DLD who are 6 years and older. Visuospatial working memory is impaired in children with severe and persistent DLD. Selective attention is spared.


2001 ◽  
Vol 84 (9) ◽  
pp. 16-26
Author(s):  
Tadao Saito ◽  
Hitoshi Aida ◽  
Terumasa Aoki ◽  
Soichiro Hidaka ◽  
Tredej Toranawigtrai ◽  
...  

Author(s):  
Anna Soveri ◽  
Eric P. A. Karlsson ◽  
Otto Waris ◽  
Petra Grönholm-Nyman ◽  
Matti Laine

Abstract. In a randomized controlled trial, we investigated the pattern of near transfer effects of working memory (WM) training with an adaptive auditory-visuospatial dual n-back training task in healthy young adults. The results revealed significant task-specific transfer to an untrained single n-back task, and more general near transfer to a WM updating composite score plus a nearly significant effect on a composite score measuring interference control in WM. No transfer effects were seen on Active or Passive WM composites. The results are discussed in the light of cognitive versus strategy-related overlap between training and transfer tasks.


2004 ◽  
Author(s):  
Parsa Mirhaji ◽  
S. Lillibridge ◽  
R. Richesson ◽  
J. Zhang ◽  
J. Smith

Author(s):  
Michael D. Matthews ◽  
◽  
Scott A. Beal

2004 ◽  
Author(s):  
Cheryl A. Bolstad ◽  
◽  
Cleotilde Gonzalez ◽  
John Graham

Sign in / Sign up

Export Citation Format

Share Document