Xinbo Liu, Wen Wang, Xin Chen, Małgorzata Sterna, J. Błażewicz
Abstract We consider the scheduling problem on unrelated parallel machines in order to minimize the total late work. Since the problem is NP-hard, we propose a mathematical model and two dedicated exact approaches for solving it, based on the branching and bounding strategy and on enumerating combined with a dynamic programming algorithm. The time efficiencies of all three approaches are evaluated through computational experiments.
{"title":"Exact Approaches to Late Work Scheduling on Unrelated Machines","authors":"Xinbo Liu, Wen Wang, Xin Chen, Małgorzata Sterna, J. Błażewicz","doi":"10.34768/amcs-2023-0021","DOIUrl":"https://doi.org/10.34768/amcs-2023-0021","url":null,"abstract":"Abstract We consider the scheduling problem on unrelated parallel machines in order to minimize the total late work. Since the problem is NP-hard, we propose a mathematical model and two dedicated exact approaches for solving it, based on the branching and bounding strategy and on enumerating combined with a dynamic programming algorithm. The time efficiencies of all three approaches are evaluated through computational experiments.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"30 1","pages":"285 - 295"},"PeriodicalIF":1.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77119901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This study discusses the use of quaternions and dual quaternions in the description of artificial fish kinematics. The investigation offered here illustrates quaternion and dual quaternion algebra, as well as its implementation in the software chosen. When it comes to numerical stability, quaternions are better than matrices because a normalised quaternion always shows the correct rotation, while a matrix more easily loses its orthogonality due to rounding errors and oversizing. Although quaternions are more compact than rotation matrices, using quaternions does not always provide less numerical computation and the amount of memory needed. In this paper, an algebraic form of quaternion representation is provided which is less memory-demanding than the matrix representation. All the functions that were used to prepare this work are presented, and they can be employed to conduct more research on how well quaternions work in a specific assignment.
{"title":"Dual Quaternions for the Kinematic Description of a Fish–Like Propulsion System","authors":"Z. Kitowski, P. Piskur, Mateusz Orłowski","doi":"10.34768/amcs-2023-0013","DOIUrl":"https://doi.org/10.34768/amcs-2023-0013","url":null,"abstract":"Abstract This study discusses the use of quaternions and dual quaternions in the description of artificial fish kinematics. The investigation offered here illustrates quaternion and dual quaternion algebra, as well as its implementation in the software chosen. When it comes to numerical stability, quaternions are better than matrices because a normalised quaternion always shows the correct rotation, while a matrix more easily loses its orthogonality due to rounding errors and oversizing. Although quaternions are more compact than rotation matrices, using quaternions does not always provide less numerical computation and the amount of memory needed. In this paper, an algebraic form of quaternion representation is provided which is less memory-demanding than the matrix representation. All the functions that were used to prepare this work are presented, and they can be employed to conduct more research on how well quaternions work in a specific assignment.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"11 1","pages":"171 - 181"},"PeriodicalIF":1.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87287602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract The growing use of the Internet of Things (IoT) in smart applications necessitates improved security monitoring of IoT components. The security of such components is monitored using intrusion detection systems which run machine learning (ML) algorithms to classify access attempts as anomalous or normal. However, in this case, one of the issues is the large length of the data feature vector that any ML or deep learning technique implemented on resource-constrained intelligent nodes must handle. In this paper, the problem of selecting an optimal-feature set is investigated to reduce the curse of data dimensionality. A two-layered approach is proposed: the first tier makes use of a random forest while the second tier uses a hybrid of gray wolf optimizer (GWO) and the particle swarm optimizer (PSO) with the k-nearest neighbor as the wrapper method. Further, differential weight distribution is made to the local-best and global-best positions in the velocity equation of PSO. A new metric, i.e., the reduced feature to accuracy ratio (RFAR), is introduced for comparing various works. Three data sets, namely, NSLKDD, DS2OS and BoTIoT, are used to evaluate and validate the proposed work. Experiments demonstrate improvements in accuracy up to 99.44%, 99.44% and 99.98% with the length of the optimal-feature vector equal to 9, 4 and 8 for the NSLKDD, DS2OS and BoTIoT data sets, respectively. Furthermore, classification improves for many of the individual classes of attacks: denial-of-service (DoS) (99.75%) and normal (99.52%) for NSLKDD, malicious control (100%) and DoS (68.69%) for DS2OS, and theft (95.65%) for BoTIoT.
