387 research outputs found

    Estimator-based adaptive neural network control of leader-follower high-order nonlinear multiagent systems with actuator faults

    Get PDF
    The problem of distributed cooperative control for networked multiagent systems is investigated in this paper. Each agent is modeled as an uncertain nonlinear high-order system incorporating with model uncertainty, unknown external disturbance, and actuator fault. The communication network between followers can be an undirected or a directed graph, and only some of the follower agents can obtain the commands from the leader. To develop the distributed cooperative control algorithm, a prefilter is designed, which can derive the state-space representation to a newly constructed plant. Then, a set of distributed adaptive neural network controllers are designed by making certain modifications on traditional backstepping techniques with the aid of adaptive control, neural network control, and a second-order sliding mode estimator. Rigorous proving procedures are provided,which show that uniform ultimate boundedness of all the tracking errors can be achieved in a networked multiagent system. Finally, a numerical simulation is carried out to evaluate the theoretical results

    Large-eddy simulations of the inlet grid-generated turbulence

    Get PDF
    In this paper, a new technique of turbulence generation in large eddy simulation (LES) is studied and verified. In order to generate turbulence similar to the wind tunnel test, the proposed grid inlet technique places the grid on the Inlet boundary to achieve the following effects: changing the grid size controls the turbulence integral length scale and changing the distance from inlet controls the turbulence intensity. The purpose of this paper is to explore the domain requirements of grid-inlet technology by studying the turbulence characteristics of three different grid inlets. In particular, this paper further studies the effects of domain sizes on the lateral correlation of fluctuating wind by arranging the transverse positions of monitoring points irregularly and in equal proportion. Meanwhile, the isotropic hypothesis of gird-generated turbulence is verified by power spectrum. The results show that the turbulence intensity is unaffected by the domain sizes, the larger calculation domain corresponds to the gentler changing trend of the lateral correlation of the fluctuating wind and the flow fields under the three different domain sizes basically satisfy the isotropic hypothesis. The above results are helpful for the further application of the grid inlet technique

    Carbon Footprint Assessment of Large-scale Pig Production System in Northern China: a Case Study

    Get PDF
    China raises 50% of the global live pigs. However, few studies on carbon footprint (CF) of large-scale pig production based on China’s actual production conditions have been carried out. In this study, life cycle assessment (LCA) method and actual production data of a typical large-scale pig farm in Northern China were used to assess greenhouse gas (GHG) emissions or CF associated with the whole process of pig production, including feed production (crop planting, feed processing, and transportation), enteric fermentation, manure management and energy consumption. The results showed a CF of 3.39 kg CO2-eq per kg of live market pig, and relative contributions of 55%, 28%, 13%, and 4% to the total CF by feed production, manure management, farm energy consumption, and enteric fermentation, respectively. Crop planting accounted for 66% of the feed production CF, while feed processing and transportation accounted for the remaining 34%. Long-distance transport of semi-raw feed materials caused by planting-feeding separation and over-fertilization in feed crop planting were two main reasons for the largest contribution of GHG emissions from feed production for the total CF. CF from nitrogen fertilizer application accounted for 33%-44% of crop planting, and contributed to 16% of the total CF. CF from transportation of feed ingredients accounted for 17% of the total CF. If the amount of nitrogen fertilizer used for producing the main feed ingredients is reduced from 209 kg/hm2 (for corn) and 216 kg/hm2 (for wheat) to 140 kg/hm2 (corn) and 180 kg/hm2 (wheat), respectively, the total CF would be reduced by 7%. If transportation distance for feed materials decreased from 325-493 km to 30 km, along with reducing the number of empty vehicles for the transport, total CF would be reduced by 18%. The combined CF mitigation potential for over-fertilization and transportation distance is 26%. In addition, use of pit storage – anaerobic digestion – lagoon practice can reduce GHG emissions from manure management by 76% as compared to the traditional pit storage – lagoon manure treatment method. This case study reveals the impact of planting-feeding separation and over-fertilization on CF of pig supply chain in China. Manure management practice of pit storage – anaerobic digestion – lagoon is much more conductive to reducing CF as compared to the traditional method of pit storage – lagoon

    Distinct interactions between fronto-parietal and default mode networks in impaired consciousness

