False data injection(FDI) attacks are common in the distributed estimation of multi-task network environments, so an attack detection strategy is designed by combining the generalized maximum correntropy criterion. Ba...False data injection(FDI) attacks are common in the distributed estimation of multi-task network environments, so an attack detection strategy is designed by combining the generalized maximum correntropy criterion. Based on this, we propose a diffusion least-mean-square algorithm based on the generalized maximum correntropy criterion(GMCC-DLMS)for multi-task networks. The algorithm achieves gratifying estimation results. Even more, compared to the related work,it has better robustness when the number of attacked nodes increases. Moreover, the assumption about the number of attacked nodes is relaxed, which is applicable to multi-task environments. In addition, the performance of the proposed GMCC-DLMS algorithm is analyzed in the mean and mean-square senses. Finally, simulation experiments confirm the performance and effectiveness against FDI attacks of the algorithm.展开更多
The privacy-preserving problem for distributed fusion estimation scheme is concerned in this paper.When legitimate user wants to obtain consistent information from multiple sensors,it always employs a fusion center(FC...The privacy-preserving problem for distributed fusion estimation scheme is concerned in this paper.When legitimate user wants to obtain consistent information from multiple sensors,it always employs a fusion center(FC)to gather local data and compute distributed fusion estimates(DFEs).Due to the existence of potential eavesdropper,the data exchanged among sensors,FC and user imperatively require privacy preservation.Hence,we propose a distributed confidentiality fusion structure against eavesdropper by using Paillier homomorphic encryption approach.In this case,FC cannot acquire real values of local state estimates,while it only helps calculate encrypted DFEs.Then,the legitimate user can successfully obtain the true values of DFEs according to the encrypted information and secret keys,which is based on the homomorphism of encryption.Finally,an illustrative example is provided to verify the effectiveness of the proposed methods.展开更多
The facies distribution of a reservoir is one of the biggest concerns for geologists,geophysicists,reservoir modelers,and reservoir engineers due to its high importance in the setting of any reliable decisionmaking/op...The facies distribution of a reservoir is one of the biggest concerns for geologists,geophysicists,reservoir modelers,and reservoir engineers due to its high importance in the setting of any reliable decisionmaking/optimization of field development planning.The approach for parameterizing the facies distribution as a random variable comes naturally through using the probability fields.Since the prior probability fields of facies come either from a seismic inversion or from other sources of geologic information,they are not conditioned to the data observed from the cores extracted from the wells.This paper presents a regularized element-free Galerkin(R-EFG)method for conditioning facies probability fields to facies observation.The conditioned probability fields respect all the conditions of the probability theory(i.e.all the values are between 0 and 1,and the sum of all fields is a uniform field of 1).This property achieves by an optimization procedure under equality and inequality constraints with the gradient projection method.The conditioned probability fields are further used as the input in the adaptive pluri-Gaussian simulation(APS)methodology and coupled with the ensemble smoother with multiple data assimilation(ES-MDA)for estimation and uncertainty quantification of the facies distribution.The history-matching of the facies models shows a good estimation and uncertainty quantification of facies distribution,a good data match and prediction capabilities.展开更多
Several industrial coal processes are largely determined by the distribution of particle sizes in their feed.Currently these parameters are measured by manual sampling,which is time consuming and cannot provide real t...Several industrial coal processes are largely determined by the distribution of particle sizes in their feed.Currently these parameters are measured by manual sampling,which is time consuming and cannot provide real time feedback for automatic control purposes.In this paper,an approach using image segmentation on images of overlapped coal particles is described.The estimation of the particle size distribution by number is also described.The particle overlap problem was solved using image enhancement algorithms that converted those image parts representing material in lower layers to black.Exponential high-pass filter(EHPF) algorithms were used to remove the texture from particles on the surface.Finally,the edges of the surface particles were identified by morphological edge detection.These algorithms are described in detail as is the method of extracting the coal particle size.Tests indicate that using more coal images gives a higher accuracy estimate.The positive absolute error of 50 random tests was consistently less than 2.5% and the errors were reduced as the size of the fraction increased.展开更多
This paper considers the formation tracking problem under a rigidity framework, where the target formation is specified as a minimally and infinitesimally rigid formation and the desired velocity of the group is avail...This paper considers the formation tracking problem under a rigidity framework, where the target formation is specified as a minimally and infinitesimally rigid formation and the desired velocity of the group is available to only a subset of the agents. The following two cases are considered: the desired velocity is constant, and the desired velocity is timevarying. In the first case, a distributed linear estimator is constructed for each agent to estimate the desired velocity. The velocity estimation and a formation acquisition term are employed to design the control inputs for the agents, where the rigidity matrix plays a central role. In the second case, a distributed non-smooth estimator is constructed to estimate the time-varying velocity, which is shown to converge in a finite time. Theoretical analysis shows that the formation tracking problem can be solved under the proposed control algorithms and estimators. Simulation results are also provided to show the validity of the derived results.展开更多
文摘False data injection(FDI) attacks are common in the distributed estimation of multi-task network environments, so an attack detection strategy is designed by combining the generalized maximum correntropy criterion. Based on this, we propose a diffusion least-mean-square algorithm based on the generalized maximum correntropy criterion(GMCC-DLMS)for multi-task networks. The algorithm achieves gratifying estimation results. Even more, compared to the related work,it has better robustness when the number of attacked nodes increases. Moreover, the assumption about the number of attacked nodes is relaxed, which is applicable to multi-task environments. In addition, the performance of the proposed GMCC-DLMS algorithm is analyzed in the mean and mean-square senses. Finally, simulation experiments confirm the performance and effectiveness against FDI attacks of the algorithm.
