Electronic warfare is a military action whose objective is to control the electromagnetic spectrum. To accomplish this objective, both offensive electronic attack (EA) and electronic protection (EP) actions are requir...
详细信息
This paper presents a new speed controller based on the theory of adaptive fuzzy inference system based on neural (ANFIS) for a direct torque to twelve sectors controlled of the induction motor. The proposed controlle...
详细信息
Three-dimensional dynamic modeling and numerical simulation of manipulating deformable linear objects (DLOs) such as hoses, wire and cables are studied in this paper. Several coordinate systems are introduced first to...
详细信息
The effects of adding a third transition metal element, Co, Cu, Zr, or Ta, to Al-Nd (or Gd) alloy thin films were studied in order to investigate the changes in the film’s microstructure and resistivity, and also the...
The effects of adding a third transition metal element, Co, Cu, Zr, or Ta, to Al-Nd (or Gd) alloy thin films were studied in order to investigate the changes in the film’s microstructure and resistivity, and also their tendency to form hillocks or whiskers at high temperatures. The addition of Zr (or Ta), which has repulsive interactions with both Nd and Gd, to the Al-RE binary alloy films causes an increase of residual resistivity and enhances the formation of hillocks or whiskers at high temperatures. On the other hand, the addition of Cu or Co, which has attractive interactions with both Nd and Gd, results in a resistivity of less than 6 µωcm (depending on the content of added elements). Addition of either of these elements largely suppresses the growth of thermal defects after annealing at over 350 °C. The above results were explained by employing a theory of grain boundary segregation based on a chemical interaction between constituent elements of an alloy.
An OJ system is an online system to test programs in programming contests automatically. Performance enhancement of OJ systems in SMP environment is described in this paper. First, we introduce the affinity algorithm ...
详细信息
In the last two decades, Chaos theory has received a great deal of attention from the cryptographic community. This paper presents two ideas. First idea is using chaotic functions to overcome the weaknesses of the cla...
详细信息
作者:
Jian-guo WangChang-Chun PanShi-Shang JangDavid Shan-Hill WongShyan-Shu ShiehChan-Wei WuSchool of Mechatronical Engineering and Automation
Shanghai University and Shanghai Key Labof Power Station Automation Technology Shanghai 200072 China Department of Automation and Key Laboratory of System Control and Information Processing Ministry ofEducation of China Shanghai Jiao Tong University Shanghai 200240 China Department of Chemical Engineering National Tsing-Hua University Hsin-Chu 30013 Taiwan Department of Occupational Safety and Hygiene Chang Jung University Tainan 71101 Taiwan Energy & Air Pollution Control Section New Materials R&D Dept. China Steel Corporation Kaohsiung 81233 Taiwan
ring normal operations, response or quality variables of a process will follow a input-output relation that depend on certain key sensor variables. A soft-sensor with limited model size can be developed. When the proc...
详细信息
ring normal operations, response or quality variables of a process will follow a input-output relation that depend on certain key sensor variables. A soft-sensor with limited model size can be developed. When the process enters into a “faulty” state, the structure, of this model may change. Moreover, disturbance that is not reflected by sensor outputs may also be present. In this paper, we introduce a recursive soft-sensor modeling algorithm which employs a nonnegative garrote (NNG) variable selection procedure. This model can be used for both prediction, and detection of structural model change and the emergence of disturbance. The advantages of the proposed method were demonstrated by a simulation example and an industrial application to temperature prediction of a blast furnace hearth.
4WD in-wheel drive electric vehicle is a research focus recently because it is feasible to improve stability and dynamic performance. Based on the secondary development of ADVISOR, this paper established the simulatio...
详细信息
Abstract A distributed constrained supervisory strategy for large-scale spatially distributed systems is presented and applied to a networked water distribution system. The aim is at reconfiguring, whenever necessary ...
详细信息
Abstract A distributed constrained supervisory strategy for large-scale spatially distributed systems is presented and applied to a networked water distribution system. The aim is at reconfiguring, whenever necessary in response to different supply downstream demands, the nominal set-points to the tank water levels so that all prescribed coordination and operational constraints are enforced during the system evolutions and sustainable equilibria are reached. The presented supervision strategy follows a coordination-by-constraint approach and is based on Feed-Forward Command Governor (FF-CG) ideas. The effectiveness of the strategy is shown in the final example where the supervision of an eight-tank interconnected system is considered.
Abstract A fundamental quantity of the solution of an optimal control problem is the value function, i.e., the optimal cost-to-go function. In the general case, the function is not known exactly, but need to be approx...
详细信息
Abstract A fundamental quantity of the solution of an optimal control problem is the value function, i.e., the optimal cost-to-go function. In the general case, the function is not known exactly, but need to be approximated numerically. Most approaches to numerical approximation of the value function follow a procedure of three steps: first, the original continuous problem formulation is fully discretized; second, the discretized finite optimal control problem is solved by a shortest-path algorithm, and as third step, the solution is projected back from the finite space onto the continuous state space by using an interpolating function. This paper investigates the differences of discretization schemes and interpolating functions in this context. The performance of the computed approximations is evaluated in terms of an a-posteriori error, which is obtained from the approximating value functions. The convergence of the approximations to the true value function is proved for all considered schemes for the case that the discretization parameters are decreased to zero.
暂无评论