    Get PDF
    Existing evidence suggests that the default-mode network (DMN) and fronto-pariatal network (FPN) play an important role in altered states of consciousness. However, the brain mechanisms underlying impaired consciousness and the specific network interactions involved are not well understood. We studied the topological properties of brain functional networks using resting-state functional MRI data acquired from 18 patients (11 vegetative state/unresponsive wakefulness syndrome, VS/UWS, and 7 minimally conscious state, MCS) and compared these properties with those of healthy controls. We identified that the topological properties in DMN and FPN are anti-correlated which comes, in part, from the contribution of interactions between dorsolateral prefrontal cortex of the FPN and precuneus of the DMN. Notably, altered nodal connectivity strength was distance-dependent, with most disruptions appearing in long-distance connections within the FPN but in short-distance connections within the DMN. A multivariate pattern-classification analysis revealed that combination of topological patterns between the FPN and DMN could predict conscious state more effectively than connectivity within either network. Taken together, our results imply distinct interactions between the FPN and DMN, which may mediate conscious state

    An EEG-based attention recognition method: fusion of time domain, frequency domain, and non-linear dynamics features

    Get PDF
    IntroductionAttention is a complex cognitive function of human brain that plays a vital role in our daily lives. Electroencephalogram (EEG) is used to measure and analyze attention due to its high temporal resolution. Although several attention recognition brain-computer interfaces (BCIs) have been proposed, there is a scarcity of studies with a sufficient number of subjects, valid paradigms, and reliable recognition analysis across subjects.MethodsIn this study, we proposed a novel attention paradigm and feature fusion method to extract features, which fused time domain features, frequency domain features and nonlinear dynamics features. We then constructed an attention recognition framework for 85 subjects.Results and discussionWe achieved an intra-subject average classification accuracy of 85.05% ± 6.87% and an inter-subject average classification accuracy of 81.60% ± 9.93%, respectively. We further explored the neural patterns in attention recognition, where attention states showed less activation than non-attention states in the prefrontal and occipital areas in α, β and θ bands. The research explores, for the first time, the fusion of time domain features, frequency domain features and nonlinear dynamics features for attention recognition, providing a new understanding of attention recognition

    Personalized Risk Assessment in Never, Light, and Heavy Smokers in a prospective cohort in Taiwan.

    Get PDF
    The objective of this study was to develop markedly improved risk prediction models for lung cancer using a prospective cohort of 395,875 participants in Taiwan. Discriminatory accuracy was measured by generation of receiver operator curves and estimation of area under the curve (AUC). In multivariate Cox regression analysis, age, gender, smoking pack-years, family history of lung cancer, personal cancer history, BMI, lung function test, and serum biomarkers such as carcinoembryonic antigen (CEA), bilirubin, alpha fetoprotein (AFP), and c-reactive protein (CRP) were identified and included in an integrative risk prediction model. The AUC in overall population was 0.851 (95% CI = 0.840-0.862), with never smokers 0.806 (95% CI = 0.790-0.819), light smokers 0.847 (95% CI = 0.824-0.871), and heavy smokers 0.732 (95% CI = 0.708-0.752). By integrating risk factors such as family history of lung cancer, CEA and AFP for light smokers, and lung function test (Maximum Mid-Expiratory Flow, MMEF25-75%), AFP and CEA for never smokers, light and never smokers with cancer risks as high as those within heavy smokers could be identified. The risk model for heavy smokers can allow us to stratify heavy smokers into subgroups with distinct risks, which, if applied to low-dose computed tomography (LDCT) screening, may greatly reduce false positives

    A general real-time control approach of intrusion response for industrial automation systems

    Get PDF
    Intrusion response is a critical part of security protection. Compared with IT systems, industrial automation systems (IASs) have greater timeliness and availability demands. Real-time security policy enforcement of intrusion response is a challenge facing intrusion response for IASs. Inappropriate enforcement of the security policy can influence normal operation of the control system, and the loss caused by this security policy may even exceed that caused by cyberattacks. However, existing research about intrusion response focuses on security policy decisions and ignores security policy execution. This paper proposes a general, real-time control approach based on table-driven scheduling of intrusion response in IASs to address the problem of security policy execution. Security policy consists of a security service group, with each type of security service supported by a realization task set. Realization tasks from several task sets can be combined to form a response task set. In the proposed approach, first, a response task set is generated by a nondominated sorting genetic algorithm (GA) II with joint consideration of security performance and cost. Then, the system is reconfigured through an integrated scheduling scheme where system tasks and response tasks are mapped and scheduled together based on a GA. Furthermore, results from both numerical simulations and a real-application simulation show that the proposed method can implement the security policy in time with little effect on the system
    • …
    corecore