Mining sequential patterns is to discover sequential purchasing behaviors of most customers from a large amount of customer transactions. In this paper, a data mining language is presented. From the data mining langua...
详细信息
Benchmark-based process assessment and improvement is a cutting-edge technology in software engineering for adaptive and relative process improvement. It is found that benchmark-based process improvement is more adapt...
详细信息
Deals with the use of object oriented technologies in the modeling of industrial plants that have to be remotely monitored and/or controlled. The main goal is to propose a design methodology for obtaining the model of...
详细信息
ISBN:
(纸本)0780372417
Deals with the use of object oriented technologies in the modeling of industrial plants that have to be remotely monitored and/or controlled. The main goal is to propose a design methodology for obtaining the model of the so-called Virtual Plant, that a remote and certified user will use to access the real plant for performing command actions and/or monitoring. The type of applications and systems targeted must have autonomous behavior and be interconnected and accessible. Reliability, maintainability and flexibility are also required goals, as well as a high rate of reusability of the applications. The methodology has been applied to the remote process monitoring and control of manufacturing processes. The Virtual Plant Model is, in fact, the part of the plant that can be accessed by a certified remote client and thus it can be constituted by a set of sub-models, as many as different types of clients. The Virtual Plant resides inside the Application Server who is responsible of communicating with the cell controller and sends the image of the actual plant state (the Virtual Plant) as required by the remote client (monitoring) or sends the client commands to the cell controller.
This paper presents a feasible open-canal water-distribution control system based on the dynamic regulation principle and the theory of Kalman optimal controller. The existing nonlinear phenomena, as well as the trans...
详细信息
This paper presents a feasible open-canal water-distribution control system based on the dynamic regulation principle and the theory of Kalman optimal controller. The existing nonlinear phenomena, as well as the transport delay phenomenon are accounted for. The obtained controller is simulated using the full Saint-Venant partial differential equations
In general, characteristics of classical control theory and properties of real-time scheduling algorithms may cause unexpected control system responses in the implementation of real-time computer-controlled systems. R...
详细信息
This paper addresses networking and traffic control problems in network systems along with the potential for introducing soft-computing applications at supervisory control level. The incentive Stackelberg strategy con...
详细信息
Recent years has seen much progress in the theory and application of iterative learning control schemes for both linear and (classes of) nonlinear dynamics. In the case of the former, many algorithms based on minimizi...
详细信息
Recent years has seen much progress in the theory and application of iterative learning control schemes for both linear and (classes of) nonlinear dynamics. In the case of the former, many algorithms based on minimizing a suitable cost function have been reported. Here the interest is in the so-called norm optimal approach where the basic philosophy is to compute the control input on the current trial such that the tracking error is reduced in an optimal way without too much deviation from the control input used on the previous trial. This paper compares the performance of a range of controllers arising from use of the norm optimal approach - both stand alone and against alternatives.
Assume X/sup #/ is an extension set in the domain U. Let X/sup A/, X/sup B/ be the positive domain of X/sup #/ in which X/sup A//spl sub/X/sup #/, X/sup B//spl sub/X/sup #/, and X/sup A//spl ne/X/sup B/. X/sup A/={x/s...
详细信息
ISBN:
(纸本)0780370872
Assume X/sup #/ is an extension set in the domain U. Let X/sup A/, X/sup B/ be the positive domain of X/sup #/ in which X/sup A//spl sub/X/sup #/, X/sup B//spl sub/X/sup #/, and X/sup A//spl ne/X/sup B/. X/sup A/={x/sub 1//sup A/, x/sub 2//sup A/, ..., x/sub n//sup A/}, X/sup B/={x/sub 1//sup B/, x/sub 2//sup B/, ..., x/sub n//sup B/}. /spl forall/x/sub 1//sup A/, x/sub 1//sup B//spl isin/N/sup +/, |X/sup A/|/spl ges/4, |X/sup B/|/spl ges/4. By using the accumulated generating operation, we can obtain a mathematical model from X/sup A/ and X/sup B/. From the mathematical model we also derive the sets of X'/sub A/ and X'/sub B/. Both X'/sub A/ and X'/sub B/ are the extended domains of X/sup #/. There exist polynomials p/sup A/(x), p/sup B/(x); and p/sup AB/(x) from X'/sub A/, X'/sub B/, and X/sup AB/, respectively. Based on the p/sup A/(x), p/sup B/(x), and p/sup AB/(x), we propose a new public cryptosystem. In the presented system, we have a public cryptography system from generated data in extension set X/sup #/, a public cryptosystem from two generated data in extension set X/sup #/, and a public cryptosystem from hybrid generated data in extension set X/sup #/. The proposed model is a secure system. Both sides in the communication system can depend on the proposed cryptosystem to fulfill the cryptography of the to-be-transmitted file and de-cryptograph of the cryptograph.
Analysis of complex systems such as hierarchically structured network systems that are employed in modelling and analysis various aspects and issues of control and management in telecommunications is investigated. The...
详细信息
Real-time scheduling methods introduce various types of jitter in task instance execution. For real-time computer-controlled systems, the introduced sampling jitter and sampling-actuation delays may degrade the system...
详细信息
Real-time scheduling methods introduce various types of jitter in task instance execution. For real-time computer-controlled systems, the introduced sampling jitter and sampling-actuation delays may degrade the system performance and even lead to instability in the system. The degradation of the system performance can be compensated on-line by updating the controller parameters at each controller task instance execution, in what we call the compensation approach. In this paper we present stability analysis for controller tasks that perform the compensation approach.
暂无评论