{"title":"Feature Optimization Using a Two–Tier Hybrid Optimizer in an Internet of Things Network","authors":"Akhileshwar Prasad Agrawal, Nanhay Singh","doi":"10.34768/amcs-2023-0023","DOIUrl":"https://doi.org/10.34768/amcs-2023-0023","url":null,"abstract":"Abstract The growing use of the Internet of Things (IoT) in smart applications necessitates improved security monitoring of IoT components. The security of such components is monitored using intrusion detection systems which run machine learning (ML) algorithms to classify access attempts as anomalous or normal. However, in this case, one of the issues is the large length of the data feature vector that any ML or deep learning technique implemented on resource-constrained intelligent nodes must handle. In this paper, the problem of selecting an optimal-feature set is investigated to reduce the curse of data dimensionality. A two-layered approach is proposed: the first tier makes use of a random forest while the second tier uses a hybrid of gray wolf optimizer (GWO) and the particle swarm optimizer (PSO) with the k-nearest neighbor as the wrapper method. Further, differential weight distribution is made to the local-best and global-best positions in the velocity equation of PSO. A new metric, i.e., the reduced feature to accuracy ratio (RFAR), is introduced for comparing various works. Three data sets, namely, NSLKDD, DS2OS and BoTIoT, are used to evaluate and validate the proposed work. Experiments demonstrate improvements in accuracy up to 99.44%, 99.44% and 99.98% with the length of the optimal-feature vector equal to 9, 4 and 8 for the NSLKDD, DS2OS and BoTIoT data sets, respectively. Furthermore, classification improves for many of the individual classes of attacks: denial-of-service (DoS) (99.75%) and normal (99.52%) for NSLKDD, malicious control (100%) and DoS (68.69%) for DS2OS, and theft (95.65%) for BoTIoT.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"3 1","pages":"313 - 326"},"PeriodicalIF":1.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79264466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract It is a hot topic to investigate resource allocation in fog computing. However, currently resource allocation in fog computing mostly supports only fixed resources, that is, the resource requirements of users are satisfied with a fixed amount of resources during the usage time, which may result in low utility of resource providers and even cause a waste of resources. Therefore, we establish an integer programming model for the time-varying multidimensional resource allocation problem in fog computing to maximize the utility of the fog resource pool. We also design a heuristic algorithm to approximate the solution of the model. We apply a dominant-resource-based strategy for resource allocation to improve resource utilization as well as critical value theory for resource pricing to enhance the utility of the fog resource pool. We also prove that the algorithm satisfies truthful and individual rationality. Finally, we give some numerical examples to demonstrate the performance of the algorithm. Compared with existing studies, our approach can improve resource utilization and maximize the utility of the fog resource pool.
{"title":"A Combinatorial Auction Mechanism for Time–Varying Multidimensional Resource Allocation and Pricing in Fog Computing","authors":"Shiyong Li, Yanan Zhang, Wei Sun, Jia Liu","doi":"10.34768/amcs-2023-0024","DOIUrl":"https://doi.org/10.34768/amcs-2023-0024","url":null,"abstract":"Abstract It is a hot topic to investigate resource allocation in fog computing. However, currently resource allocation in fog computing mostly supports only fixed resources, that is, the resource requirements of users are satisfied with a fixed amount of resources during the usage time, which may result in low utility of resource providers and even cause a waste of resources. Therefore, we establish an integer programming model for the time-varying multidimensional resource allocation problem in fog computing to maximize the utility of the fog resource pool. We also design a heuristic algorithm to approximate the solution of the model. We apply a dominant-resource-based strategy for resource allocation to improve resource utilization as well as critical value theory for resource pricing to enhance the utility of the fog resource pool. We also prove that the algorithm satisfies truthful and individual rationality. Finally, we give some numerical examples to demonstrate the performance of the algorithm. Compared with existing studies, our approach can improve resource utilization and maximize the utility of the fog resource pool.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"6 1","pages":"327 - 339"},"PeriodicalIF":1.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79496790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Fractional time-invariant compartmental linear systems are introduced. Controllability and observability of these systems are analyzed. The eigenvalue assignment problem of compartmental linear systems is considered and illustrated with a numerical example.
