This paper proposes a novel self-structuring algorithm for the online adaptive fuzzy controller (SA-OAFC). The SA-OAFC capable of adding and deleting inference rules autonomously can start operating with an empty set ...
详细信息
This paper proposes a novel self-structuring algorithm for the online adaptive fuzzy controller (SA-OAFC). The SA-OAFC capable of adding and deleting inference rules autonomously can start operating with an empty set of fuzzy rules based on the desired output and actual output of the system to avoid conventional differential operation. It also takes advantage of the auxiliary fuzzy system to evaluate the approximated results with little information of the plant. The SA-OAFC is characterized by its good engineering approachability, robustness for all kinds of perturbations of the plant, and the ability to perform variable selection among a group of candidate input variables. Moreover, it manages to remarkably reduce the amount of computation and decrease the complexity of the system. This paper demonstrates the capabilities of SA-OAFC by a simulation example and then hardware-in-the-loop (HIL) experiment.
In order to enhance the convergence capability of the central force optimization (CFO) algorithm, an adaptive central force optimization (ACFO) algorithm is presented by introducing an adaptive weight and defining an ...
详细信息
In order to enhance the convergence capability of the central force optimization (CFO) algorithm, an adaptive central force optimization (ACFO) algorithm is presented by introducing an adaptive weight and defining an adaptive gravitational constant. The adaptive weight and gravitational constant are selected based on the stability theory of discrete time-varying dynamic systems. The convergence capability of ACFO algorithm is compared with the other improved CFO algorithm and evolutionary-based algorithm using 23 unimodal and multimodal benchmark functions. Experiments results show that ACFO substantially enhances the performance of CFO in terms of global optimality and solution accuracy.
To identify multiple acoustic duct modes, conventional beam-forming, CLEAN as well as L-2 (i.e. pseudo-inverse) and L-1 generalized-inverse beam-forming are applied to phased-array pressure data A tone signal of a pre...
详细信息
To identify multiple acoustic duct modes, conventional beam-forming, CLEAN as well as L-2 (i.e. pseudo-inverse) and L-1 generalized-inverse beam-forming are applied to phased-array pressure data A tone signal of a prescribed mode or broadband signal is generated upstream of a curved rectangular duct, and acoustic fields formed in both upstream and downstream stations of the test section are measured with identical wall mounted microphone arrays. Sound power distributions of several horizontal and vertical modes including upstream- and downstream propagating waves can be identified with phased array techniques, and the results are compared among the four approaches. The comparisons using synthetic data demonstrate that the L-2 generalized inverse algorithm can sufficiently suppress undesirable noise levels and detect amplitude distributions accurately in over determined cases (i.e. the number of microphones is more than the number of cut on modes) with minimum computational cost. As the number of cut on modes exceeds the number of microphones (i.e. under-determined problems), the L-1 algorithm is necessary to retain better accuracy. The comparison using Lest data acquired in the curved duct Lest rig (CDTR) at NASA Langley Research Center suggests that the L-1/L-2 generalized-inverse approach as well as CLEAN can improve the dynamic range of the detected mode by as much as 10 dB relative to conventional beam-forming even with mean flow of M=05. (C) 2015 Elsevier Ltd. Published by Elsevier Ltd. All rights reserved.
A batch process can be viewed as a two-dimensional (2D) system with dynamics in both time and batch directions. To tackle these 2D dynamics, many control algorithms have been proposed by combining iterative learning c...
详细信息
A batch process can be viewed as a two-dimensional (2D) system with dynamics in both time and batch directions. To tackle these 2D dynamics, many control algorithms have been proposed by combining iterative learning control (TLC) with high-performance continuous control algorithms under a 2D framework. However, these algorithms require large computational load and memory, which are often demanding for the software and hardware of the controllers in several fast batch processes. In this paper, a 2D predictive functional control algorithm that combines ILC with predictive functional control (PFC) is proposed. Owing to the compactness and effectiveness of PFC, the proposed control algorithm can reduce the required computational load and memory. Other than the general form of the control law, two concise and practical forms are provided as well. The proposed control scheme is tested through simulations and implementation in an injection molding process, which is a typical fast batch process. Results confirm the good performance of the proposed control algorithm.
An opposition-based improved particle swarm optimization algorithm (OIPSO) is presented for solving multiobjective reactive power optimization problem. OIPSO uses the opposition learning to improve search efficiency, ...
详细信息
An opposition-based improved particle swarm optimization algorithm (OIPSO) is presented for solving multiobjective reactive power optimization problem. OIPSO uses the opposition learning to improve search efficiency, adopts inertia weight factors to balance global and local exploration, and takes crossover and mutation and neighborhood model strategy to enhance population diversity. Then, a new multiobjective model is built, which includes system network loss, voltage dissatisfaction, and switching operation. Based on the market cost prices, objective functions are converted to least-cost model. In modeling process, switching operation cost is described according to the life cycle cost of transformer, and voltage dissatisfaction penalty is developed considering different voltage quality requirements of customers. The experiment is done on the new mathematical model. Through the simulation of IEEE 30-, 118-bus power systems, the results prove that OIPSO is more efficient to solve reactive power optimization problems and the model is more accurate to reflect the real power system operation.
