This work deals with the description of a design procedure for hierarchical Fault Tolerant Control (FTC) of large-scale systems. Following a functional perspective, a procedure for the modular design of the diagnostic...
详细信息
In this work we address the power-rate adaptation issue for wireless ad-hoc networks under the assumption of high mobility. First, we describe our concept based on the trade off between power-modulation used and inter...
详细信息
The purpose of this paper is to study a Stefan problem with anisotropy under a random disturbance. The Stefan problem is a typical example of a free boundary problem. Some mathematical models of the Stefan problem hav...
详细信息
This paper is concerned with behavior analyses of the stochastic mean curvature flows of some phase boundaries. The phase boundary is defined as a curve or a surface separating different physical states such as a wate...
详细信息
The problem that a robot navigates autonomously through its environment, builds its own map and localizes itself in the map (known a the SLAM problem), is still an open problem. Most of the approaches to solve the SLA...
详细信息
This paper demonstrates how to construct a reference governor for which the size of its implemented data can be adjusted with an integer parameter v, ensuring fulfillment of a pointwise-in-time constraint. Using a tec...
详细信息
Practical control systems necessarily have pointwise-in-time constraints such as a physical limit on state variables and/or such as an actuator bound on control variables. For such systems, switching control strategy ...
详细信息
In this paper an automated laboratory set-up for the characterization of micro- and millimeter-wave electron devices under DC, small- and large-signal operation is described, which is based on a generalized, technolog...
详细信息
This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune...
详细信息
This paper briefly reviews other people’s works on negative selection algorithm and their shortcomings. With a view to the real problem to be solved, authors bring forward two assumptions, based on which a new immune algorithm, multi-level negative selection algorithm, is developed. In essence, compared with Forrest’s negative selection algorithm, it enhances detector generation efficiency. This algorithm integrates clonal selection process into negative selection process for the first time. After careful analyses, this algorithm was applied to network intrusion detection and achieved good results.
Despite the efforts to leverage the network performance through the use of Directional Communications, most protocols still rely on the basic mechanisms employed by the IEEE802.11 standards. While this might be desira...
详细信息
暂无评论