The Theory of Block Diagonal Control(BDC) is applied to Bank to Turn (BTT) winged *** analytic inverse solutions of equations of the BTTmissile are given. The BDC flight control system isconstructed. To check the perf...
详细信息
The Theory of Block Diagonal Control(BDC) is applied to Bank to Turn (BTT) winged *** analytic inverse solutions of equations of the BTTmissile are given. The BDC flight control system isconstructed. To check the performance of the designedBDC control system, Six Degree Of Freedom (6DOF)mathematical simulation is conducted. Simulationresults show that the designed BDC can control theBTT missile stably and accurately.
Animation is an important presentationmethod in the internet-based Virtual Reality Laboratory(iVRLab). Because of the iVRLba's four basic fea-tures-3-D form, interactivity, network basing and virtu-ality, conventi...
详细信息
Animation is an important presentationmethod in the internet-based Virtual Reality Laboratory(iVRLab). Because of the iVRLba's four basic fea-tures-3-D form, interactivity, network basing and virtu-ality, conventional animating method can not meet therequirement. Based on the VRML animating principleand analysis of the iVRLab's requirement, a brand-newanimation forming mechanism is presented. An exampleof liquid surface lifting animation is illustrated to givethe more details.
The single-phase pq theory is used forinstantaneous reactive power and current harmonicscompensation of single-phase loads. New definition ofsingle-phase instantanous active power p(t), and reactivepower q(t), is used...
详细信息
The single-phase pq theory is used forinstantaneous reactive power and current harmonicscompensation of single-phase loads. New definition ofsingle-phase instantanous active power p(t), and reactivepower q(t), is used in control circuit. Generation ofreference compensating current of single-phase active filteris based on canceling the alternating component of p(t) forharmonic compensation and q(t) for reactive powercompensation. Principle of operation is explained usinganalytical and simulation results.
A fuzzy control framework, in whichthe measurement model of congestion is appliedto evaluate the congestion degree of the replaceroute and the fuzzy control algorithm is appliedto design the intersection signal settin...
详细信息
A fuzzy control framework, in whichthe measurement model of congestion is appliedto evaluate the congestion degree of the replaceroute and the fuzzy control algorithm is appliedto design the intersection signal setting of thereplace route for eliminating "traffic congestiondiversion", is developed to study networkperformance when the non-recurrent trafficcongestion happens in the network in thepresence of information. The framework isillustrated by detecting the traffic volumes in thereplace route and controlling the traffic volumesat the same time.
Because of the large volume of datainvolved in the process and stringent continuityand real-time constraints, a video-on-demand(VOD) system demands novel schemes forscheduling continuous video streams. This paperprese...
详细信息
Because of the large volume of datainvolved in the process and stringent continuityand real-time constraints, a video-on-demand(VOD) system demands novel schemes forscheduling continuous video streams. This paperpresents a simple hybrid admission strategy thatcan increase the number of admitted requestsand reduce the queuing time in a server clustersystem.
The security architecture and mechanism of 3generation mobile communication are discussed in thispaper. Five UMTS security feature is given. Then thesecurity architecture is introduced. We analyzed the basicnetwork ac...
详细信息
The security architecture and mechanism of 3generation mobile communication are discussed in thispaper. Five UMTS security feature is given. Then thesecurity architecture is introduced. We analyzed the basicnetwork access security mechanism and give the flowdescription regarding to the signalling procedure. For theintegrity protection and date confidentiality,thecorresponding algorithm is also discussed.
The paper introduces the application of FCCN(Fully Connected Cubic Network) topology in massivelyparallel processing systems. Because of the simpleself-routing algorithm, small diameter and averagenumber of internode ...
详细信息
The paper introduces the application of FCCN(Fully Connected Cubic Network) topology in massivelyparallel processing systems. Because of the simpleself-routing algorithm, small diameter and averagenumber of internode distance, the fault-tolerance, FCCNcan act as a high performance interconnection network inthe massively parallel processing systems. Moreover,Hypercube can be embedded in FCCN nature, so thatFCCN will implement all developed parallel algorithmsfor Hypercube easily and effciently. And the broadcastingalgorithm of FCCN is proposed.
A novel approach to remodel the manipulatorkinematics and solve the feasible motions of six-jointmanipulator in the neighborhood of the singular configurations ispresented m this paper. By using line varieties and rec...
详细信息
A novel approach to remodel the manipulatorkinematics and solve the feasible motions of six-jointmanipulator in the neighborhood of the singular configurations ispresented m this paper. By using line varieties and reciprocalscrew theories, we drop constraint from the Jacobiau matrixyielding a full rank matrix so that the mapping between taskspace feasible motions and joint space motions becomesuniquely defined. In the end, some simulation results for PUMAmanipulator are given to demonstrate the effectiveness of thismethod.
The security of communication protocolsneed to be considered in distributed network system, andthe formal analysis is one of most important methods inevaluating the security of a protocol. However. there lackedof an e...
详细信息
The security of communication protocolsneed to be considered in distributed network system, andthe formal analysis is one of most important methods inevaluating the security of a protocol. However. there lackedof an effective formal analysis tools in analyzing thesecurity of a protocol. In this paper we raised a formal logicused for analyzing security of a protocol. That is SelectAccept Dynamic Logic. and described successfully theattack act to the communication protocols-the TMNProtocol and the Needhan-schroeder Protocol-with thislogic. The Select Accept Dynamic Logic will provide a neweffective tool to the analysis of protocols.
A new approach to Chua's circuit is developed in thispaper. OTAs(Operational Transconductance Amplifiers)are used to synthesize it. Firstly, OTAs are utilized forgrounded inductors and piecewise-linear resistors. ...
详细信息
A new approach to Chua's circuit is developed in thispaper. OTAs(Operational Transconductance Amplifiers)are used to synthesize it. Firstly, OTAs are utilized forgrounded inductors and piecewise-linear resistors. Then,OTAs are also used for a new variable parameter ofcurrent type Chua's circuit. Moreover, the Lyapunovexponents are calculated. Furthermore, the powerspectrum and the Poincare section are given. Finally,experiments results approve this approach.
暂无评论