{"title":"Fractional Time–Invariant Compartmental Linear Systems","authors":"T. Kaczorek","doi":"10.34768/amcs-2023-0008","DOIUrl":"https://doi.org/10.34768/amcs-2023-0008","url":null,"abstract":"Abstract Fractional time-invariant compartmental linear systems are introduced. Controllability and observability of these systems are analyzed. The eigenvalue assignment problem of compartmental linear systems is considered and illustrated with a numerical example.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"89 1","pages":"97 - 102"},"PeriodicalIF":1.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87114707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rouhollah Kian Ara, Andrzej Matiolański, M. Grega, A. Dziech, R. Baran
Abstract Counting and detecting occluded faces in a crowd is a challenging task in computer vision. In this paper, we propose a new approach to face detection-based crowd estimation under significant occlusion and head posture variations. Most state-of-the-art face detectors cannot detect excessively occluded faces. To address the problem, an improved approach to training various detectors is described. To obtain a reasonable evaluation of our solution, we trained and tested the model on our substantially occluded data set. The dataset contains images with up to 90 degrees out-of-plane rotation and faces with 25%, 50%, and 75% occlusion levels. In this study, we trained the proposed model on 48,000 images obtained from our dataset consisting of 19 crowd scenes. To evaluate the model, we used 109 images with face counts ranging from 21 to 905 and with an average of 145 individuals per image. Detecting faces in crowded scenes with the underlying challenges cannot be addressed using a single face detection method. Therefore, a robust method for counting visible faces in a crowd is proposed by combining different traditional machine learning and convolutional neural network algorithms. Utilizing a network based on the VGGNet architecture, the proposed algorithm outperforms various state-of-the-art algorithms in detecting faces ‘in-the-wild’. In addition, the performance of the proposed approach is evaluated on publicly available datasets containing in-plane/out-of-plane rotation images as well as images with various lighting changes. The proposed approach achieved similar or higher accuracy.
{"title":"Efficient Face Detection Based Crowd Density Estimation using Convolutional Neural Networks and an Improved Sliding Window Strategy","authors":"Rouhollah Kian Ara, Andrzej Matiolański, M. Grega, A. Dziech, R. Baran","doi":"10.34768/amcs-2023-0001","DOIUrl":"https://doi.org/10.34768/amcs-2023-0001","url":null,"abstract":"Abstract Counting and detecting occluded faces in a crowd is a challenging task in computer vision. In this paper, we propose a new approach to face detection-based crowd estimation under significant occlusion and head posture variations. Most state-of-the-art face detectors cannot detect excessively occluded faces. To address the problem, an improved approach to training various detectors is described. To obtain a reasonable evaluation of our solution, we trained and tested the model on our substantially occluded data set. The dataset contains images with up to 90 degrees out-of-plane rotation and faces with 25%, 50%, and 75% occlusion levels. In this study, we trained the proposed model on 48,000 images obtained from our dataset consisting of 19 crowd scenes. To evaluate the model, we used 109 images with face counts ranging from 21 to 905 and with an average of 145 individuals per image. Detecting faces in crowded scenes with the underlying challenges cannot be addressed using a single face detection method. Therefore, a robust method for counting visible faces in a crowd is proposed by combining different traditional machine learning and convolutional neural network algorithms. Utilizing a network based on the VGGNet architecture, the proposed algorithm outperforms various state-of-the-art algorithms in detecting faces ‘in-the-wild’. In addition, the performance of the proposed approach is evaluated on publicly available datasets containing in-plane/out-of-plane rotation images as well as images with various lighting changes. The proposed approach achieved similar or higher accuracy.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"160 1","pages":"7 - 20"},"PeriodicalIF":1.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85053273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract The most commonly used public key cryptographic algorithms are based on the difficulty in solving mathematical problems such as the integer factorization problem (IFP), the discrete logarithm problem (DLP) and the elliptic curve discrete logarithm problem (ECDLP). In practice, one of the most often used cryptographic algorithms continues to be the RSA. The security of RSA is based on IFP and DLP. To achieve good data security for RSA-protected encryption, it is important to follow strict rules related to key generation domains. It is essential to use sufficiently large lengths of the key, reliable generation of prime numbers and others. In this paper the importance of the arithmetic ratio of the prime numbers which create the modular number of the RSA key is presented as a new point of view. The question whether all requirements for key generation rules applied up to now are enough in order to have good levels of cybersecurity for RSA based cryptographic systems is clarified.
