This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas ex...
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas exist. However, when it comes to designing a generalised predictive controller (GPC) four parameters have to be specified. To choose those parameters is not a trivial task since they are not directly related to control or regulation performance. The presented tuning method exploits model-parameters to select suitable controller parameters. Additionally, a Rhinehart filter is incorporated in the design to decrease the impact of noise, therefore, a fifth parameter has to be optimised. The proposed method has been tested in simulation and on a real system.
QoS solutions for Core Internet Networks require that we pay special attention to scalability, as they deal with a lot of flows and demand many resources. In this paper, integrated solutions from the physical layer (S...
详细信息
QoS solutions for Core Internet Networks require that we pay special attention to scalability, as they deal with a lot of flows and demand many resources. In this paper, integrated solutions from the physical layer (SDH/SONET and DTM) to the IP layer (IntServ and DiffServ) are analysed and proposed, concentrating not only on scalability, but also on QoS guarantees.
作者:
Chris McDonaldProgramming
Languages and Systems Group Department of Computer Science The University of Western Australia Crawley Western Australia
One of the greatest benefits provided by computer networks, in particular local area networks, is the ability to access files served by other computers in a network. Whereas file system concepts are first introduced i...
ISBN:
(纸本)9780897917575
One of the greatest benefits provided by computer networks, in particular local area networks, is the ability to access files served by other computers in a network. Whereas file system concepts are first introduced in Operating systems units, many file system concepts need to be readdressed and generalized in later Computer Networks units. Moreover, as students become increasingly familiar with internetworking and programs such as ftp, many of the strong links between the Operating systems and Computer Networks units may be reinforced. This paper discusses the successes experienced with two strongly related projects offered in our third year Computer Networks unit. Each project requires students to support a minimal distributed file system by implementing user-level libraries which redefine a handful of operating system system calls supporting remote file access.
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
详细信息
We deigned a spiking neural network that computes network weights in the temporal dimension. Such a network can be used for artificial intelligence and deep learning. We demonstrate circuits implementing blocks for bu...
详细信息
Multi-agent approaches can be applied to model behaviour and relations of entities in cyber-physical systems. Here entities frequently compete on insufficient resources (e.g., hardware) at the same time. Hence, resour...
详细信息
Multi-agent approaches can be applied to model behaviour and relations of entities in cyber-physical systems. Here entities frequently compete on insufficient resources (e.g., hardware) at the same time. Hence, resource conflicts between several agents are one of the most important conflict types in such multi-agent systems. These conflicts can significantly slow the operation of a system down, or in the worst case, might lead to a system halt. In this paper, we investigate the challenge of efficiently detecting resource conflicts. For this purpose, we introduce a conflict detection model based on beliefs of BDI agents. One benefit of our approach is that conflicts are detected using local belief state information of agents without communication. For evaluation purposes we apply our conflict detection model to a multi-agent system representing a transportation service with moving robots on a fictitious airport to measure the rate of collisions and completed transportation tasks. The evaluation study showed that the system deploying the conflict detection model can avoid collisions between moving agents and agents execute tasks successfully.
作者:
Chris McDonaldKamran KazemiProgramming
Languages and Systems Group Department of Computer Science The University of Western Australia Nedlands Western Australia 6907
Parallel algorithms are often introduced to students by describing the geometric topologies formed by communicating processes and often the geographic relationships between them. However, the two most common message p...
ISBN:
(纸本)9781581132137
Parallel algorithms are often introduced to students by describing the geometric topologies formed by communicating processes and often the geographic relationships between them. However, the two most common message passing environments used in teaching, PVM and MPI, each provide only rudimentary support for the specification and execution of process topologies. There is a strong need for better syntactic and semantic support for process topologies in these environments, so that students may concentrate on the algorithms being studied, and not have to wrestle with the environments' infrastructure. This paper first motivates, and then describes the use of additional support within PVM and MPI which addresses this need.
Personalization is becoming very important direction in semantic web search for the users that needs to find appropriate information. In this paper, a classification of web personalization is proposed and semantic web...
详细信息
The paper gives an overview of research devoted to developing a semi-automatic methodology of building a semantic model of medical diagnostic knowledge. The methodology is based on natural language processing methods ...
详细信息
Rapid single flux quantum (RSFQ) logic is a digital circuit technology that in recent years has presented itself as an alternative to semiconductors in the application of ultra high speed, very low power applications....
详细信息
Rapid single flux quantum (RSFQ) logic is a digital circuit technology that in recent years has presented itself as an alternative to semiconductors in the application of ultra high speed, very low power applications. The optimal timing of digital circuits operating at hundreds of GHz is still a complex problem for both RSFQ and semiconductor technologies. The fact that most RSFQ gates require a clock signal to function makes this even more complex. Various RSFQ timing schemes have been adapted from semiconductor design methodologies, and some have been designed specifically for RSFQ. Currently, synchronous clocking schemes outperform other schemes, but with the scale of RSFQ circuits ever increasing, the proper use of timing schemes are becoming more crucial. This paper describes a new asynchronous self-timing scheme where the details of clock distribution and clocking are built into the logic gates. Tests were done on the newly developed asynchronous logic gates and an asynchronous full adder was implemented and tested
暂无评论