A method which is controlling of single arm robot is proposed that accorded to RBF neural network *** neural network,who is named radial basis function, that has input layer, hidden layer,output layer,and it is a feed...
详细信息
ISBN:
(纸本)9798350386783;9798350386776
A method which is controlling of single arm robot is proposed that accorded to RBF neural network *** neural network,who is named radial basis function, that has input layer, hidden layer,output layer,and it is a feedforward layer who has a single hidden layer. It is nonlinear that the input set mapped to the output set, but it is linear that the hidden layer space mapped to the output space. Because the RBF network whose action function is Gaussian basis function, its output is related to some modulation parameters. In the input space who is limited, it is not zero, and it is a neural network method who has local approximation. Therefore, RBF network can learn quickly and avoid local minimal problems, and the real-time requirements of control can be satisfy. Through establishing the Simulink control system simulation of the relevant model and the discrete digital simulation of M fuction, the control method which used RBF neural network model is very accurate and real-time, and the control effect is very good.
Nowadays, the situation of data security is ever-increasing severity, however, the most damaging security threats do not originate from malicious outsiders but from malfeasant and negligent insiders. Generally, inside...
详细信息
ISBN:
(纸本)9798350349184;9798350349191
Nowadays, the situation of data security is ever-increasing severity, however, the most damaging security threats do not originate from malicious outsiders but from malfeasant and negligent insiders. Generally, insider threats are prone to cause incalculable losses and serious issues due to that the insiders have the authority to access sensitive information. Therefore, how to effectively prevent and respond to insider threats is a significant challenge. Undoubtedly, the key to defending against insider threats is restricting access permissions and optimizing access control policies in real-time. To enhance data security, we propose MLCAC, a multi-layered collaborative access control model, which focuses on protecting sensitive data. A key insight is the design of a decentralized optimization for domain and authority. MLCAC prohibits unauthorized behavior and continuously monitors access logs which are analyzed by using the co-occurrence matrix to make intelligent decisions and dynamically adjust the access control policy in real time. In experiments, we collected 12574 access logs about 1753 system software and analyzed the correlation between software by using the co-occurrence matrix algorithm, including 824 groups co-occurring software of which the highest frequency is 12. The experiments indicate that the accuracy of the policy generated by intelligent decision-making is 89.55%. Therefore, the algorithm is significantly efficient for intelligent decision-making, which is the foundation of automatically generating policies and dynamic authorization.
With the continuous development of technology, speech recognition and control are becoming increasingly important. The user sends a voice signal, and the system recognizes it, extracts valid commands from the voice, a...
详细信息
Industrial automation has become a cornerstone of modern manufacturing, enhancing efficiency, reliability, and scalability. The integration of intelligentcontrol algorithms, such as fuzzy logic, neural networks, gene...
详细信息
This design is based on MSP432 single chip microcomputer as the core, combined with visual recognition technology, through the speed closed loop to control the intelligent car, and realize the dual car to follow and o...
详细信息
ISBN:
(纸本)9781643683850
This design is based on MSP432 single chip microcomputer as the core, combined with visual recognition technology, through the speed closed loop to control the intelligent car, and realize the dual car to follow and overtake on the predetermined track. In this design, MSP432P401Y is selected as the main control, and the identification information is sent to the master control through the serial port, so as to enter the corresponding road and prevent the car from deviating from the predetermined track;The leading car and the following car communicate with each other through Bluetooth module to achieve the goa of two vehicle collaborative transportation;Through the feedback information of the motor encoder, the speed closed-loop control system of the trolley is designed through the feedback information of the motor encoder to realize the precise control of the transportation distance. After detection, this design has the advantages of fast identification speed, high accuracy, stable transportation and high efficiency.
Spell checkers are crucial in various fields, ensuring error-free documents and clear communication. Many applications use traditional approaches, like Google and Microsoft Word. A unique model using Deep Learning for...
详细信息
Cloud computing offers scalable and cost-effective access to computing resources, necessitating meticulous cost optimization. This project introduces an automated system for cloud cost optimization, amalgamating prici...
详细信息
Detection and control of congestion in Mobile ad-hoc networks (MANET) is a challenging task. Congestion hurts performance and reduces the throughput of the system. Thus it is imperative to avoid or control congestion ...
详细信息
This research paper proposes a fuzzy PID control based optimization method for heat exchange station heating system, which aims to solve many challenges faced by the current heating system, such as high energy consump...
详细信息
ISBN:
(纸本)9798350386783;9798350386776
This research paper proposes a fuzzy PID control based optimization method for heat exchange station heating system, which aims to solve many challenges faced by the current heating system, such as high energy consumption, uneven heating and slow system response. By introducing fuzzy logic control, the study optimizes the conventional PID control algorithm to increase the system response speed, stability and energy utilization efficiency. This study firstly analyses the working mechanism of the heating system of the heat exchanger station, then constructs the mathematical model of the plate heat exchanger control system, and describes in detail the control rules and structure of the fuzzy control algorithm. Simulation experiments are carried out through MATLAB/Simulink and it is concluded that the control algorithm has significant advantages in terms of improved response speed, enhanced stability and improved energy utilisation efficiency. In conclusion, this thesis not only provides an effective technical way for the improvement of the performance of heat exchange station heating system, but also contributes valuable theoretical and practical experience to the research and development of intelligent heating system.
In order to create spaces that are secure, cozy, energy-efficient, and visually beautiful, smart buildings are becoming more and more sophisticated cyber-physical systems. However, as functional complexity, financial ...
详细信息
暂无评论