{"title":"Implications of the Arithmetic Ratio of Prime Numbers for RSA Security","authors":"Andrey Ivanov, N. Stoianov","doi":"10.34768/amcs-2023-0005","DOIUrl":"https://doi.org/10.34768/amcs-2023-0005","url":null,"abstract":"Abstract The most commonly used public key cryptographic algorithms are based on the difficulty in solving mathematical problems such as the integer factorization problem (IFP), the discrete logarithm problem (DLP) and the elliptic curve discrete logarithm problem (ECDLP). In practice, one of the most often used cryptographic algorithms continues to be the RSA. The security of RSA is based on IFP and DLP. To achieve good data security for RSA-protected encryption, it is important to follow strict rules related to key generation domains. It is essential to use sufficiently large lengths of the key, reliable generation of prime numbers and others. In this paper the importance of the arithmetic ratio of the prime numbers which create the modular number of the RSA key is presented as a new point of view. The question whether all requirements for key generation rules applied up to now are enough in order to have good levels of cybersecurity for RSA based cryptographic systems is clarified.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"33 1","pages":"57 - 70"},"PeriodicalIF":1.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90579909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Depression is one of the primary causes of global mental illnesses and an underlying reason for suicide. The user generated text content available in social media forums offers an opportunity to build automatic and reliable depression detection models. The core objective of this work is to select an optimal set of features that may help in classifying depressive contents posted on social media. To this end, a novel multi-objective feature selection technique (EFS-pBGSK) and machine learning algorithms are employed to train the proposed model. The novel feature selection technique incorporates a binary gaining-sharing knowledge-based optimization algorithm with population reduction (pBGSK) to obtain the optimized features from the original feature space. The extensive feature selector (EFS) is used to filter out the excessive features based on their ranking. Two text depression datasets collected from Twitter and Reddit forums are used for the evaluation of the proposed feature selection model. The experimentation is carried out using naive Bayes (NB) and support vector machine (SVM) classifiers for five different feature subset sizes (10, 50, 100, 300 and 500). The experimental outcome indicates that the proposed model can achieve superior performance scores. The top results are obtained using the SVM classifier for the SDD dataset with 0.962 accuracy, 0.929 F1 score, 0.0809 log-loss and 0.0717 mean absolute error (MAE). As a result, the optimal combination of features selected by the proposed hybrid model significantly improves the performance of the depression detection system.
{"title":"A Contemporarymulti–Objective Feature Selection Model for Depression Detection Using a Hybrid pBGSK Optimization Algorithm","authors":"S. Kavi Priya, K. Pon Karthika","doi":"10.34768/amcs-2023-0010","DOIUrl":"https://doi.org/10.34768/amcs-2023-0010","url":null,"abstract":"Abstract Depression is one of the primary causes of global mental illnesses and an underlying reason for suicide. The user generated text content available in social media forums offers an opportunity to build automatic and reliable depression detection models. The core objective of this work is to select an optimal set of features that may help in classifying depressive contents posted on social media. To this end, a novel multi-objective feature selection technique (EFS-pBGSK) and machine learning algorithms are employed to train the proposed model. The novel feature selection technique incorporates a binary gaining-sharing knowledge-based optimization algorithm with population reduction (pBGSK) to obtain the optimized features from the original feature space. The extensive feature selector (EFS) is used to filter out the excessive features based on their ranking. Two text depression datasets collected from Twitter and Reddit forums are used for the evaluation of the proposed feature selection model. The experimentation is carried out using naive Bayes (NB) and support vector machine (SVM) classifiers for five different feature subset sizes (10, 50, 100, 300 and 500). The experimental outcome indicates that the proposed model can achieve superior performance scores. The top results are obtained using the SVM classifier for the SDD dataset with 0.962 accuracy, 0.929 F1 score, 0.0809 log-loss and 0.0717 mean absolute error (MAE). As a result, the optimal combination of features selected by the proposed hybrid model significantly improves the performance of the depression detection system.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"199 1","pages":"117 - 131"},"PeriodicalIF":1.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75907170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Face recognition (FR) is one of the most active research areas in the field of computer vision. Convolutional neural networks (CNNs) have been extensively used in this field due to their good efficiency. Thus, it is important to find the best CNN parameters for its best performance. Hyperparameter optimization is one of the various techniques for increasing the performance of CNN models. Since manual tuning of hyperparameters is a tedious and time-consuming task, population based metaheuristic techniques can be used for the automatic hyperparameter optimization of CNNs. Automatic tuning of parameters reduces manual efforts and improves the efficiency of the CNN model. In the proposed work, genetic algorithm (GA) based hyperparameter optimization of CNNs is applied for face recognition. GAs are used for the optimization of various hyperparameters like filter size as well as the number of filters and of hidden layers. For analysis, a benchmark dataset for FR with ninety subjects is used. The experimental results indicate that the proposed GA-CNN model generates an improved model accuracy in comparison with existing CNN models. In each iteration, the GA minimizes the objective function by selecting the best combination set of CNN hyperparameters. An improved accuracy of 94.5 % is obtained for FR.
