Real-time scheduling methods introduce various types of jitter in task instance execution. For real-time computer-controlled systems, the introduced sampling jitter and sampling-actuation delays may degrade the system...
详细信息
Real-time scheduling methods introduce various types of jitter in task instance execution. For real-time computer-controlled systems, the introduced sampling jitter and sampling-actuation delays may degrade the system performance and even lead to instability in the system. The degradation of the system performance can be compensated on-line by updating the controller parameters at each controller task instance execution, in what we call the compensation approach. In this paper we present stability analysis for controller tasks that perform the compensation approach.
In this paper, the Hopfield neural network with delay (HNND) is studied from the standpoint of regarding it as an optimizing computational model. Two general updating rules for networks with delay (GURD) are given bas...
详细信息
In this paper, the Hopfield neural network with delay (HNND) is studied from the standpoint of regarding it as an optimizing computational model. Two general updating rules for networks with delay (GURD) are given based on Hopfield-type neural networks with delay for optimization problems and characterized by dynamic thresholds. It is proved that in any sequence of updating rule modes, the GURD monotonously converges to a stable state of the network. The diagonal elements of the connection matrix are shown to have an important influence on the convergence process, and they represent the relationship of the local maximum value of the energy function to the stable states of the networks. All the ordinary discrete Hopfield neural network (DHNN) algorithms are instances of the GURD. It can be shown that the convergence conditions of the GURD may be relaxed in the context of applications, for instance, the condition of nonnegative diagonal elements of the connection matrix can be removed from the original convergence theorem. A new updating rule mode and restrictive conditions can guarantee the network to achieve a local maximum of the energy function with a step-by-step algorithm. The convergence rate improves evidently when compared with other methods. For a delay item considered as a noise disturbance item, the step-by-step algorithm demonstrates its efficiency and a high convergence rate. Experimental results support our proposed algorithm.
This paper presents a feasible open-canal water-distribution control system based on the dynamic regulation principle and the theory of Kalman optimal controller. The existing nonlinear phenomena, as well as the trans...
详细信息
This paper presents a feasible open-canal water-distribution control system based on the dynamic regulation principle and the theory of Kalman optimal controller. The existing nonlinear phenomena, as well as the transport delay phenomenon are accounted for. The obtained controller is simulated using the full Saint-Venant partial differential equations
In general, characteristics of classical control theory and properties of real-time scheduling algorithms may cause unexpected control system responses in the implementation of real-time computer-controlled systems. R...
详细信息
In general, characteristics of classical control theory and properties of real-time scheduling algorithms may cause unexpected control system responses in the implementation of real-time computer-controlled systems. Revising real-time scheduling properties, we analyse which are the main timing problems that current scheduling algorithms may introduce in the execution of control loops. Next, we categorise those timing problems, that is, jitters on task-instances executions, in a control context. Afterwards, we show, by simulations, different types of control system performance degradation that these jitters may cause. Finally, we propose possible solutions that solves this degradation, based on irregular sampling discrete-time system models with varying time delays.
This paper addresses networking and traffic control problems in network systems along with the potential for introducing soft-computing applications at supervisory control level. The incentive Stackelberg strategy con...
详细信息
Considering that anthropo centric systems are an adequate domain for captological approaches, and that interface agents are most natural interactants for the humans involved, the paper presents a broad-spectrum generi...
详细信息
Considering that anthropo centric systems are an adequate domain for captological approaches, and that interface agents are most natural interactants for the humans involved, the paper presents a broad-spectrum generic architectural framework to support developing flexible interfaces for industrial applications, based on synergetic correlation between persuasive technologies and polymorphic agents. The design space for agent-oriented captology is defined and several of its main dimensions are elaborated upon. The main mechanisms used are dynamic priorities, "flexible cloning" and fuzzy temporal windows. Some agent-oriented test-bench applications instantiating the generic architecture, arc described briefly.
Repetitive processes are a distinct class of 2D systems of both theoretical and applications interest. They are characterized by a series of sweeps through a set of dynamics with explicit interaction between the outpu...
