Sign Up to like & get
recommendations!
0
Published in 2018 at "Aerospace Science and Technology"
DOI: 10.1016/j.ast.2017.10.028
Abstract: Abstract The stability characteristics of a distributed consensus-based Kalman filter estimation and control scheme are studied through analytic and numerical means. This estimation scheme seeks to minimally reduce the necessary bandwidth for communication while maintaining…
read more here.
Keywords:
estimation;
control scheme;
estimation control;
control ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3152541
Abstract: Tree-based systems rely on real-time dissemination trees to deliver information to nodes. In order to offer good services, two fundamental aspects should guide the real-time growth process: low node degree and short distances to the…
read more here.
Keywords:
design analysis;
growth;
node degree;
analysis distributed ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3168971
Abstract: After the high proportion of new energy is connected, the decrease of the proportion of synchronous machine in power system will cause a series of stability hazards, such as the lack of inertia. The distributed…
read more here.
Keywords:
optimization transient;
analysis distributed;
transient analysis;
distributed asynchronous ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Automatic Control"
DOI: 10.1109/tac.2018.2799567
Abstract: In this paper, we will analyze a basic class of diffusion adaptive filters based on least mean squares algorithms. Both stability and performance analyses will be carried out under a general cooperative information condition, without…
read more here.
Keywords:
distributed adaptive;
based diffusion;
adaptive filters;
diffusion ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Control of Network Systems"
DOI: 10.1109/tcns.2020.3017717
Abstract: This article studies epidemic processes over discrete-time periodic time-varying networks. We focus on the susceptible-infected-susceptible (SIS) model that accounts for a (possibly) mutating virus. We say that an agent is in the disease-free state if…
read more here.
Keywords:
dfe;
epidemic processes;
control;
sufficient condition ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Analysis and Applications"
DOI: 10.1142/s0219530519410045
Abstract: In this paper, we establish the error analysis for distributed pairwise learning with multi-penalty regularization, based on a divide-and-conquer strategy. We demonstrate with L2-error bound that t...
read more here.
Keywords:
analysis distributed;
analysis;
multi penalty;
pairwise learning ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Complexity"
DOI: 10.1155/2021/6690761
Abstract: In this article, a switched quantizer is proposed to solve the bandwidth limitation application problem for distributed wireless sensor networks (WSNs). The proposed estimator based on switched quantitative event-triggered Kalman consensus filtering (KCF) algorithm is…
read more here.
Keywords:
switched quantizer;
sensor systems;
distributed wireless;
analysis distributed ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "Journal of Aircraft"
DOI: 10.2514/1.c036021
Abstract: Uncertainty based multidisciplinary analysis (UMDA) is a methodology to quantify uncertainty on the system-level quantity of interest by propagating uncertainty within and among multiple discipline...
read more here.
Keywords:
methodology;
distributed multidisciplinary;
analysis;
probabilistic analysis ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Future Internet"
DOI: 10.3390/fi11030065
Abstract: A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value.…
read more here.
Keywords:
system;
distributed honeypots;
game theoretic;
theoretic analysis ... See more keywords