This paper proposes a nonlinear Goal Programming Model (GPM) for solving the problem of admission capacity planning in academic universities. Many factors of university admission capacity planning have been taken into...
详细信息
This paper proposes a nonlinear Goal Programming Model (GPM) for solving the problem of admission capacity planning in academic universities. Many factors of university admission capacity planning have been taken into consideration among which are number of admitted students in the past years, total population in the country, number of graduates from secondary schools, desired ratios of specific specialties, faculty-to-students ratio, and the past number of graduates. The proposed model is general and has been tested at King Abdulaziz University (KAU) in the Kingdom of Saudi Arabia, where the work aims to achieve the key objectives of a five-year development plan in addition to a 25-year future plan (AAFAQ) for universities education in the Kingdom. Based on the results of this test, the proposed GPM with a modified differential evolution algorithm has approved an ability to solve general admission capacity planning problem in terms of high quality, rapid convergence speed, efficiency, and robustness.
A wireless network's design must include the optimization of the area of coverage of its wireless transmitters-mobile and base stations in cellular networks, wireless access points in WLANs, or nodes on a transmit...
详细信息
A wireless network's design must include the optimization of the area of coverage of its wireless transmitters-mobile and base stations in cellular networks, wireless access points in WLANs, or nodes on a transmit schedule in a wireless ad-hoc network. Furthermore, with increasing densities of wireless network deployments, paucity of spectrum, and new developments like whitespace devices and cognitive networks, there is a need to study the computational efficiency of managing interference and optimizing coverage. This work presents new algorithms for computing and optimizing interference-limited coverage of wireless networks under protocol and Signal-to-Interference-and-Noise Ratio (SINR) models. For the protocol model we demonstrate lower bounds on computation of the coverage area for an transmitter topology. We first show that any offline computation has a run-time of , and any dynamic update takes time to locate transmitters whose coverage is modified and time to update affected coverage regions. We then demonstrate an extension of an offline algorithm to a dynamic algorithm that achieves the lower bound. For coverage in the SINR model, we demonstrate the difficulty of geometric direct computation, and report a flexible coverage area estimation method. We then propose a Random Hill Climbing method for optimizing the coverage area measure, and demonstrate the efficacy of this method by experimental comparison with the Nelder-Mead and exhaustive search optimization methods.
Tunnels, drifts, drives, and other types of underground excavation are very common in mining as well as in the construction of roads, railways, dams, and other civil engineering projects. Planning is essential to the ...
详细信息
Tunnels, drifts, drives, and other types of underground excavation are very common in mining as well as in the construction of roads, railways, dams, and other civil engineering projects. Planning is essential to the success of tunnel excavation, and construction time is one of the most important factors to be taken into account. This paper proposes a simulation algorithm based on a stochastic numerical method, the Markov chain Monte Carlo method, that can provide the best estimate of the opening excavation times for the classic method of drilling and blasting. Taking account of technical considerations that affect the tunnel excavation cycle, the simulation is developed through a computational algorithm. Using the Markov chain Monte Carlo method, the unit operations involved in the underground excavation cycle are identified and assigned probability distributions that, with random number input, make it possible to simulate the total excavation time. The results obtained with this method are compared with a real case of tunneling excavation. By incorporating variability in the planning, it is possible to determine with greater certainty the ranges over which the execution times of the unit operations fluctuate. In addition, the financial risks associated with planning errors can be reduced and the exploitation of resources maximized.
We propose a robust static control algorithm for linear objects under parametric and structural uncertainty and an external uncontrollable disturbance. The resulting algorithm ensures that the object output tracks the...
详细信息
We propose a robust static control algorithm for linear objects under parametric and structural uncertainty and an external uncontrollable disturbance. The resulting algorithm ensures that the object output tracks the reference signal with the necessary precision. We give modeling results that illustrate that the algorithm operates correctly.
In literature, chaotic economic systems have got much attention because of their complex dynamic behaviors such as bifurcation and chaos. Recently, a few researches on the usage of these systems in cryptographic algor...
详细信息
In literature, chaotic economic systems have got much attention because of their complex dynamic behaviors such as bifurcation and chaos. Recently, a few researches on the usage of these systems in cryptographic algorithms have been conducted. In this paper, a new image encryption algorithm based on a chaotic economic map is proposed. An implementation of the proposed algorithm on a plain image based on the chaotic map is performed. The obtained results show that the proposed algorithm can successfully encrypt and decrypt the images with the same security keys. The security analysis is encouraging and shows that the encrypted images have good information entropy and very low correlation coefficients and the distribution of the gray values of the encrypted image has random-like behavior.
暂无评论