This paper reviews an active control algorithm adopted for an active-passive composite tuned mass damper, which is a unique vibration control device equipped into an office building in Tokyo in 1993. The main purpose ...
详细信息
This paper reviews an active control algorithm adopted for an active-passive composite tuned mass damper, which is a unique vibration control device equipped into an office building in Tokyo in 1993. The main purpose of this device is to subdue the response motion of tall buildings under random disturbances such as wind pressures and small earthquakes. The main topics in this paper are: (1) the principle of the acceleration feedback algorithm, (2) the expected control performance, (3) the multi-modal control algorithm, (4) the observed performance of the applications using the algorithm.
The advantage of a new scheme for balanced detection has been investigated to reduce the influence of optical interference fringes when performing diode laser gas absorption spectroscopy employing lock-in amplifiers a...
详细信息
The advantage of a new scheme for balanced detection has been investigated to reduce the influence of optical interference fringes when performing diode laser gas absorption spectroscopy employing lock-in amplifiers and pigtailed lasers. The influence of the fringes has been reduced by comparing the lock-in 2 f signal due to the gas sample with that of a reference beam. The frequency regions outside the absorption feature have been used to obtain information on the interference fringe impact on the signal of interest. We have demonstrated an efficient way to reduce the influence of such fringes by employing this technique combined with non-linear signal processing methods. The different steps of the algorithm are presented. In the experimental arrangement presented, a reduction of the optical interference fringes by about 10 times is achieved, as demonstrated in measurements on molecular oxygen around 761 nm. The new technique is compared with an analog technique for balanced detection and certain advantages of the computer algorithm are pointed out. In particular, the emerging field of gas spectroscopy in scattering solid media strongly benefits from the technique presented.
The response of large-scale building structures can be actively reduced using an appropriate control algorithm and a number of actuators and sensors located within the building. This paper presents a decentralized con...
详细信息
The response of large-scale building structures can be actively reduced using an appropriate control algorithm and a number of actuators and sensors located within the building. This paper presents a decentralized control approach for controlling the response of tall buildings. The proposed method aims to divide the structural model into several substructures, each one performing on its own controller algorithm. This approach has already been used in controlling large-scale systems such as power transmission systems and space structures. An instantaneous optimal control scheme is used as the control algorithm with different control feedbacks such as velocity feedback alone and displacement and velocity feedback. The stability issue of this method is addressed. A numerical example is used to investigate the performance of the proposed method compared to the case with centralized control. Copyright (c) 2005 John Wiley & Sons, Ltd.
Parallel jobs submitted to processors should be efficiently scheduled to achieve high performance. Early scheduling strategies for parallel jobs make use of either space-sharing approach or time-sharing approach. The ...
详细信息
Parallel jobs submitted to processors should be efficiently scheduled to achieve high performance. Early scheduling strategies for parallel jobs make use of either space-sharing approach or time-sharing approach. The scheduling strategy proposed in this work, makes use of both the policies for parallel jobs while scheduling under clusters. Static and dynamic scheduling algorithms were developed for communication intensive jobs. The algorithms are used to handle different types of jobs such as serial, parallel and mixed jobs. For performance evaluation, the workload from Grid5000 platform is considered. The main objective is to achieve performance and power improvement. The dynamic scheduling algorithm with communication aware policy gives better performance when compared to static scheduling algorithm that is tested under the given workload. (C) 2013 Elsevier Ltd. All rights reserved.
A new adaptive integral backstepping control algorithm for motion control systems is proposed. The design approach is non-conventional in that it only implicitly incorporates error states into a design Lyapunov functi...
详细信息
A new adaptive integral backstepping control algorithm for motion control systems is proposed. The design approach is non-conventional in that it only implicitly incorporates error states into a design Lyapunov function and computes time derivative of the Lyapunov function symbolically to the point of getting parameter estimate update laws on which desirable structures are imposed. The closed-loop error system turns out to be linear and time-varying and can be reformulated as a linear-non-linear cascade system. Uniform exponential stability or absolute stability can be achieved. The design is robust against system parameter variations. The effectiveness and robustness of the control algorithm are verified by numerical examples. Copyright (C) 2002 John Wiley Sons, Ltd.
Cognitive radios (CRs), which are capable of sensing its surrounding environment and adapting its internal parameters, have been considered in mobile ad hoc networks (MANETs). The area of security in CR-MANETs has rec...
