Disk scheduling algorithms have long been a topic of study in computer science. Many researchers studied the performance of the disk scheduling algorithms. However, perhaps due to the difficulty of implementation, tho...
详细信息
Disk scheduling algorithms have long been a topic of study in computer science. Many researchers studied the performance of the disk scheduling algorithms. However, perhaps due to the difficulty of implementation, those early works focused solely on exploring the basic ideas and comparing the performance of these algorithms. No one studied the effect of bad sectors in their performance. In this paper, the performance of the disk scheduling algorithms in the presence of bad sectors is studied. The mapping of bad sectors to spare sectors is considered. We use simulation to do the performance evaluation. Simulation results show that all disk scheduling algorithms are same when there is a high percentage of bad sectors and when the spare sectors are distributed at the end of the disk. It is shown also that with a high percentage of bad sectors, the disk scheduling algorithms perform better if the distribution of spare sectors is at the end of the disk. With a low percentage of bad sectors, the scheduling algorithms perform better if the distribution of spare sectors is within the entire disk. It is shown also that all scheduling algorithms are more sensitive to bad sectors in heavily loaded systems.
Abstract The indirect adaptive regulation of unknown nonlinear dynamical systems under the presence of dynamic and parameter uncertainties, is considered in this paper. The method is based on a new Neuro-Fuzzy Dynamic...
详细信息
Abstract The indirect adaptive regulation of unknown nonlinear dynamical systems under the presence of dynamic and parameter uncertainties, is considered in this paper. The method is based on a new Neuro-Fuzzy Dynamical Systems definition named Fuzzy-Recurrent High Order Neural Network (F-RHONN), which however takes into account the fuzzy output partitions of the initial fuzzy dynamical system (FDS) operating in conjunction with appropriate HONNFs, that approximates the fuzzy rules. The proposed scheme does not require a-priori experts’ information on the number and type of input variable membership functions making it less vulnerable to initial design assumptions. Once the system is identified around an operation point, it is regulated to zero adaptively. Weight updating laws for the involved HONNFs are provided, which guarantee that under the presence of ‘small’ dynamic uncertainties both the identification error and the system states reach zero exponentially fast, while keeping all signals in the closed loop bounded. The existence of the control signal is always assured by introducing a method of parameter hopping, which is incorporated in the weight updating law. The applicability is tested on the Lorenz model, where it is shown that by following the proposed procedure one can obtain asymptotic regulation quite well in the presence of unmodeled dynamics.
This article reviews authors' recently developed algorithm for identification of nonlinear state-space models under missing observations and extends it to the case of unknown model structure. In order to estimate ...
详细信息
The task of motion planning for robotic manipulators means to drive an end-effector between designated points in the work area while obstacles are not hit. This contribution investigates the case of dynamic obstacles ...
详细信息
The task of motion planning for robotic manipulators means to drive an end-effector between designated points in the work area while obstacles are not hit. This contribution investigates the case of dynamic obstacles (like human operators) and the consideration of a performance criterion to be maximized for the motion. The proposed approach maps the dynamics of the manipulator and the obstacles into the C times T-space (spanned by the configuration C and the time T). Within this space, an (sub-)optimal sequence of configurations in the collision-free subspace is determined by mixed-integer linear programming. To achieve sufficient computational efficiency, the optimization task is approached by employing the principles of model predictive control. The paper describes the approach based on the example of a two-link robot interacting with a human operator.
Abstract In the paper the mathematical modeling methods were employed to solve the problem of fuel mass estimation supplied to the power generating boiler grid. It was shown that popular polynomial and neural network ...
Abstract In the paper the mathematical modeling methods were employed to solve the problem of fuel mass estimation supplied to the power generating boiler grid. It was shown that popular polynomial and neural network based identification algorithms can be used to measure amount of fuel supplied to the boiler combustion chamber. Furthermore the original conception and exemplary realization of the mass stream measuring system was presented.
This paper describes an interactive tool focused on teaching and learning basic concepts on multivariable control systems. Most industrial processes are represented by multivariable systems and thus the teaching and l...
详细信息
We present a dynamic partitioning strategy that selects test cases using online feedback information. The presented strategy differs from conventional approaches. Firstly, the partitioning is carried out online rather...
详细信息
ISBN:
(纸本)9781424459124
We present a dynamic partitioning strategy that selects test cases using online feedback information. The presented strategy differs from conventional approaches. Firstly, the partitioning is carried out online rather than off-line. Secondly, the partitioning is not based on program code or specifications; instead, it is simply based on the fail or pass information of previously executed test cases and, hence, can be implemented in the absence of the source code or specification of the program under test. The cost-effectiveness of the proposed strategy has been empirically investigated with three programs, namely SPACE, SED, and GREP. The results show that the proposed strategy achieves a significant saving in terms of total number of test cases executed to detect all faults.
This paper presents recently introduced learning algorithm called extreme learning machine (ELM) for single-hidden layer feed-forward neural-networks (SLFNs) which randomly chooses hidden nodes and analytically determ...
详细信息
This paper presents recently introduced learning algorithm called extreme learning machine (ELM) for single-hidden layer feed-forward neural-networks (SLFNs) which randomly chooses hidden nodes and analytically determines the output weights of SLFNs. The ELM avoids problems like local minima, improper learning rate and over fitting commonly faced by iterative learning methods and completes the training very fast. We have evaluated the multicategory classification performance of ELM on five different data sets related to bioinformatics namely, the Breast Cancer Wisconsin data set, the Pima Diabetes data set, the Heart-Statlog data set, the Hepatitis data set and the Hypothyroid data set. A detailed analysis of different activation functions with varying number of neurons is also carried out which concludes that Algebraic Sigmoid function outperforms all other activation functions on these data sets. The evaluation results indicate that ELM produces better classification accuracy with reduced training time and implementation complexity compared to earlier implemented models.
In this paper, a new method for an improved image password lock system by tracing position information of the pupil is described. The present technology relates to an efficient auto-detecting function, and in particul...
详细信息
In this paper, a new method for an improved image password lock system by tracing position information of the pupil is described. The present technology relates to an efficient auto-detecting function, and in particular, to an image password lock system, which can provide the benefits of a novel password input mode without any contact. In this system, a PC camera device detects a movable target object to read a dynamic eye image data. Moreover, the dynamic eye image data has a predetermined shooting range set to be a whole-region image, and the whole-region image has a central region and a plurality of specific password regions. A target eye image is displayed by a display device, and then processed by an image processing device, thereby calculating a center coordinate point of the target eye image in the dynamic image data, compiling a password constituted by a movement position of the target object image, displaying the password, and validating the password. Therefore, the benefits of a novel password input mode without any contact, an efficient anti-theft function, are provided.
Mining ventilation is an interesting example of a large scale system with high environmental impact where advanced control strategies can bring major improvements. The challenge in this work is focused on the mining v...
详细信息
Mining ventilation is an interesting example of a large scale system with high environmental impact where advanced control strategies can bring major improvements. The challenge in this work is focused on the mining ventilation since as much as 50 % or more of the energy consumed by the mining process may go into the ventilation (including heating the air). It is clear that investigating automaticcontrol solutions and minimizing the amount of pumped air to save energy consumption (proportional to the cube of airflow quantity) is of great environmental and industrial interest.
暂无评论