基金supported in part by the National Natural Sci-ence Foundation of China(No.61973277)in part by the Zhejiang Provincial Natural Science Foundation of China(No.LR20F030004)in part by the Major Key Project of PCL(No.PCL2021A09).
文摘The privacy-preserving problem for distributed fusion estimation scheme is concerned in this paper.When legitimate user wants to obtain consistent information from multiple sensors,it always employs a fusion center(FC)to gather local data and compute distributed fusion estimates(DFEs).Due to the existence of potential eavesdropper,the data exchanged among sensors,FC and user imperatively require privacy preservation.Hence,we propose a distributed confidentiality fusion structure against eavesdropper by using Paillier homomorphic encryption approach.In this case,FC cannot acquire real values of local state estimates,while it only helps calculate encrypted DFEs.Then,the legitimate user can successfully obtain the true values of DFEs according to the encrypted information and secret keys,which is based on the homomorphism of encryption.Finally,an illustrative example is provided to verify the effectiveness of the proposed methods.
文摘The facies distribution of a reservoir is one of the biggest concerns for geologists,geophysicists,reservoir modelers,and reservoir engineers due to its high importance in the setting of any reliable decisionmaking/optimization of field development planning.The approach for parameterizing the facies distribution as a random variable comes naturally through using the probability fields.Since the prior probability fields of facies come either from a seismic inversion or from other sources of geologic information,they are not conditioned to the data observed from the cores extracted from the wells.This paper presents a regularized element-free Galerkin(R-EFG)method for conditioning facies probability fields to facies observation.The conditioned probability fields respect all the conditions of the probability theory(i.e.all the values are between 0 and 1,and the sum of all fields is a uniform field of 1).This property achieves by an optimization procedure under equality and inequality constraints with the gradient projection method.The conditioned probability fields are further used as the input in the adaptive pluri-Gaussian simulation(APS)methodology and coupled with the ensemble smoother with multiple data assimilation(ES-MDA)for estimation and uncertainty quantification of the facies distribution.The history-matching of the facies models shows a good estimation and uncertainty quantification of facies distribution,a good data match and prediction capabilities.
基金the Creative Research Groups Science Fund of the National Natural Science Foundation of China(No.50921002)
文摘Several industrial coal processes are largely determined by the distribution of particle sizes in their feed.Currently these parameters are measured by manual sampling,which is time consuming and cannot provide real time feedback for automatic control purposes.In this paper,an approach using image segmentation on images of overlapped coal particles is described.The estimation of the particle size distribution by number is also described.The particle overlap problem was solved using image enhancement algorithms that converted those image parts representing material in lower layers to black.Exponential high-pass filter(EHPF) algorithms were used to remove the texture from particles on the surface.Finally,the edges of the surface particles were identified by morphological edge detection.These algorithms are described in detail as is the method of extracting the coal particle size.Tests indicate that using more coal images gives a higher accuracy estimate.The positive absolute error of 50 random tests was consistently less than 2.5% and the errors were reduced as the size of the fraction increased.
基金Project supported by the National Natural Science Foundation of China(Grant No.61473240)
文摘This paper considers the formation tracking problem under a rigidity framework, where the target formation is specified as a minimally and infinitesimally rigid formation and the desired velocity of the group is available to only a subset of the agents. The following two cases are considered: the desired velocity is constant, and the desired velocity is timevarying. In the first case, a distributed linear estimator is constructed for each agent to estimate the desired velocity. The velocity estimation and a formation acquisition term are employed to design the control inputs for the agents, where the rigidity matrix plays a central role. In the second case, a distributed non-smooth estimator is constructed to estimate the time-varying velocity, which is shown to converge in a finite time. Theoretical analysis shows that the formation tracking problem can be solved under the proposed control algorithms and estimators. Simulation results are also provided to show the validity of the derived results.