详细信息
Cognitive radios (CRs), which are capable of sensing its surrounding environment and adapting its internal parameters, have been considered in mobile ad hoc networks (MANETs). The area of security in CR-MANETs has received far less attention than other areas. However, some distinct characteristics of CRs introduce new non-trivial security risks to CR-MANETs. In this article, the authors study spectrum sensing data falsification (SSDF) attacks to CR-MANETs, in which intruders send false local spectrum sensing results in cooperative spectrum sensing, and it will result in wrong spectrum sensing decisions by CRs. The authors present a novel bio-inspired consensus-based cooperative spectrum sensing scheme to counter SSDF attacks in CR-ANETs. Their scheme is based on recent advances in consensus algorithms that have taken inspiration from self-organising behaviour of animal groups such as birds, fish, ants, honeybees and others. Unlike the existing schemes, there is no need for a common receiver to do the data fusion for reaching the final decision to counter SSDF attacks. The scheme has self-configuration and self-maintenance capabilities. Moreover, in order to further improve the security of CR-MANETs, the authors present an authentication scheme using identity (ID)-based cryptography with threshold secret sharing. Simulation results are presented to show the effectiveness of the proposed schemes.
The implementation and validation of a 5-GHz wireless LAN modem based on the HIPERLAN/2 standard is presented. In modern wireless communication systems, there is a demand for higher flexibility and more computational ...
详细信息
The implementation and validation of a 5-GHz wireless LAN modem based on the HIPERLAN/2 standard is presented. In modern wireless communication systems, there is a demand for higher flexibility and more computational efficiency. Therefore the emphasis of this work is on the hardware-software structure of the developed modem and its processes, in order to offer a good balance of these requirements. In order to efficiently design and validate the behaviour of the modem, a behavioural model was developed in UML (Unified Modelling Language) as a part of the overall HIPERLAN/2 system's model. The processes of the modem were implemented in an instruction-set processor and custom hardware, combining the advantages of both software and hardware implementations. The communication between the software and hardware parts of the modem is achieved through a specialised programmable interface unit. The UML-based model of the actual HIPERLAN/2 system is used in order to validate the modem's behaviour, using scenarios from in-field usage (such as transfer of data using FTP or HTTP). Furthermore, the validation of the algorithms implemented within the modem was based on this system model, and performed through the use of a custom-validation framework. This framework produces patterns for the validation of the modem's algorithms, at three different development phases (algorithmic, HDL, FPGA-based prototyping), derived from the simulation of the system model in a consistent and automatic way. Implementation figures and co-simulation results for the developed wireless LAN modem are also given.
The low-rate denial of service (LDoS) attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS det...
详细信息
The low-rate denial of service (LDoS) attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks;at the same time the accuracy of the current detection methods for LDoS attacks is relatively low. As the fact that LDoS attacks led to abnormal distribution of the ACK traffic, LDoS attacks can be detected by analyzing the distribution characteristics of ACK traffic. Then traditional EWMA algorithm which can smooth the accidental error while being the same as the exceptional mutation may cause some misjudgment;therefore a new LDoS detection method based on adaptive EWMA (AEWMA) algorithm is proposed. The AEWMA algorithm which uses an adaptive weighting function instead of the constant weighting of EWMA algorithm can smooth the accidental error and retain the exceptional mutation. So AEWMA method is more beneficial than EWMA method for analyzing and measuring the abnormal distribution of ACK traffic. The NS2 simulations show that AEWMA method can detect LDoS attacks effectively and has a low false negative rate and a false positive rate. Based on DARPA99 datasets, experiment results show that AEWMA method is more efficient than EWMA method.
The purpose of this paper is the design of guidance and control algorithms for orbital space maneuvers. A 6-dof orbital simulator, based on Clohessy-Wiltshire-Hill equations, is developed in C language, considering co...
详细信息
The purpose of this paper is the design of guidance and control algorithms for orbital space maneuvers. A 6-dof orbital simulator, based on Clohessy-Wiltshire-Hill equations, is developed in C language, considering cold gas reaction thrusters and reaction wheels as actuation system. The computational limitations of on-board computers are also included. A combination of guidance and control algorithms for an orbital maneuver is proposed: (i) a suitably designed Zero-Effort-Miss/Zero-Effort-Velocity (ZEM/ZEV) algorithm is adopted for the guidance and (ii) a linear quadratic regulator (LQR) is used for the attitude control. The proposed approach is verified for different cases, including external environment disturbances and errors on the actuation system.
This paper proposes a nonlinear Goal Programming Model (GPM) for solving the problem of admission capacity planning in academic universities. Many factors of university admission capacity planning have been taken into...
详细信息
This paper proposes a nonlinear Goal Programming Model (GPM) for solving the problem of admission capacity planning in academic universities. Many factors of university admission capacity planning have been taken into consideration among which are number of admitted students in the past years, total population in the country, number of graduates from secondary schools, desired ratios of specific specialties, faculty-to-students ratio, and the past number of graduates. The proposed model is general and has been tested at King Abdulaziz University (KAU) in the Kingdom of Saudi Arabia, where the work aims to achieve the key objectives of a five-year development plan in addition to a 25-year future plan (AAFAQ) for universities education in the Kingdom. Based on the results of this test, the proposed GPM with a modified differential evolution algorithm has approved an ability to solve general admission capacity planning problem in terms of high quality, rapid convergence speed, efficiency, and robustness.
暂无评论