This paper addresses a robust H_(infinity) filtering problem for networked systems that are subject to both random transmission delays and packet dropouts. To start with, a data transmission model is established by em...
详细信息
This paper addresses a robust H_(infinity) filtering problem for networked systems that are subject to both random transmission delays and packet dropouts. To start with, a data transmission model is established by employing random series with Bernoulli distributions. A sufficient condition for robust stability with H_(infinity) constraints is derived for the filtering error system. The robust filter is designed in terms of the feasibility of a linear matrix inequality (LMI). The numerical examples are provided to show the effectiveness of the data transmission model and the proposed filtering method.
In this paper, distributed containment control with group dispersion and cohesion behaviors are discussed for a group of Lagrange systems. Both the cases of constant leaders' generalized coordinate derivatives and...
详细信息
In this paper, distributed containment control with group dispersion and cohesion behaviors are discussed for a group of Lagrange systems. Both the cases of constant leaders' generalized coordinate derivatives and time-varying leaders' generalized coordinate derivatives are considered. The proposed control algorithms are shown to obtain velocity matching, connectivity maintenance and collision avoidance. In addition, the sum of the steady-state distances between followers and the convex hull formed by the leaders is shown to be bounded and this bound is explicitly given.
The event-triggered H_(infinity) control design is investigated for networked controlsystems with uncertainties and transmission delays. A novel event-triggering scheme is proposed, which has some advantages over tra...
详细信息
ISBN:
(纸本)9781612848006
The event-triggered H_(infinity) control design is investigated for networked controlsystems with uncertainties and transmission delays. A novel event-triggering scheme is proposed, which has some advantages over traditional ones with a continuous detector. Considering the effect of the transmission delay, a delay system model for the analysis is firstly constructed. Then, based on the model and Lyapunov functional method, criteria for the stability with an H_(infinity) norm bound and criteria for the co-design of both the feedback gain and the trigger parameters are derived. In order to solve the feedback gain and the trigger parameters, the linear matrix inequality technique is employed. From the simulation example, it can be concluded that the proposed event-triggering scheme is superior to some other event-triggering schemes in some existing literature.
Web Service composition is a very promising way to generate new services on service oriented architecture (SOA). It will come across subsequent branch convergence problem when implementing parallel process in the dist...
详细信息
Home automationsystems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the loc...
详细信息
ISBN:
(纸本)9781617825583
Home automationsystems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the location of static nodes to limit the search for a route to a small zone based on the analysis of characteristics and requirements. The calculation of two different kinds of zone and the route discovery procedure are described in this paper. According to the environment of home automation, we compared the performance of our routing protocols with the ad-hoc on-demand distance-vector protocol using simulation and gave suggestions for zone selection. Simulation results showed that our routing protocol dramatically reduced the routing overhead and increased the reliability.
To solve the weapon network system optimization problem against small raid objects with low attitude,the concept of direction probability and a new evaluation index system are *** calculating the whole damaging probab...
详细信息
To solve the weapon network system optimization problem against small raid objects with low attitude,the concept of direction probability and a new evaluation index system are *** calculating the whole damaging probability that changes with the defending angle,the efficiency of the whole weapon network system can be subtly *** such method,we can avoid the inconformity of the description obtained from the traditional index *** new indexes are also proposed,*** index,overlap index and cover index,which help manage the relationship among several *** normalizing the computation results with the Sigmoid function,the matching problem between the optimization algorithm and indexes is well ***,the algorithm of improved marriage in honey bees optimization that proposed in our previous work is applied to optimize the embattlement *** is carried out to show the efficiency of the proposed indexes and the optimization algorithm.
Home automationsystems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the loc...
详细信息
Home automationsystems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the location of static nodes to limit the search for a route to a small zone based on the analysis of characteristics and requirements. The calculation of two different kinds of zone and the route discovery procedure are described in this paper. According to the environment of home automation, we compared the performance of our routing protocols with the ad-hoc on-demand distance-vector protocol using simulation and gave suggestions for zone selection. Simulation results showed that our routing protocol dramatically reduced the routing overhead and increased the reliability.
Non Conventional Instrument Transformer (NCIT) and IEC 61850 are crucial technologies in digital substations. But they bring some new uncertainties to protection IEDs, especially the time synchronization issue in curr...
详细信息
Non Conventional Instrument Transformer (NCIT) and IEC 61850 are crucial technologies in digital substations. But they bring some new uncertainties to protection IEDs, especially the time synchronization issue in current differential protection. The paper analyzes the time delay of transferring sampled values from NCIT to current differential relay in NCIT and IEC61850 based digital substation, then finds out the delay-non-deterministic problem, at last presents a novel current differential protection scheme by using Phase-Locked Loops (PLL ) technology.
Non conventional instrument transformer (NCIT) and IEC 61850 are crucial technologies in digital substations. But they bring some new uncertainties to protection IEDs, especially the time synchronization issue in curr...
详细信息
Non conventional instrument transformer (NCIT) and IEC 61850 are crucial technologies in digital substations. But they bring some new uncertainties to protection IEDs, especially the time synchronization issue in current differential protection. The paper analyzes the time delay of transferring sampled values from NCIT to current differential relay in NCIT and IEC61850 based digital substation, then finds out the delay-non-deterministic problem, at last presents a novel current differential protection scheme by using phase-locked loops (PLL ) technology.
This article gives a capsule view of research on rough set theory and applications ongoing at universities and laboratories in China. Included in this capsule view of rough set research is a brief description of the f...
详细信息
暂无评论