A hierarchical Nonlinear Model Predictive control (NMPC) scheme with guaranteed Input-to-State-practical-Stability (ISpS) is proposed. The controller is formed by an Integral Sliding Mode (ISM) controller and a NMPC o...
详细信息
This paper describes the application of a Parallel Genetic Algorithm that solves the weekly timetable construction problem for elementary schools. Timetable construction is NPcomplete and highly constrained problem, a...
详细信息
This paper considers a class of uncertainties with the polynomial function form of perturbation parameters, which is analogous to a fact that part information is known for some uncertainties. A sufficient condition of...
详细信息
This paper considers a class of uncertainties with the polynomial function form of perturbation parameters, which is analogous to a fact that part information is known for some uncertainties. A sufficient condition of robust stability is presented, and a method is also provided to estimate the stability bound for plants with the class of uncertainties. In the case of interval plants, this condition reduces to an existing result, which would show indirectly the condition is not too conservative. Methods are ...
As a complex system boiler combustion process has the characteristics - high non-linearity, strong jamming, strong coupling and large lagging, meanwhile its internal and external disturbance are very frequent, and fue...
详细信息
This article outlines some of the advantages and disadvantages of wind turbines linear identification, in case of minimal number of measuring channels. The identified turbine has horizontal axis and belongs to middle ...
详细信息
One of the main concerns in underground working tunnels is ensuring the safety of the workers and their equipment. Being aware of the real-time position of personnel in such harsh environment is challenging and requir...
详细信息
This paper presents an attempt to improve dynamic identification procedure for robotic manipulators, such that obtained models are appropriate for trajectory planning and motion control. In addition to algorithms deve...
详细信息
Image fingerprints are related to cryptographic hash functions. In contrast to cryptographic hash functions this robust digest is sensitive only to perceptual change. Minor changes, which are not affecting the percept...
详细信息
ISBN:
(纸本)9780889866362
Image fingerprints are related to cryptographic hash functions. In contrast to cryptographic hash functions this robust digest is sensitive only to perceptual change. Minor changes, which are not affecting the perception, do not result in a different fingerprint. In addition applied in authentication and tamper detection as traditional digital signatures, image fingerprinting technique is used in content-based retrieval, content-based monitoring, and content-based filtering. In this paper we present a slantlet transform based method for image fingerprints. The slantlet transform is a kind of orthogonal wavelet and performs better in data compression than discrete cosine transform and the other wavelets. Phase information is extracted from slantlet domain for image fingerprints. Better performance is verified in experiments evaluating robustness (e.g. against operations like lossy compression, scaling and cropping) and discriminability in comparison to an existing method.
The most important parts of our Biotelemetry system is a hardware platform. If we could develop visualization, we must have to measure real data. They are two main choices to solve this part of system. We can use comm...
详细信息
暂无评论