详细信息
Repetitive processes are a distinct class of 2D systems of both theoretical and applications interest. They are characterized by a series of sweeps through a set of dynamics with explicit interaction between the outputs, or pass profiles, produced on successive passes. Their essential unique features are that (i) information propagation is over a finite duration in one of the two separate directions of information propagation; and (ii) the explicit interaction between successive pass profiles can lead to oscillations in the sequence of pass profiles that increase in amplitude in the pass to pass direction. In the case of processes with linear dynamics (either differential or discrete) a reasonably rich systems theory is available for models which are standard (or nonsingular). In this paper, we provide the first substantial results on discrete linear repetitive processes described by a singular state space model.
Assume X/sup #/ is an extension set in the domain U. Let X/sup A/, X/sup B/ be the positive domain of X/sup #/ in which X/sup A//spl sub/X/sup #/, X/sup B//spl sub/X/sup #/, and X/sup A//spl ne/X/sup B/. X/sup A/={x/s...
详细信息
ISBN:
(纸本)0780370872
Assume X/sup #/ is an extension set in the domain U. Let X/sup A/, X/sup B/ be the positive domain of X/sup #/ in which X/sup A//spl sub/X/sup #/, X/sup B//spl sub/X/sup #/, and X/sup A//spl ne/X/sup B/. X/sup A/={x/sub 1//sup A/, x/sub 2//sup A/, ..., x/sub n//sup A/}, X/sup B/={x/sub 1//sup B/, x/sub 2//sup B/, ..., x/sub n//sup B/}. /spl forall/x/sub 1//sup A/, x/sub 1//sup B//spl isin/N/sup +/, |X/sup A/|/spl ges/4, |X/sup B/|/spl ges/4. By using the accumulated generating operation, we can obtain a mathematical model from X/sup A/ and X/sup B/. From the mathematical model we also derive the sets of X'/sub A/ and X'/sub B/. Both X'/sub A/ and X'/sub B/ are the extended domains of X/sup #/. There exist polynomials p/sup A/(x), p/sup B/(x); and p/sup AB/(x) from X'/sub A/, X'/sub B/, and X/sup AB/, respectively. Based on the p/sup A/(x), p/sup B/(x), and p/sup AB/(x), we propose a new public cryptosystem. In the presented system, we have a public cryptography system from generated data in extension set X/sup #/, a public cryptosystem from two generated data in extension set X/sup #/, and a public cryptosystem from hybrid generated data in extension set X/sup #/. The proposed model is a secure system. Both sides in the communication system can depend on the proposed cryptosystem to fulfill the cryptography of the to-be-transmitted file and de-cryptograph of the cryptograph.
Analysis of complex systems such as hierarchically structured network systems that are employed in modelling and analysis various aspects and issues of control and management in telecommunications is investigated. The...
详细信息
Analysis of complex systems such as hierarchically structured network systems that are employed in modelling and analysis various aspects and issues of control and management in telecommunications is investigated. Theory of graphs and binary matrices appear to be most suitable tools for modelling the overall structure of complex systems, in general, and of systemic hierarchies, in particular. A systematic methodology has been developed for computer simulation analysis and detecting general hierarchies in communications networking as well as for synthesis of system hierarchies. This methodology is an improved extension of Warfield's technique.
Identification of certain system needs search for class of functions or model forapproximation of the system input-output behavior in the "best" possible way. In most situations, as in dynamic systems identi...
详细信息
Identification of certain system needs search for class of functions or model forapproximation of the system input-output behavior in the "best" possible way. In most situations, as in dynamic systems identification, pattern recognition etc., the value of the output of the mode ling system is function of the previous values of outputs and inputs. In the current circumstances almost all efforts for using neural networks for identification and control are based on feed-forward networks. If the system order or the upper limit of the order is known, all the necessary previous values of the inputs and outputs of the mode led system can be put as input in the network. The network can learn non-memory transformations that include thesystem output dependence on specified previous inputs and outputs.
暂无评论