{"title":"A Genetic Algorithm Based Optimized Convolutional Neural Network for Face Recognition","authors":"Namrata Karlupia, P. Mahajan, P. Abrol, P. Lehana","doi":"10.34768/amcs-2023-0002","DOIUrl":"https://doi.org/10.34768/amcs-2023-0002","url":null,"abstract":"Abstract Face recognition (FR) is one of the most active research areas in the field of computer vision. Convolutional neural networks (CNNs) have been extensively used in this field due to their good efficiency. Thus, it is important to find the best CNN parameters for its best performance. Hyperparameter optimization is one of the various techniques for increasing the performance of CNN models. Since manual tuning of hyperparameters is a tedious and time-consuming task, population based metaheuristic techniques can be used for the automatic hyperparameter optimization of CNNs. Automatic tuning of parameters reduces manual efforts and improves the efficiency of the CNN model. In the proposed work, genetic algorithm (GA) based hyperparameter optimization of CNNs is applied for face recognition. GAs are used for the optimization of various hyperparameters like filter size as well as the number of filters and of hidden layers. For analysis, a benchmark dataset for FR with ninety subjects is used. The experimental results indicate that the proposed GA-CNN model generates an improved model accuracy in comparison with existing CNN models. In each iteration, the GA minimizes the objective function by selecting the best combination set of CNN hyperparameters. An improved accuracy of 94.5 % is obtained for FR.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"88 1","pages":"21 - 31"},"PeriodicalIF":1.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82119613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract This paper deals with the finite-time stabilization problem for a class of uncertain disturbed systems using linear robust control. The proposed algorithm is designed to provide the robustness of a linear feedback control scheme such that system trajectories arrive at a small-size attractive set around an unstable equilibrium in a finite time. To this end, an optimization problem with a linear matrix inequality constraint is presented. This means that the effects of external disturbances, as well as matched and mismatched uncertain dynamics, can be significantly reduced. Finally, the performance of the suggested closed-loop control strategies is shown by the trajectory tracking of an unmanned aerial vehicle flight.
{"title":"On the Finite Time Stabilization Via Robust Control for Uncertain Disturbed Systems","authors":"P. Ordaz, H. Alazki, B. Sánchez, M. Ordaz-Oliver","doi":"10.34768/amcs-2023-0006","DOIUrl":"https://doi.org/10.34768/amcs-2023-0006","url":null,"abstract":"Abstract This paper deals with the finite-time stabilization problem for a class of uncertain disturbed systems using linear robust control. The proposed algorithm is designed to provide the robustness of a linear feedback control scheme such that system trajectories arrive at a small-size attractive set around an unstable equilibrium in a finite time. To this end, an optimization problem with a linear matrix inequality constraint is presented. This means that the effects of external disturbances, as well as matched and mismatched uncertain dynamics, can be significantly reduced. Finally, the performance of the suggested closed-loop control strategies is shown by the trajectory tracking of an unmanned aerial vehicle flight.","PeriodicalId":50339,"journal":{"name":"International Journal of Applied Mathematics and Computer Science","volume":"1 1","pages":"71 - 82"},"PeriodicalIF":1.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84442758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}