The Elimination lemma provides analysis conditions that constitute a fundamental tool in obtaining state space solutions of robust control design problems. Using operator theoretical concepts, the paper provides a der...
详细信息
ISBN:
(纸本)9781467357159
The Elimination lemma provides analysis conditions that constitute a fundamental tool in obtaining state space solutions of robust control design problems. Using operator theoretical concepts, the paper provides a derivation of the Elimination lemma based on a contractive extension principle and to give a Krein space geometric interpretation of the result. In this way the statement of the lemma is related to general techniques, like interpolation and commutant lifting theory. This result is considered to be an initial step in the control relevant formulation of the lemma in an infinite dimensional setting.
The paper provides a formulation of the quadratic separator result in a fairly general input-output operator framework and it focuses on the specific points that are different compared to the usual finite dimensional ...
详细信息
ISBN:
(纸本)9781467357159
The paper provides a formulation of the quadratic separator result in a fairly general input-output operator framework and it focuses on the specific points that are different compared to the usual finite dimensional formulations. The major contribution of the paper is to emphasize the role of the causality in obtaining the stability result having a quadratic separator and the fact that the plant and the boundedness constant in the formulation of the well-posedness condition determine the robust stability domain associated to the given plant, i.e., the set of those systems {κ} that stabilizes the given plant and produce the given "disturbance rejection" level γ. Concerning the causality issue the necessity of the homotopy argument in the IQC results is also explained and its relation with a general result concerning nest algebras is pointed out.
This paper proposes a joint decision approach of intelligence fusion based on two kinds of intelligence, which is used in the domestic indoor environment for the planar mobile robot reaching the destination avoiding t...
详细信息
This paper introduces a novel and unique paradigm to upgrade a long-standing summer research program at a government institution to include components that are now standard at civilian programs, such as National Scien...
详细信息
This paper introduces a novel and unique paradigm to upgrade a long-standing summer research program at a government institution to include components that are now standard at civilian programs, such as National Science Foundation (NSF) Research Experiences for Undergraduates (REU) programs. Critical to the success of this new paradigm is a campuscommunity partnership. This partnership makes it possible for the first time to assess the summer program at the government institution due to government regulations. The AFIT Summer Research Program hosts approximately 50 student contractors each summer;making the program four to five times larger than a typical NSF REU program, and over 10% are female. All students who participate in the AFIT Summer Research Program are required to be U.S. citizens, and are employed under a contractor through the Southwestern Ohio Council for Higher Education (SOCHE). SOCHE has employed nearly 1,000 STEM students over the past 25 years in both summer programs and year-long programs. During this time, a formal assessment tool was not distributed to students to measure the impact of the research experience on student learning because federal regulations [AFI38-501] do not permit Air Force employees at AFIT to legally survey the students since the students work in contractor status (Air Force employees are not legally permitted to survey contractors in any form;neither paper surveys or email surveys are permitted). Due to AFIT policies and procedures surrounding contractors, the AFIT Summer Research Program lacks components of standard comparable NSF-funded REU programs summer research programs at other institutions. These regulations include not being legally permitted to buy refreshments for informal student cohort meetings, not having a dedicated program coordinator, not offering group meetings to discuss resumes, careers, graduate school, or offer a poster conference. While it is typical at other NSF-funded REU programs to have a program
This paper presents a mathematical model, the theoretical basis and an outline of a computer module system supporting scheduling of transportation and assembly of composite beam bridge structures implemented in the ju...
详细信息
This paper presents a mathematical model, the theoretical basis and an outline of a computer module system supporting scheduling of transportation and assembly of composite beam bridge structures implemented in the just in time system (called JIT for short). In the optimization procedures there were used algorithms based on the tabu search method.
This paper addresses the problem of reducing the number of transmissions and control updates in a distributed control network of interconnected linear systems. Each node in the network decides when to transmit its sta...
详细信息
ISBN:
(纸本)9781467357159
This paper addresses the problem of reducing the number of transmissions and control updates in a distributed control network of interconnected linear systems. Each node in the network decides when to transmit its state through the network and when to update the control law. Both decisions are event-driven and based on local information. It is shown that the stability of the system is preserved and the state of the system converges to a small region around the origin, whose size depends on the parameters of the transmission and control update trigger functions. A strictly positive lower bound for the inter-event times is derived. The results are illustrated through simulations showing the effectiveness of the proposed approach.
In this work we deal with a system of autonomous mobile vehicles with limited communication range and consider the problem of the formally correct distributed control, i.e., the design of the local control for each pa...
详细信息
In this work we deal with a system of autonomous mobile vehicles with limited communication range and consider the problem of the formally correct distributed control, i.e., the design of the local control for each particular agent so that it ensures globally correct behavior of the system. A particular problem is the fact that the knowledge about the system state possessed by the agents is partial and never accurate, as during the time of information acquisition (by querying other agents) the state of the agents can change. The paper capitalizes on the results of [1] and contributes with: 1) further development of the theoretical idea toward the distributed supervisory control and the concept of robustness, 2) application of the results in the design of a transport agent, and 3) development of a demonstrator, i.e., a computer application that enables the user to specify a considered transport system and its tasks, creates a virtual environment, where each particular vehicle is represented by a particular software agent implementing the control model of (2), and allows observation of the agents concurrent operation and quantitative assessment of the system performance.
Objective assessment of fabric wrinkledness using multifractal methodology is addressed in the paper. As a first experiment with this methodology in this application field, AATCC standard durable press rating replicas...
详细信息
Objective assessment of fabric wrinkledness using multifractal methodology is addressed in the paper. As a first experiment with this methodology in this application field, AATCC standard durable press rating replicas, which are used by textile experts worldwide, were photographed and then segmented using common image processing methods. The resulting skeleton images were then analyzed using the multifractal methodology.
Cryptographic approaches are vulnerable to impersonation attacks when nodes become compromised. Meanwhile, trust-based judgment and confirmation of cluster heads in WSN imposes higher communication cost. Trust managem...
详细信息
The bag of visual words model (BoW) and its variants have demonstrate their effectiveness for visual applications and have been widely used by researchers. The BoW model first extracts local features and generates the...
详细信息
暂无评论