The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is prevalently known that Markov chains have been successfully applied to many fields such as digital communications, queuing theory, and finance. However, when the system becomes massive and complex, the computational load will become too heavy to be handled by conventional approaches. To address this issue, molecular computation, which is inherently parallel, has been considered in this paper...
There exists a few branches which are key to the development of a cascading failure, so it is of great significance to find them. In order to identify these branches accurately, branch combinations should be concerned. This paper first proposes a reformulation of cascading failure process based on Markov decision process, and then Q-learning algorithm for model solution is introduced to find out the...
This paper deals with the H∞ control for a class of continuous-time networked control systems based on continuous-time Markov chains. Firstly, with controller switching strategy, a class of linear continuous-time networked control systems are modeled as continuous-time Markov jump linear systems. Secondly, using the Lyapunov functional approach, sufficient conditions on the existence of an H∞ controller...
This paper investigates the quantized H∞ filtering problem for a class of networked systems. The networked system is modeled as a Markov system with employing new transition probabilities matrix. And the mode-dependent H∞ filter is studied. The logarithmic quantizer is considered and the quantzied measurement signals are dealt with by utilizing the sector bound method, in which the quantization error...
This paper investigates the problem of static output feedback H∞ control for discrete-time Markov jump systems (MJSs) with partly unknown transition probabilities. Two design methods are presented to deal with it respectively. First, similar to the existing method of dealing with the unknown part of transition probabilities and with the help of the Finsler's Lemma, two sets of slack variables with...
This paper investigates the problem of H∞ filtering for discrete-time Markov jump systems with partly unknown transition probabilities (TPs). The filter to be designed is assumed to be mode-dependent. Firstly, with the help of the Finsler's Lemma, two sets of slack variables with special structure are introduced to provide an improved mode-dependent H∞ filters design method with extra degrees of freedom...
Wireless sensor networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. Establishing secure communication between two sensors nodes is of typical defense against eavesdropping, therefore in-volveing the key agreement. In this paper, we present a key agreement scheme without the trusted third parties (TTP) by exploiting the special characteristics of...
With the development of computer vision and image processing technology, human motion recognition, because of its wide range of applications, now has been attracting extensive attention in the field of computer vision. Vision-based recognition of people's motion not only includes the knowledge of image recognition and computer vision, but also involves the theory of recognition and artificial intelligence,...
Biological systems exhibit remarkable adaptation and robustness in the face of widely changing environments. Currently speaking, we often imitate the properties of biological systems. Based on this thought, it also exists the analogous situation in the WSNs (wireless sensor networks). Survivability is the ability to provide essential services in the presence of attacks and failures, and recover full...
Software aging related failures can be prevented by applying software rejuvenation technology. But the restart operation in the software rejuvenation phase makes the system unable to provide services, which leads to system unavailability. The software rejuvenation model with pre-start technology is therefore proposed to reduce downtime and improve availability by switching between active copy and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.